You'll need to perform an FTD software upgrade to 6.5 (and above) in order to directly connect Management1/1 to any of the Layer 2 interfaces (Ethernet1/2 - 8). This is similar to the ASA 5506-X deployment which doesn't require for an additional switch.
Cisco introduced a new software release delivery model starting with the FTD 6.4 and ASA 9.12. The Extra Long Term Release (XLTR) which are even release numbers (i.e. 6.4 / 6.8) has a longer software support up to 4 years. The Long Term Release (LTR) which are also even release numbers (i.e. 6.6) has a longer software support up to 3 years. The Short Term Release (STR) which are odd release numbers (i.e. 6.5 / 6.7) has a shorter software support up to 1.5 years.
Below is what my lab topology would look like once I upgraded Firepower 1010 to 6.5 code. Management1/1 interface is connected to Ethernet1/2 which is in VLAN 1 (192.168.1.0/24). This will allow Management to fetch updates and Smart License over the Internet (to Cisco cloud).
Below is the recommended FTD software upgrade path. I'm currently on version 6.4 so I can directly upgrade to 6.5. Note for Firepower 2100/4100 series, there's an intermediary upgrade path: 6.1 > 6.2.3 > 6.4.
Download the install package cisco-ftd-fp1k.6.5.0-115.SPA from the Cisco's download website.
To view the current version, go to Device > Updates > View Configuration > System Upgrade.
Notice the Current version is 6.4.0-102.
Note the System
Upgrade is used to perform minor upgrades or patch, i.e. 6.4.x.
INFO: Power-On Self-Test in process.
.......................
INFO: Power-On Self-Test complete.
INFO: Starting SW-DRBG health test...
INFO: SW-DRBG health test passed.
User enable_1 logged in to fpr1010-ftd-lab
Logins over the last 1 days: 1.
Failed logins since the last login: 0.
fpr1010-ftd-lab
login: admin // LOGIN TO FTD
Password:
Last login: Mon Sep 7 05:03:40 UTC 2020 from 192.168.45.2 on pts/0
Successful login attempts for user 'admin' : 1
Copyright 2004-2019, Cisco and/or its affiliates. All rights reserved.
Cisco is a registered trademark of Cisco Systems, Inc.
All other trademarks are property of their respective owners.
Cisco Fire Linux OS v6.4.0 (build 2)
Cisco Firepower 1010 Threat Defense v6.4.0 (build 102)
Cisco Firepower Extensible Operating System (FX-OS) Software
TAC support: http://www.cisco.com/tac
Copyright (c) 2009-2019, Cisco Systems, Inc. All rights reserved.
The copyrights to certain works contained in this software are
owned by other third parties and used and distributed under
license.
Certain components of this software are licensed under the "GNU General Public
License, version 3" provided with ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html. See User Manual (''Licensing'') for
details.
Certain components of this software are licensed under the "GNU General Public
License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html. See User Manual
(''Licensing'') for details.
Certain components of this software are licensed under the "GNU LESSER GENERAL
PUBLIC LICENSE, version 3" provided with ABSOLUTELY NO WARRANTY under the terms
of "GNU LESSER GENERAL PUBLIC LICENSE" Version 3", available here:
http://www.gnu.org/licenses/lgpl.html. See User Manual (''Licensing'') for
details.
Certain components of this software are licensed under the "GNU Lesser General
Public License, version 2.1" provided with ABSOLUTELY NO WARRANTY under the
terms of "GNU Lesser General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html. See User Manual
(''Licensing'') for details.
Certain components of this software are licensed under the "GNU Library General
Public License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms
of "GNU Library General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html. See User Manual
(''Licensing'') for details.
> show version // VIEW CURRENT FTD OS VERSION
----------------[ fpr1010-ftd-lab ]-----------------
Model : Cisco Firepower 1010 Threat Defense (78) Version 6.4.0 (Build 102)
UUID : 83279f6a-f0b4-11ea-84c6-a4fb412e1234
Rules update version : 2018-10-10-001-vrt
VDB version : 309
----------------------------------------------------
Type exit > scope firmware > download image tftp://<IP ADDRESS>/<FTD INSTALL PACKAGE FILE>
> exit
fpr1010-ftd-lab# scope firmware
fpr1010-ftd-lab /firmware # download image tftp://192.168.45.10/cisco-ftd-fp1k.6.5.0-115.SPA
Please use the command 'show download-task' or 'show download-task detail' to check download progress.
You can use either the show download-task or show event commands to monitor the download progress.
fpr1010-ftd-lab /firmware # show download-task
Download task:
File Name Protocol Server Port Userid State
--------- -------- --------------- ---------- --------------- -----
cisco-ftd-fp1k.6.5.0-115.SPA
Tftp 192.168.45.10 0 Downloading
fpr1010-ftd-lab /firmware # show event
Creation Time ID Code Description
------------------------ -------- -------- -----------
2020-09-12T03:36:39.473 31157 E4195704 [FSM:STAGE:ASYNC]: downloading image
cisco-ftd-fp1k.6.5.0-115.SPA from 192.168.45.10(FSM-STAGE:sam:dme:FirmwareDownlo
aderDownload:Local)
2020-09-12T03:36:39.472 31149 E4195702 [FSM:STAGE:END]: (FSM-STAGE:sam:dme:F
irmwareDownloaderDownload:begin)
2020-09-12T03:36:39.472 31156 E4195703 [FSM:STAGE:END]: checking pending man
agement network config(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:CheckPending
NetworkConfig)
2020-09-12T03:36:39.471 31148 E4195702 [FSM:BEGIN]: downloading image cisco-
ftd-fp1k.6.5.0-115.SPA from 192.168.45.10(FSM:sam:dme:FirmwareDownloaderDownload
Notice the State is still Downloading. You can use the show event command instead.
fpr1010-ftd-lab /firmware # show download-task
Download task:
File Name Protocol Server Port Userid State
--------- -------- --------------- ---------- --------------- -----
cisco-ftd-fp1k.6.5.0-115.SPA
Tftp 192.168.45.10 0 Downloading
fpr1010-ftd-lab /firmware # show event
Creation Time ID Code Description
------------------------ -------- -------- -----------
2020-09-12T03:40:29.904 31239 E4195704 [FSM:STAGE:END]: downloading image ci
sco-ftd-fp1k.6.5.0-115.SPA from 192.168.45.10(FSM-STAGE:sam:dme:FirmwareDownload
erDownload:Local)
2020-09-12T03:40:29.904 31240 E4195705 [FSM:STAGE:ASYNC]: unpacking image ci
sco-ftd-fp1k.6.5.0-115.SPA on primary(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:UnpackLocal)
2020-09-12T03:40:29.903 31238 E4195704 [FSM:STAGE:STALE-SUCCESS]: downloadin
g image cisco-ftd-fp1k.6.5.0-115.SPA from 192.168.45.10(FSM-STAGE:sam:dme:Firmwa
reDownloaderDownload:Local)2020-09-12T03:36:39.473 31157 E4195704 [FSM:STAGE:ASYNC]: downloading image
cisco-ftd-fp1k.6.5.0-115.SPA from 192.168.45.10(FSM-STAGE:sam:dme:FirmwareDownlo
aderDownload:Local)
2020-09-12T03:36:39.472 31149 E4195702 [FSM:STAGE:END]: (FSM-STAGE:sam:dme:F
irmwareDownloaderDownload:begin)
2020-09-12T03:36:39.472 31156 E4195703 [FSM:STAGE:END]: checking pending man
agement network config(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:CheckPending
NetworkConfig)
2020-09-12T03:36:39.471 31148 E4195702 [FSM:BEGIN]: downloading image cisco-
ftd-fp1k.6.5.0-115.SPA from 192.168.45.10(FSM:sam:dme:FirmwareDownloaderDownload)
Use the show package command to verify the new FTD software was completely downloaded.
fpr1010-ftd-lab /firmware # show package
Name Package-Vers
--------------------------------------------- ------------
cisco-ftd-fp1k.6.4.0-102.SPA 6.4.0-102
cisco-ftd-fp1k.6.5.0-115.SPA 6.5.0-115
fxos-k9-fp1k.2.6.1.133a.SPA 2.6.1.133a
Go to the scope auto-install mode.
fpr1010-ftd-lab /firmware # scope auto-install
fpr1010-ftd-lab /firmware/auto-install #
Install the software package using the install security pack version <FTD INSTALL PACKAGE FILE - WITHOUT .SPA> command.
fpr1010-ftd-lab /firmware/auto-install # install security-pack version 6.5.0-115
The system is currently installed with security software package 6.4.0-102, which has:
- The platform version: 2.6.1.133
- The CSP (ftd) version: 6.4.0.102
If you proceed with the upgrade 6.5.0-115, it will do the following:
- upgrade to the new platform version 2.7.1.107 // FXOS (FTD CHASSIS OS) IS BUNDLED IN FTD 1000 SERIES
During the upgrade, the system will be reboot
Do you want to proceed ? (yes/no):yes
This operation upgrades firmware and software on Security Platform Components
Here is the checklist of things that are recommended before starting Auto-Install
(1) Review current critical/major faults
(2) Initiate a configuration backup
Do you want to proceed? (yes/no):yes
Triggered the install of software package version 6.5.0-115
Install started. This will take several minutes.
For monitoring the upgrade progress, please enter 'show' or 'show detail' command.
fpr1010-ftd-lab /firmware/auto-install #
Use the show or show detail commands to view the Upgrade State.
fpr1010-ftd-lab /firmware/auto-install # show
Firmware Auto-Install:
Package-Vers Oper State Upgrade State
------------ ---------------------------- -------------
6.5.0-115 Scheduled Ready
fpr1010-ftd-lab /firmware/auto-install # show detail
Firmware Auto-Install:
Package-Vers: 6.5.0-115
Oper State: Scheduled
Installation Time: 2020-09-12T03:55:36.010
Upgrade State: Ready
Upgrade Status:
Validation Software Pack Status:
Firmware Upgrade Status:
Current Task:
fpr1010-ftd-lab /firmware/auto-install # show detail
Firmware Auto-Install:
Package-Vers: 6.5.0-115
Oper State: Scheduled
Installation Time: 2020-09-12T03:55:36.010
Upgrade State: Validating Images
Upgrade Status: validating the software package
Validation Software Pack Status:
Firmware Upgrade Status:
Current Task: Validating the application pack(FSM-STAGE:sam:dme:FirmwareSyst
emDeploy:ValidateApplicationPack)
Broadcast message from root@fpr1010-ftd-lab (Sat Sep 12 03:57:47 2020):
The FTD device will auto reboot a few times.
The system is going down for reboot NOW!
: Stopping all devices.
device busy
Stopping OpenBSD Secure Shell server: sshd
stopped /usr/sbin/sshd (pid 9958)
done.
Stopping Advanced Configuration and Power Interface daemon: stopped /usr/sbin/acpid (pid 1883)
acpid.
Stopping system message bus: dbus.
stopping mountd: done
stopping nfsd: done
Stopping ntpd: stopped process in pidfile '/var/run/ntp.pid' (pid 10220)
done
Stopping internet superserver: xinetd.
stopping statd: done
no /etc/sysconfig/kdump.conf
Stopping rpcbind daemon...
not running.
Stopping fan control daemon: fancontrol... no process in pidfile '/var/run/fancontrol.pid' found; none killed
done.
Stopping sensors logging daemon: sensord... stopped /usr/sbin/sensord (pid 3721)
done.
Deconfiguring network interfaces... done.
ip6tables: Setting chains to policy ACCEPT: mangle filter [ OK ]
ip6tables: Flushing firewall rules: [ OK ]
ip6tables: Unloading modules: [ OK ]
iptables: Setting chains to policy ACCEPT: mangle filter [ OK ]
iptables: Flushing firewall rules: [ OK ]
iptables: Unloading modules: [ OK ]
SSP-Security-Module is shutting down ...
Sat Sep 12 03:57:51 UTC 2020 SHUTDOWN WARNING: Beginning System Shutdown request for CSP Apps
Sat Sep 12 03:57:51 UTC 2020 SHUTDOWN WARNING: Continue System Shutdown request for CSP Apps
/bin/ls: cannot access /opt/cisco/config/heimdall/etc: No such file or directory
/bin/ls: cannot access /opt/cisco/csp/applications/configs: No such file or directory
ls: cannot access /opt/cisco/config/heimdall/etc: No such file or directory
Sat Sep 12 03:57:51 UTC 2020 SHUTDOWN WARNING: Nothing to do for Apps-Services-Down
Sending ALL processes the TERM signal ...
Note: SIGKILL_ALL will be triggered after after 0 + 2 secs ...
ipsec_starter[9930]: charon stopped after 200 ms
ipsec_starter[9930]: ipsec starter stopped
Sending ALL processes the KILL signal ...
Deactivating swap...
Unmounting local filesystems...
Rebooting...
*******************************************************************************
Cisco System ROMMON, Version 1.0.05, RELEASE SOFTWARE
Copyright (c) 1994-2019 by Cisco Systems, Inc.
Compiled Wed 04/03/2019 18:07:24.29 by builder
*******************************************************************************
Current image running: Boot ROM0
Last reset cause: ResetRequest (0x00001000)
DIMM0 : Present
Platform FPR-1010 with 8192 MBytes of main memory
INFO: Firmware upgrade state: ROMMON_UPG_START (1)
INFO: Reset code: 0x00001000
Firmware upgrade request encountered.
Scan for firmware elements that need to be updated...
Looking for file 'disk0:installables/switch/fxos-k8-fp1k-firmware.1008.0203.SPA'
File size is 0x010d0510
Located installables/switch/fxos-k8-fp1k-firmware.1008.0203.SPA
Image size 17630480 inode num 114029, bks cnt 4305 blk size 8*512
#########################################################
Image base 0x75914018, size 17630480
+-------------------------------------------------------------------+
+------------------------- SUCCESS ---------------------------------+
+-------------------------------------------------------------------+
| |
| LFBFF signature authentication passed !!! |
| |
+-------------------------------------------------------------------+
LFBFF signature verified.
+-------------------------------------------------------------------+
+------------------------- SUCCESS ---------------------------------+
+-------------------------------------------------------------------+
| |
| LFBFF controller type check passed !!! |
| |
+-------------------------------------------------------------------+
Objtype: lfbff_object_rommon (0x1000000 bytes @ 0x759144a8)
Objtype: lfbff_object_fpga (0xd0050 bytes @ 0x769144d8)
FPGA: FPGA version currently active: 2.3.0
FPGA: FPGA version in upgrade image: 2.3.0
*** PLEASE DO NOT POWERCYCLE THIS UNIT DURING THE FPGA FLASH ***
*** UPGRADE UNTIL THE FOLLOWING QUOTED MESSAGE IS DISPLAYED ***
*** "Toggling power on system board..." or ***
*** "FPGA: The FPGA upgrade succeeded. " ***
Upgrading the FPGA (Upgrade) image...
Upgrade Image: YES, Golden Image: YES.
Erase Header Sector:
Erasing --- done.
Erasing Upgrade SPI PROM ------------- done.
Programming Upgrade SPI PROM ++++++++++++ done.
Verifying Upgrade SPI PROM ............ done.
Write the new header structure to activate the upgrade image:
Revision ID : 0x00020300
Image Date : 0x19032923
Flags : 0x5b0f01a0
Validation ID : 0x7e4f5d06
Writing +++ done.
Verify the new header structure:
Verifying ... done.
MEAS: FPGA Upgrade Status: Pass! (0)
+-----------------------------------------------------------------+
| |
+ FPGA FIRMWARE UPGRADE SUCCESS +
| |
+-----------------------------------------------------------------+
FPGA: The FPGA upgrade succeeded.
INFO: ROMMON version currently active: 1.0.05
INFO: ROMMON version in upgrade image: 1.0.08
[SPS] Sending HMRFPO_ENABLE to ME
SpsUpgradeHmrfpoEnable succeeded
Active ROMMON: Preferred 0, selected 0, booted 0
Enable access to the upgrade Flash chip (1) to write the ROMMON upgrade image to the upgrade Flash chip.
No need for ROMMON ME upgrade !!
Writing the ROMMON upgrade image to flash now.
Please DO NOT reboot or power-cycle the unit during this ROMMON upgrade period.
Erasing ROMMON ---------------------------------------------------------------- done.
Upgrading ROMMON ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ done.
Verifying ROMMON ................................................................ done.
Programming new ROMMON: Succeed !
Copy the current configuration data to the upgrade Flash chip.
Rebooting to allow this active ROMMON to test launch the new image...
Toggling power on system board...
*******************************************************************************
Cisco System ROMMON, Version 1.0.05, RELEASE SOFTWARE
Copyright (c) 1994-2019 by Cisco Systems, Inc.
Compiled Wed 04/03/2019 18:07:24.29 by builder
*******************************************************************************
Current image running: Boot ROM0
Last reset cause: RP-Reset (0x00000008)
DIMM0 : Present
Platform FPR-1010 with 8192 MBytes of main memory
INFO: Firmware upgrade state: ROMMON_UPG_START (1)
INFO: Reset code: 0x00000008
Active ROMMON: Preferred 0, selected 0, booted 0
Preparing to launch the new ROMMON upgrade image.
The new ROMMON upgrade image has been detected.
This will be launch attempt (1 of 4) to start the upgraded ROMMON image.
Rebooting system to start the upgraded ROMMON image...
*******************************************************************************
Cisco System ROMMON, Version 1.0.08, RELEASE SOFTWARE
Copyright (c) 1994-2019 by Cisco Systems, Inc.
Compiled Mon 06/17/2019 15:54:21.43 by builder
*******************************************************************************
Current image running: *Upgrade in progress* Boot ROM1
Last reset cause: BootRomUpgrade (0x00000010)
DIMM0 : Present
Platform FPR-1010 with 8192 MBytes of main memory
INFO: Firmware upgrade state: ROMMON_UPG_START (1)
INFO: Reset code: 0x00000010
The upgraded ROMMON image has successfully started.
The boot watchdog timer is being stopped.
Active ROMMON: Preferred 0, selected 0, booted 1
INFO: Set the ROMMON upgrade state: ROMMON_UPG_TEST
+-----------------------------------------------------------------+
+--------------- ROMMON FIRMWARE UPGRADE SUCCESS ---------------+
+-----------------------------------------------------------------+
| |
| Start the security application to complete the ROMMON upgrade. |
| |
| Rebooting this unit without starting the security application |
| will cause the ROMMON to default back to the previously running |
| ROMMON version. |
| |
+-----------------------------------------------------------------+
BIOS has been successfully locked !!
MAC Address: 5c:5a:c7:b8:12:34
Use BREAK or ESC to interrupt boot.
Use SPACE to begin boot immediately.
Boot in 8 seconds.
Located .boot_string
Image size 59 inode num 16, bks cnt 1 blk size 8*512
Attempt autoboot: "boot disk0:installables/switch/fxos-k8-fp1k-lfbff.2.7.1.107.SPA"
Located installables/switch/fxos-k8-fp1k-lfbff.2.7.1.107.SPA
Image size 176580624 inode num 114030, bks cnt 43111 blk size 8*512
####################################################################
<OUTPUT TRUNCATED>
####################################################################
+-------------------------------------------------------------------+
+------------------------- SUCCESS ---------------------------------+
+-------------------------------------------------------------------+
| |
| LFBFF signature authentication passed !!! |
| |
+-------------------------------------------------------------------+
LFBFF signature verified.
+-------------------------------------------------------------------+
+------------------------- SUCCESS ---------------------------------+
+-------------------------------------------------------------------+
| |
| LFBFF controller type check passed !!! |
| |
+-------------------------------------------------------------------+
Linux version: 4.1.21-WR8.0.0.25_standard (builders@sjc-releng14) #1 SMP Sat Sep 21 10:25:19 PDT 2019
kernel_image = 0x73bf3c58, kernel_size=0x50abd0
Image validated
INIT: version 2.88 booting
Starting udev
Configuring network interfaces... done.
Populating dev cache
Primary SSD discovered
fsck from util-linux 2.26.2
[/sbin/fsck.ext3 (1) -- /dev/sda1] fsck.ext3 -a /dev/sda1
/dev/sda1: clean, 8841/488640 files, 667812/1953024 blocks
fsck(/dev/sda1) returned 0
fsck from util-linux 2.26.2
[/sbin/fsck.ext3 (1) -- /dev/sda2] fsck.ext3 -a /dev/sda2
/dev/sda2: clean, 12/61056 files, 8242/244224 blocks
fsck(/dev/sda2) returned 0
fsck from util-linux 2.26.2
[/sbin/fsck.ext3 (1) -- /dev/sda3] fsck.ext3 -a /dev/sda3
/dev/sda3: clean, 13/61056 files, 8243/244224 blocks
fsck(/dev/sda3) returned 0
fsck from util-linux 2.26.2
[/sbin/fsck.ext3 (1) -- /dev/sda4] fsck.ext3 -a /dev/sda4
/dev/sda4: clean, 12/1831424 files, 158992/7324160 blocks
fsck(/dev/sda4) returned 0
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
FIPS POST Test Script
NOTICE: The FIPS POST is not run because the FIPS feature is not enabled
Running postinst /etc/rpm-postinsts/100-dnsmasq...
Running postinst /etc/rpm-postinsts/101-dnsmasq...
INIT: Entering runlevel: 3
Starting system message bus: dbus.
Stopping all devices.
Starting all devices.
Processing /etc/c3xxx_dev0.conf
Checking status of all devices.
There is 1 QAT acceleration device(s) in the system:
qat_dev0 - type: c3xxx, inst_id: 0, node_id: 0, bsf: 01:00.0, #accel: 3 #engines: 6 state: up
ip6tables: Applying firewall rules: [ OK ]
iptables: Applying firewall rules: [ OK ]
Starting OpenBSD Secure Shell server: sshd
generating ssh ed25519 key...
done.
Starting rpcbind daemon...done.
starting statd: done
Starting Advanced Configuration and Power Interface daemon: acpid.
acpid: starting up with netlink and the input layer
acpid: 1 rule loaded
acpid: waiting for events: event logging is off
starting 8 nfsd kernel threads: done
starting mountd: done
Starting ntpd: done
Starting random number generator daemonUnable to open file: /dev/tpm0
.
Starting internet superserver: xinetd.
No makedumpfile found.
Starting fan control daemon: fancontrol... done.
INFO: in validating image ...
INFO: manager_validate_image: fxmgr_absfilename /mnt/boot/installables/switch/fxos-k9-manager.2.7.1.107.SPA
INFO: Validating image /mnt/boot/installables/switch/fxos-k9-manager.2.7.1.107.SPA signature ...
: File /mnt/boot/installables/switch/fxos-k9-manager.2.7.1.107.SPA size 26368896
Done!
Computed Hash SHA2: 1434b368fd187e7dd366e44b8e9d382c
7ef4d0e803ca4c6eadd510f4ee7213f7
de1b8ffa2bba0722ccb1e5dca1665803
2902019adf38b942babec942329cfd54
Embedded Hash SHA2: 1434b368fd187e7dd366e44b8e9d382c
7ef4d0e803ca4c6eadd510f4ee7213f7
de1b8ffa2bba0722ccb1e5dca1665803
2902019adf38b942babec942329cfd54
The digital signature of the file: fxos-k9-manager.2.7.1.107.SPA verified successfully
INFO: beginning of manager_install
INFO: manager_install: fxmgr=/mnt/boot/installables/switch/fxos-k9-manager.2.7.1.107.SPA chmgr= update=false
INFO: Creating directory /tmp/fxmgr
INFO: /bin/tar -xvzf /tmp/fxmgr/fxos-kp-manager.2.7.1.107.tgz ...
INFO: manager_install: shutting down the old version ...
INFO: Terminating DME and all AGs ...
INFO: --
INFO: manager_install: Unlinking a old libraries ...
INFO: manager_install: Deleting the old manager image ...
INFO: manager_install: Installing the new image ...
INFO: deleting unnecessary xml file..!!
INFO: deleted unnecessary xml file..!!
INFO: manager_post_install ...
INFO: manager_post_install: fxmgr=/mnt/boot/installables/switch/fxos-k9-manager.2.7.1.107.SPA chmgr= update=false
INFO: manager_post_install: Linking libraries ...
INFO: manager_post_install: Linking binaries ...
Completed system initial setup.
INFO: Trying to add iptables and ip6tables rules ...
INFO: Set up Application Diagnostic Interface ...
INFO: Configure management interface ...
Firepower 1xxx platform..
RTNETLINK answers: File exists
RTNETLINK answers: File exists
Assigning ip to eth0 in FPR-1xxx platform
INFO: Configure rmu interface ...
Bring up rmu and swp1-swp10 switch interfaces
create and bringup lldp sub-interface on lldp-swp7, lldp-swp8
create and bringup lacp and mgmt sub-interface on (lacp-swp1 to lacp-swp8), (mgmt-swp1 to mgmt-swp8)
Stopping rpcbind daemon...
done.
stopping mountd: done
stopping nfsd: .done
INFO: Configure system files ...
INFO: System Name is: firepower-1010
Starting sensors logging daemon: sensord... done.
INFO: console : ttyS0, speed : 9600
INFO: manager_startup: setting up fxmgr apache ...
INFO: manager_startup: Start manager httpd setup...
INFO: manager_startup: /opt/cisco/config/certstore/default.key not found on platform, re-generating files
INFO: manager_startup: reset httpd app config to default
httpdRegister INFO: [httpd.3761 -4 192.168.45.45 -n localhost]
httpdRegister INFO: Starting httpd setup/registration...
httpdRegister INFO: Completed httpd setup/registration!
INFO: httpdRegister [httpd.3761 script exit]
INFO: manager_startup: Completed manager httpd setup!
Starting crond: OK
INFO: System Disk /dev/sda present. Status: Operable.
firepower-1010 login:
Waiting for Application infrastructure to be ready...
Verifying the signature of the Application image...
Creating FXOS swap file ...
Sep 12 04:03:07 firepower-1010 FPRM: <<%FPRM-2-DEFAULT_INFRA_VERSION_MISSING>> [F1309][critical][default-infra-version-missing][org-root/fw-infra-pack-default] Bundle version in firmware package is empty, need to re-install
Sep 12 04:03:10 firepower-1010 port-manager: Alert: Internal1/2 link changed to UP
Sep 12 04:03:10 firepower-1010 port-manager: Alert: Internal1/1 link changed to UP
Sep 12 04:04:36 firepower-1010 FPRM: <<%FPRM-2-DEFAULT_INFRA_VERSION_MISSING>> [F1309][cleared][default-infra-version-missing][org-root/fw-infra-pack-default] Bundle version in firmware package is empty, need to re-install
Threat Defense System: CMD=-install, CSP-ID=cisco-ftd.6.5.0.115__ftd_001_JMX2324G1THX8U79N1, FLAG=''
System begins installation ...
Cisco FTD installation finished successfully.
Verifying signature for cisco-ftd.6.5.0.115 ...
Verifying signature for cisco-ftd.6.5.0.115 ... success
Threat Defense System: CMD=-start, CSP-ID=cisco-ftd.6.5.0.115__ftd_001_JMX2324G1THX8U79N1, FLAG=''
System starting ...
Registering to process manager ...
Cisco FTD started successfully.
Cisco FTD initializing ...
Verify FSIC, File System Integrity Check
Configuring model to 78A...
Obtained uid 501 and gid 501 for external user
verify_fsic(start)
Do not run FSIC twice for SSP systems...
Initializing Threat Defense ... [ OK ]
Starting system log daemon... [ OK ]
Disk free check passed, creating swap...
Building swapfile /ngfw/Volume/.swaptwo of size 5508236kb
5508236+0 records in
5508236+0 records out
5640433664 bytes (5.6 GB) copied, 19.5463 s, 289 MB/s
Setting up swapspace version 1, size = 5.3 GiB (5640429568 bytes)
no label, UUID=463656fe-531a-4645-a782-7a12997f5681
Adding swapfile /ngfw/Volume/.swaptwo
Flushing all current IPv4 rules and user defined chains: ...success
Clearing all current IPv4 rules and user defined chains: ...success
Applying iptables firewall rules:
Flushing chain `PREROUTING'
Flushing chain `INPUT'
Flushing chain `FORWARD'
Flushing chain `OUTPUT'
Flushing chain `POSTROUTING'
Flushing chain `INPUT'
Flushing chain `FORWARD'
Flushing chain `OUTPUT'
Applying rules successed
Flushing all current IPv6 rules and user defined chains: ...success
Clearing all current IPv6 rules and user defined chains: ...success
Applying ip6tables firewall rules:
Flushing chain `PREROUTING'
Flushing chain `INPUT'
Flushing chain `FORWARD'
Flushing chain `OUTPUT'
Flushing chain `POSTROUTING'
Flushing chain `INPUT'
Flushing chain `FORWARD'
Flushing chain `OUTPUT'
Applying rules successed
Starting nscd... [ OK ]
Starting , please wait......complete.
cleaning up *.TMM and *.TMD files
Firstboot detected, executing scripts
Executing S01virtual-machine-reconfigure [ OK ]
Executing S01z_copy_startup-config [ OK ]
Executing S02aws-pull-cfg [ OK ]
Executing S02configure_onbox [ OK ]
Executing S03generate_db_access.sh [ OK ]
Executing S04fix-httpd.sh [ OK ]
Executing S05set-default-ipv4.pl [ OK ]
Executing S06addusers [ OK ]
Executing S07uuid-init [ OK ]
Executing S08configure_mysql [ OK ]
************ Attention *********
Initializing the configuration database. Depending on available
system resources (CPU, memory, and disk), this may take 30 minutes
or more to complete.
************ Attention *********
Executing S09database-init [ OK ]
Executing S11database-populate [ OK ]
Executing S12install_infodb [ OK ]
Executing S15set-locale.sh [ OK ]
Executing S16update-sensor.pl [ OK ]
Executing S19cert-tun-init [ OK ]
Executing S20cert-init [ OK ]
Executing S21disable_estreamer [ OK ]
Executing S25create_default_des.pl [ OK ]
Executing S30init_lights_out_mgmt.pl [ OK ]
Executing S33azure-waagent [ OK ]
Executing S40install_default_filters.pl [ OK ]
Executing S41install_default_app_filters.pl [ OK ]
Executing S43install_default_report_templates.pl [ OK ]
Executing S44install_analysis_objects.pl [ OK ]
Executing S45install_default_realms.pl [ OK ]
Executing S47install_default_sandbox_EO.pl [ OK ]
Executing S50install-remediation-modules [ OK ]
Executing S51install_health_policy.pl [ OK ]
Executing S52install_system_policy.pl [ OK ]
Executing S53change_reconciliation_baseline.pl [ OK ]
Executing S70remove_casuser.pl [ OK ]
Executing S70update_sensor_objects.sh [ OK ]
Executing S85patch_history-init [ OK ]
Executing S96grow_var.sh [ OK ]
Executing S96install_vmware_tools.pl [ OK ]
********** Attention **********
Initializing the system's localization settings. Depending on available
system resources (CPU, memory, and disk), this may take 10 minutes
or more to complete.
********** Attention **********
Executing S96localize-templates [ OK ]
Executing S96ovf-data.pl [ OK ]
Executing S97compress-client-resources [ OK ]
Executing S97create_platinum_forms.pl [ OK ]
Executing S97install_cas [ OK ]
Executing S97install_cloud_support.pl [ OK ]
Executing S97install_geolocation.pl [ OK ]
Executing S97install_ssl_inspection.pl [ OK ]
Executing S97update_modprobe.pl [ OK ]
Executing S98check-db-integrity.sh [ OK ]
Executing S98htaccess-init [ OK ]
Executing S99configure_mysql [ OK ]
Executing S99correct_ipmi.pl [ OK ]
Executing S99ngfw_onbox [ OK ]
Executing S99ssl_hw_mode.sh [ OK ]
Executing S99start-system [ OK ]
Executing S99z_db_restore [ OK ]
Firstboot scripts finished.
Configuring NTP... [ OK ]
Stopping all devices.
Starting all devices.
Processing /etc/c3xxx_dev0.conf
Checking status of all devices.
There is 1 QAT acceleration device(s) in the system:
qat_dev0 - type: c3xxx, inst_id: 0, node_id: 0, bsf: 01:00.0, #accel: 3 #engines: 6 state: up
SIOCSIFADDR: No such device
br0: ERROR while getting interface flags: No such device
SIOCSIFNETMASK: No such device
br0: ERROR while getting interface flags: No such device
Model reconfigure detected, executing scripts
Pinging mysql
Found mysql is running
Executing 45update-sensor.pl [ OK ]
Executing 55recalculate_arc.pl [ OK ]
Sat Sep 12 04:25:02 UTC 2020
Starting MySQL...
Pinging mysql
Pinging mysql, try 1
Found mysql is running
Running initializeObjects...
Stopping MySQL...
Killing mysqld with pid 14515
Wait for mysqld to exit\c
done
Sat Sep 12 04:25:13 UTC 2020
Skipping sfifd for this platform...
Starting Cisco Firepower 1010 Threat Defense, please wait...No PM running!
...started.
Cisco FTD initialization finished successfully.
memif is not enabled.
IO Memory Nodes: 1
IO Memory Per Node: 549453824 bytes num_pages = 134144 page_size = 4096
Global Reserve Memory Per Node: 786432000 bytes Nodes=1
LCMB: got 1073741824 bytes on numa-id=0, phys=0x200000000, virt=0x2b5700000000
LCMB: HEAP-CACHE POOL got 782237696 bytes on numa-id=0, virt=0x2b56c8c00000
total mem 3077049360 system 8394874880 kernel 12334038 image 111086672
new 3077049360 old 660540496 reserve 1855979520 priv new 1233403878 priv old 0
Processor memory: 3077049360
POST started...
POST finished, result is 0 (hint: 1 means it failed)
Compiled on Thu 19-Sep-19 17:23 PDT by builders
SSL Hardware Offload is Enabled
Snort trust pinhole is NOT Enabled
FPR-1010 platform
Total NICs found: 6
x550em_kr rev 0x11 10 Gigabit Ethernet, index 00 MAC: 00a0.c900.0000
en_vtun rev00 Backplane Ext-Mgmt Interface @ index 02 MAC: 5c5a.c7b8.1234
en_vtun rev00 Backplane Tap Interface @ index 03 MAC: 0000.0100.0001
en_vtun rev00 Backplane Control Interface @ index 05 MAC: 0000.0300.0101
WARNING: Attribute already exists in the dictionary.
License mode file was not found. Assuming this is the initial bootup. Setting the license mode to Smart Licensing.
INFO: Unable to read firewall mode from flash
Writing default firewall mode (single) to flash
INFO: Unable to read cluster interface-mode from flash
Writing default mode "None" to flash
*** Intel QAT Crypto on-board accelerator detected
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
****************************** Warning *******************************
This product contains cryptographic features and is
subject to United States and local country laws
governing, import, export, transfer, and use.
Delivery of Cisco cryptographic products does not
imply third-party authority to import, export,
distribute, or use encryption. Importers, exporters,
distributors and users are responsible for compliance
with U.S. and local country laws. By using this
product you agree to comply with applicable laws and
regulations. If you are unable to comply with U.S.
and local laws, return the enclosed items immediately.
A summary of U.S. laws governing Cisco cryptographic
products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by
sending email to export@cisco.com.
******************************* Warning *******************************
Copyright (c) 1996-2017 by Cisco Systems, Inc.
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Error No such device in set_linux_mac_address: Failed to assign MAC address for br0
Reading from flash...
!
Cryptochecksum (changed): 6929aede 6646bb60 e7c2f077 d48e4bc9
INFO: Power-On Self-Test in process.
.......................................................................
INFO: Power-On Self-Test complete.
INFO: Starting SW-DRBG health test...
INFO: SW-DRBG health test passed.
M_MMAP_THRESHOLD 65536, M_MMAP_MAX 46952
User enable_1 logged in to firepower
Logins over the last 1 days: 1.
Failed logins since the last login: 0.
Type help o '?' for a list of available[X‹Í¹
firepower>
firepower login:
You can ping the Management IP 192.168.45.45 but still can't HTTPS (FDM) during the upgrade process.
The FTD software upgrade completed around 30 mins.
firepower login: admin
Password: <Admin123>
Successful login attempts for user 'admin' : 1
Last failed login: Sat Sep 12 04:27:56 UTC 2020 on ttyS0
There were 2 failed login attempts since the last successful login.
Copyright 2004-2019, Cisco and/or its affiliates. All rights reserved.
Cisco is a registered trademark of Cisco Systems, Inc.
All other trademarks are property of their respective owners.
Cisco Fire Linux OS v6.5.0 (build 4)
Cisco Firepower 1010 Threat Defense v6.5.0 (build 115)
Cisco Firepower Extensible Operating System (FX-OS) Software
TAC support: http://www.cisco.com/tac
Copyright (c) 2009-2019, Cisco Systems, Inc. All rights reserved.
The copyrights to certain works contained in this software are
owned by other third parties and used and distributed under
license.
Certain components of this software are licensed under the "GNU General Public
License, version 3" provided with ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html. See User Manual (''Licensing'') for
details.
Certain components of this software are licensed under the "GNU General Public
License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html. See User Manual
(''Licensing'') for details.
Certain components of this software are licensed under the "GNU LESSER GENERAL
PUBLIC LICENSE, version 3" provided with ABSOLUTELY NO WARRANTY under the terms
of "GNU LESSER GENERAL PUBLIC LICENSE" Version 3", available here:
http://www.gnu.org/licenses/lgpl.html. See User Manual (''Licensing'') for
details.
Certain components of this software are licensed under the "GNU Lesser General
Public License, version 2.1" provided with ABSOLUTELY NO WARRANTY under the
terms of "GNU Lesser General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html. See User Manual
(''Licensing'') for details.
Certain components of this software are licensed under the "GNU Library General
Public License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms
of "GNU Library General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html. See User Manual
(''Licensing'') for details.
firepower# connect ftd
You must accept the EULA to continue.
Press <ENTER> to display the EULA: <HIT ENTER>
End User License Agreement
Effective: May 22, 2017
This is an agreement between You and Cisco Systems, Inc. or its affiliates
("Cisco") and governs your Use of Cisco Software. "You" and "Your" means the
individual or legal entity licensing the Software under this EULA. "Use" or
"Using" means to download, install, activate, access or otherwise use the
Software. "Software" means the Cisco computer programs and any Upgrades made
available to You by an Approved Source and licensed to You by Cisco.
"Documentation" is the Cisco user or technical manuals, training materials,
specifications or other documentation applicable to the Software and made
available to You by an Approved Source. "Approved Source" means (i) Cisco or
(ii) the Cisco authorized reseller, distributor or systems integrator from whom
you acquired the Software. "Entitlement" means the license detail; including
license metric, duration, and quantity provided in a product ID (PID) published
on Cisco's price list, claim certificate or right to use notification.
"Upgrades" means all updates, upgrades, bug fixes, error corrections,
enhancements and other modifications to the Software and backup copies thereof.
This agreement, any supplemental license terms and any specific product terms
at www.cisco.com/go/softwareterms (collectively, the "EULA") govern Your Use of
the Software.
1. Acceptance of Terms. By Using the Software, You agree to be bound by the
terms of the EULA. If you are entering into this EULA on behalf of an entity,
you represent that you have authority to bind that entity. If you do not have
such authority or you do not agree to the terms of the EULA, neither you nor
the entity may Use the Software and it may be returned to the Approved Source
for a refund within thirty (30) days of the date you acquired the Software or
Cisco product. Your right to return and refund applies only if you are the
original end user licensee of the Software.
2. License. Subject to payment of the applicable fees and compliance with this
EULA, Cisco grants You a limited, non-exclusive and non-transferable license to
Use object code versions of the Software and the Documentation solely for Your
internal operations and in accordance with the Entitlement and the
Documentation. Cisco licenses You the right to Use only the Software You
acquire from an Approved Source. Unless contrary to applicable law, You are not
licensed to Use the Software on secondhand or refurbished Cisco equipment not
authorized by Cisco, or on Cisco equipment not purchased through an Approved
Source. In the event that Cisco requires You to register as an end user, Your
license is valid only if the registration is complete and accurate. The
Software may contain open source software, subject to separate license terms
made available with the Cisco Software or Documentation.
If the Software is licensed for a specified term, Your license is valid solely
for the applicable term in the Entitlement. Your right to Use the Software
begins on the date the Software is made available for download or installation
and continues until the end of the specified term, unless otherwise terminated
in accordance with this Agreement.
3. Evaluation License. If You license the Software or receive Cisco product(s)
for evaluation purposes or other limited, temporary use as authorized by Cisco
("Evaluation Product"), Your Use of the Evaluation Product is only permitted
for the period limited by the license key or otherwise stated by Cisco in
writing. If no evaluation period is identified by the license key or in
writing, then the evaluation license is valid for thirty (30) days from the
date the Software or Cisco product is made available to You. You will be
invoiced for the list price of the Evaluation Product if You fail to return or
stop Using it by the end of the evaluation period. The Evaluation Product is
licensed "AS-IS" without support or warranty of any kind, expressed or implied.
Cisco does not assume any liability arising from any use of the Evaluation
Product. You may not publish any results of benchmark tests run on the
Evaluation Product without first obtaining written approval from Cisco. You
authorize Cisco to use any feedback or ideas You provide Cisco in connection
with Your Use of the Evaluation Product.
4. Ownership. Cisco or its licensors retain ownership of all intellectual
property rights in and to the Software, including copies, improvements,
enhancements, derivative works and modifications thereof. Your rights to Use
the Software are limited to those expressly granted by this EULA. No other
rights with respect to the Software or any related intellectual property rights
are granted or implied.
5. Limitations and Restrictions. You will not and will not allow a third party
to:
a. transfer, sublicense, or assign Your rights under this license to any other
person or entity (except as expressly provided in Section 12 below), unless
expressly authorized by Cisco in writing;
b. modify, adapt or create derivative works of the Software or Documentation;
c. reverse engineer, decompile, decrypt, disassemble or otherwise attempt to
derive the source code for the Software, except as provided in Section 16
below;
d. make the functionality of the Software available to third parties, whether
as an application service provider, or on a rental, service bureau, cloud
service, hosted service, or other similar basis unless expressly authorized by
Cisco in writing;
e. Use Software that is licensed for a specific device, whether physical or
virtual, on another device, unless expressly authorized by Cisco in writing; or
f. remove, modify, or conceal any product identification, copyright,
proprietary, intellectual property notices or other marks on or within the
Software.
6. Third Party Use of Software. You may permit a third party to Use the
Software licensed to You under this EULA if such Use is solely (i) on Your
behalf, (ii) for Your internal operations, and (iii) in compliance with this
EULA. You agree that you are liable for any breach of this EULA by that third
party.
7. Limited Warranty and Disclaimer.
a. Limited Warranty. Cisco warrants that the Software will substantially
conform to the applicable Documentation for the longer of (i) ninety (90) days
following the date the Software is made available to You for your Use or (ii)
as otherwise set forth at www.cisco.com/go/warranty. This warranty does not
apply if the Software, Cisco product or any other equipment upon which the
Software is authorized to be used: (i) has been altered, except by Cisco or its
authorized representative, (ii) has not been installed, operated, repaired, or
maintained in accordance with instructions supplied by Cisco, (iii) has been
subjected to abnormal physical or electrical stress, abnormal environmental
conditions, misuse, negligence, or accident; (iv) is licensed for beta,
evaluation, testing or demonstration purposes or other circumstances for which
the Approved Source does not receive a payment of a purchase price or license
fee; or (v) has not been provided by an Approved Source. Cisco will use
commercially reasonable efforts to deliver to You Software free from any
viruses, programs, or programming devices designed to modify, delete, damage or
disable the Software or Your data.
b. Exclusive Remedy. At Cisco's option and expense, Cisco shall repair,
replace, or cause the refund of the license fees paid for the non-conforming
Software. This remedy is conditioned on You reporting the non-conformance in
writing to Your Approved Source within the warranty period. The Approved Source
may ask You to return the Software, the Cisco product, and/or Documentation as
a condition of this remedy. This Section is Your exclusive remedy under the
warranty.
c. Disclaimer.
Except as expressly set forth above, Cisco and its licensors provide Software
"as is" and expressly disclaim all warranties, conditions or other terms,
whether express, implied or statutory, including without limitation,
warranties, conditions or other terms regarding merchantability, fitness for a
particular purpose, design, condition, capacity, performance, title, and
non-infringement. Cisco does not warrant that the Software will operate
uninterrupted or error-free or that all errors will be corrected. In addition,
Cisco does not warrant that the Software or any equipment, system or network on
which the Software is used will be free of vulnerability to intrusion or
attack.
8. Limitations and Exclusions of Liability. In no event will Cisco or its
licensors be liable for the following, regardless of the theory of liability or
whether arising out of the use or inability to use the Software or otherwise,
even if a party been advised of the possibility of such damages: (a) indirect,
incidental, exemplary, special or consequential damages; (b) loss or corruption
of data or interrupted or loss of business; or (c) loss of revenue, profits,
goodwill or anticipated sales or savings. All liability of Cisco, its
affiliates, officers, directors, employees, agents, suppliers and licensors
collectively, to You, whether based in warranty, contract, tort (including
negligence), or otherwise, shall not exceed the license fees paid by You to any
Approved Source for the Software that gave rise to the claim. This limitation
of liability for Software is cumulative and not per incident. Nothing in this
Agreement limits or excludes any liability that cannot be limited or excluded
under applicable law.
9. Upgrades and Additional Copies of Software. Notwithstanding any other
provision of this EULA, You are not permitted to Use Upgrades unless You, at
the time of acquiring such Upgrade:
a. already hold a valid license to the original version of the Software, are in
compliance with such license, and have paid the applicable fee for the Upgrade;
and
b. limit Your Use of Upgrades or copies to Use on devices You own or lease; and
c. unless otherwise provided in the Documentation, make and Use additional
copies solely for backup purposes, where backup is limited to archiving for
restoration purposes.
10. Audit. During the license term for the Software and for a period of three
(3) years after its expiration or termination, You will take reasonable steps
to maintain complete and accurate records of Your use of the Software
sufficient to verify compliance with this EULA. No more than once per twelve
(12) month period, You will allow Cisco and its auditors the right to examine
such records and any applicable books, systems (including Cisco product(s) or
other equipment), and accounts, upon reasonable advanced notice, during Your
normal business hours. If the audit discloses underpayment of license fees, You
will pay such license fees plus the reasonable cost of the audit within thirty
(30) days of receipt of written notice.
11. Term and Termination. This EULA shall remain effective until terminated or
until the expiration of the applicable license or subscription term. You may
terminate the EULA at any time by ceasing use of or destroying all copies of
Software. This EULA will immediately terminate if You breach its terms, or if
You fail to pay any portion of the applicable license fees and You fail to cure
that payment breach within thirty (30) days of notice. Upon termination of this
EULA, You shall destroy all copies of Software in Your possession or control.
12. Transferability. You may only transfer or assign these license rights to
another person or entity in compliance with the current Cisco
Relicensing/Transfer Policy (www.cisco.com/c/en/us/products/
cisco_software_transfer_relicensing_policy.html). Any attempted transfer or,
assignment not in compliance with the foregoing shall be void and of no effect.
13. US Government End Users. The Software and Documentation are "commercial
items," as defined at Federal Acquisition Regulation ("FAR") (48 C.F.R.) 2.101,
consisting of "commercial computer software" and "commercial computer software
documentation" as such terms are used in FAR 12.212. Consistent with FAR 12.211
(Technical Data) and FAR 12.212 (Computer Software) and Defense Federal
Acquisition Regulation Supplement ("DFAR") 227.7202-1 through 227.7202-4, and
notwithstanding any other FAR or other contractual clause to the contrary in
any agreement into which this EULA may be incorporated, Government end users
will acquire the Software and Documentation with only those rights set forth in
this EULA. Any license provisions that are inconsistent with federal
procurement regulations are not enforceable against the U.S. Government.
14. Export. Cisco Software, products, technology and services are subject to
local and extraterritorial export control laws and regulations. You and Cisco
each will comply with such laws and regulations governing use, export,
re-export, and transfer of Software, products and technology and will obtain
all required local and extraterritorial authorizations, permits or licenses.
Specific export information may be found at: tools.cisco.com/legal/export/pepd/
Search.do
15. Survival. Sections 4, 5, the warranty limitation in 7(a), 7(b) 7(c), 8, 10,
11, 13, 14, 15, 17 and 18 shall survive termination or expiration of this EULA.
16. Interoperability. To the extent required by applicable law, Cisco shall
provide You with the interface information needed to achieve interoperability
between the Software and another independently created program. Cisco will
provide this interface information at Your written request after you pay
Cisco's licensing fees (if any). You will keep this information in strict
confidence and strictly follow any applicable terms and conditions upon which
Cisco makes such information available.
17. Governing Law, Jurisdiction and Venue.
If You acquired the Software in a country or territory listed below, as
determined by reference to the address on the purchase order the Approved
Source accepted or, in the case of an Evaluation Product, the address where
Product is shipped, this table identifies the law that governs the EULA
(notwithstanding any conflict of laws provision) and the specific courts that
have exclusive jurisdiction over any claim arising under this EULA.
Country or Territory | Governing Law | Jurisdiction and Venue
=========================|=========================|===========================
United States, Latin | State of California, | Federal District Court,
America or the | United States of | Northern District of
Caribbean | America | California or Superior
| | Court of Santa Clara
| | County, California
-------------------------|-------------------------|---------------------------
Canada | Province of Ontario, | Courts of the Province of
| Canada | Ontario, Canada
-------------------------|-------------------------|---------------------------
Europe (excluding | Laws of England | English Courts
Italy), Middle East, | |
Africa, Asia or Oceania | |
(excluding Australia) | |
-------------------------|-------------------------|---------------------------
Japan | Laws of Japan | Tokyo District Court of
| | Japan
-------------------------|-------------------------|---------------------------
Australia | Laws of the State of | State and Federal Courts
| New South Wales | of New South Wales
-------------------------|-------------------------|---------------------------
Italy | Laws of Italy | Court of Milan
-------------------------|-------------------------|---------------------------
China | Laws of the People's | Hong Kong International
| Republic of China | Arbitration Center
-------------------------|-------------------------|---------------------------
All other countries or | State of California | State and Federal Courts
territories | | of California
-------------------------------------------------------------------------------
The parties specifically disclaim the application of the UN Convention on
Contracts for the International Sale of Goods. In addition, no person who is
not a party to the EULA shall be entitled to enforce or take the benefit of any
of its terms under the Contracts (Rights of Third Parties) Act 1999. Regardless
of the above governing law, either party may seek interim injunctive relief in
any court of appropriate jurisdiction with respect to any alleged breach of
such party's intellectual property or proprietary rights.
18. Integration. If any portion of this EULA is found to be void or
unenforceable, the remaining provisions of the EULA shall remain in full force
and effect. Except as expressly stated or as expressly amended in a signed
agreement, the EULA constitutes the entire agreement between the parties with
respect to the license of the Software and supersedes any conflicting or
additional terms contained in any purchase order or elsewhere, all of which
terms are excluded. The parties agree that the English version of the EULA will
govern in the event of a conflict between it and any version translated into
another language.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco
and/or its affiliates in the U.S. and other countries. To view a list of Cisco
trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks
mentioned are the property of their respective owners. The use of the word
partner does not imply a partnership relationship between Cisco and any other
company. (1110R)
Please enter 'YES' or press <ENTER> to AGREE to the EULA: yes
System initialization in progress. Please stand by.
You must configure the network to continue.
You must configure at least one of IPv4 or IPv6.
Do you want to configure IPv4? (y/n) [y]:
Login to FDM using the default username and password: admin / Admin123
I used the initial configuration wizard via CLI in my previous post, so I'll use the easy setup wizard via FDM this time.
In FTD 6.5, the Management IP is still 192.168.45.45, Ethernet1/1 is outside and Ethernet1/2-8 are Layer 2 switch ports in VLAN 1.
Under Outside Interface Address > Configure IPv4 > Using DHCP > leave IPv6: Off.
Under Management Interface > leave the default for Primary and Secondary DNS IP address (Cisco OpenDNS/Umbrella) > type the Firewall Hostname: fpr1010-ftd-lab > click Next.
Select a Time Zone: UTC+08:00 Asia/Singapore > leave the default NTP Time Server (Cisco Sourcefire public NTP servers) > click Next.
Select Continue with evaluation period: Start 90-day evaluation period without registration > click Finish.
This would allow me to test all FTD Threat, Malware and URL License features.
Click
1 - Configure Interfaces.
Under Ethernet1/1 (outside) > click Edit (blue pencil icon on the right-most column).
You can edit the Interface Name (outside by default) > toggle Status to disable/shutdown > select Type: Static or DHCP > leave the Obtain Default Route using DHCP enabled (similar to ASA ip address dhcp setroute).
Edit Management1/1 > type IPv4 address and Subnet Mask: 192.168.1.45/24 > click OK (at the bottom).
I connected my laptop (used static IP 192.168.1.10/24) on FTD Ethernet1/3 and Management to Ethernet 1/2.
I connect to FDM using 192.168.1.1 which is the FTD default gateway for VLAN 1.
C:\Windows\System32>ipconfig
Windows IP Configuration
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix . :
IPv4 Address. . . . . . . . . . . : 192.168.1.10
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1
C:\Windows\System32>ping 192.168.1.1
Pinging 192.168.1.1 with 32 bytes of data:
Reply from 192.168.1.1: bytes=32 time<1ms TTL=255
Reply from 192.168.1.1: bytes=32 time=1ms TTL=255
Reply from 192.168.1.1: bytes=32 time=1ms TTL=255
Reply from 192.168.1.1: bytes=32 time=1ms TTL=255
Ping statistics for 192.168.1.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 1ms, Average = 0ms
C:\Windows\System32>ping 8.8.8.8
Pinging 8.8.8.8 with 32 bytes of data:
Reply from 8.8.8.8: bytes=32 time=3ms TTL=117
Reply from 8.8.8.8: bytes=32 time=4ms TTL=117
Reply from 8.8.8.8: bytes=32 time=3ms TTL=117
Reply from 8.8.8.8: bytes=32 time=5ms TTL=117
Ping statistics for 8.8.8.8:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 3ms, Maximum = 5ms, Average = 3ms
Notice the FTD ISP/WAN/Gateway connectivity went green and has connectivity to DNS Server (Cisco OpenDNS/Umbrella) and NTP Server (Cisco Sourcefire NTP).
The Smart License became yellow since it's using the 90-day evaluation license.