It's almost Chinese New Year 2021 (also known as Spring Festival or Lunar New Year) and I was craving for some Chinese food. So I went to Hawker Chan in Chinatown Singapore to try out the world's cheapest Michelin-starred meal, which is their famous Soya Sauce Chicken rice. I also ordered a two combination platter that includes Char Siew and Roasted Pork. The meal isn't complete without the chili sauce.
I visited the Buddha Tooth Relic Temple, which is just a few blocks away. It's a Buddhist temple and got its name from a relic which claimed to be the left canine tooth of Buddha. The entrance is free and there's a museum in the upper floor (Buddha's tooth chamber is in the fourth floor). Taking photos and video inside the temple premise isn't allowed.
You can reimage an FTD appliance from ASA software back to FTD OS. Below are the steps for the FTD ASA to FTD conversion. I'm running a TFTP server in my laptop with static IP address 192.168.1.10/24.
Transfer the FTD image (version 6.5) to the flash (disk0:) memory.
ciscoasa# dir
Directory of disk0:/
203 drwx 72 08:14:14 Sep 27 2020 log
268435725 drwx 4096 08:28:18 Sep 27 2020 .private
217 -rw- 35741420 20:15:16 Apr 01 2020 asdm.bin
805306554 -rw- 0 08:13:19 Sep 27 2020 coredumpfsysimage.bin
2 drwx 4096 02:38:46 Sep 07 2020 coredumpfsys
538294939 drwx 21 08:14:15 Sep 27 2020 smart-log
805309474 drw- 25 08:14:32 Sep 27 2020 coredumpinfo
2 drwx 4096 02:38:46 Sep 07 2020 cores
538294937 drwx 6 08:13:18 Sep 27 2020 fxos
268435721 -rw- 1462 08:13:18 Sep 27 2020 cspCfg.xml
3 file(s) total size: 35742882 bytes
16106127360 bytes total (15797760000 bytes free/98% free)
ciscoasa# ping 192.168.1.10 // ENSURE TFTP/FTP SERVER IS REACHABLE
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.10, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms
ciscoasa# copy tftp://192.168.1.10/cisco-ftd-fp1k.6.5.0-115.SPA disk0:
Address or name of remote host [192.168.1.10]?
Source filename [cisco-ftd-fp1k.6.5.0-115.SPA]?
Destination filename [cisco-ftd-fp1k.6.5.0-115.SPA]?
Accessing tftp://192.168.1.10/cisco-ftd-fp1k.6.5.0-115.SPA...!!!!!!!!!!!!!!!!!!!!!!!!!!!
<OUTPUT TRUNCATED>
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Verifying file disk0:/cisco-ftd-fp1k.6.5.0-115.SPA...
Writing file disk0:/cisco-ftd-fp1k.6.5.0-115.SPA...
1055923072 bytes copied in 607.740 secs (1739576 bytes/sec)
ciscoasa# dir
Directory of disk0:/
203 drwx 72 08:14:14 Sep 27 2020 log
268435725 drwx 4096 08:28:18 Sep 27 2020 .private
217 -rw- 35741420 20:15:16 Apr 01 2020 asdm.bin
805306554 -rw- 0 08:13:19 Sep 27 2020 coredumpfsysimage.bin
2 drwx 4096 02:38:46 Sep 07 2020 coredumpfsys
538294939 drwx 21 08:14:15 Sep 27 2020 smart-log
805309474 drw- 25 08:14:32 Sep 27 2020 coredumpinfo
2 drwx 4096 02:38:46 Sep 07 2020 cores
538294937 drwx 6 08:13:18 Sep 27 2020 fxos
268435721 -rw- 1462 08:13:18 Sep 27 2020 cspCfg.xml
805309488 -rwx 1055923072 00:24:18 Oct 03 2020 cisco-ftd-fp1k.6.5.0-115.SPA
4 file(s) total size: 1091665954 bytes
16106127360 bytes total (14741835776 bytes free/91% free)
Configure the ASA to boot the downloaded FTD image.
ciscoasa# configure terminal
ciscoasa(config)#
***************************** NOTICE *****************************
Help to improve the ASA platform by enabling anonymous reporting,
which allows Cisco to securely receive minimal error and health
information from the device. To learn more about this feature,
please visit: http://www.cisco.com/go/smartcall
Would you like to enable anonymous error reporting to help improve
the product? [Y]es, [N]o, [A]sk later:
ciscoasa(config)# boot system disk0:/cisco-ftd-fp1k.6.5.0-115.SPA // AUTO INSTALL FTD OS AFTER PRESSING ENTER
The system is currently installed with security software package 9.14.1, which has:
- The platform version: 2.8.1.105
- The CSP (asa) version: 9.14.1
Preparing new image for install...
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Image download complete (Successful unpack the image).
Attention:
If you proceed, the system will be re-imaged and then reboot automatically.
All existing configuration will be lost and the default configuration will be applied.
Installation of version 6.5.0-115 will do the following:
- upgrade to the new platform version 2.7.1.107
- upgrade to the CSP FTD version 6.5.0-115
Do you want to proceed? [confirm] <ENTER>
Finalizing image install process...
Install_status: ready....
Install_status: validating-images............................................
Install_status: upgrading-system..(®+‘…ÍÑmessage from root@firepower-1010 (Sat Oct 3 01:02:28 Stopping all devices.
device busy
Stopping OpenBSD Secure Shell server: sshd
stopped /usr/sbin/sshd (pid 11545)
done.
Stopping Advanced Configuration and Power Interface daemon: stopped /usr/sbin/acpid (pid 1988)
acpid.
Stopping system message bus: dbus.
stopping mountd: done
stopping nfsd: done
Stopping ntpd: stopped process in pidfile '/var/run/ntp.pid' (pid 22501)
done
Stopping random number generator daemon.
Stopping internet superserver: xinetd.
stopping statd: done
Failed to stop kdump!
Stopping crond: OK
Stopping rpcbind daemon...
not running.
Stopping fan control daemon: fancontrol... no process in pidfile '/var/run/fancontrol.pid' found; none killed
done.
Stopping sensors logging daemon: sensord... stopped /usr/sbin/sensord (pid 4043)
done.
Deconfiguring network interfaces... done.
ip6tables: Setting chains to policy ACCEPT: filter [ OK ]
ip6tables: Flushing firewall rules: [ OK ]
ip6tables: Unloading modules: [ OK ]
iptables: Setting chains to policy ACCEPT: filter raw [ OK ]
iptables: Flushing firewall rules: [ OK ]
iptables: Unloading modules: [ OK ]
Sat Oct 3 01:02:31 UTC 2020
SSP-Security-Module is shutting down ...
Sat Oct 3 01:02:31 UTC 2020 SHUTDOWN WARNING: Beginning System Shutdown request for CSP Apps
Sat Oct 3 01:02:31 UTC 2020 SHUTDOWN WARNING: Continue System Shutdown request for CSP Apps
/bin/ls: cannot access /opt/cisco/config/heimdall/etc: No such file or directory
/bin/ls: cannot access /opt/cisco/csp/applications/configs: No such file or directory
ls: cannot access /opt/cisco/config/heimdall/etc: No such file or directory
Sat Oct 3 01:02:31 UTC 2020 SHUTDOWN WARNING: Nothing to do for Apps-Services-Down
Sat Oct 3 01:02:31 UTC 2020
FPR-1xxx platform rebooting ...
Note: SIGKILL_ALL will be triggered after after 0 + 2 secs ...
Sat Oct 3 01:02:32 UTC 2020
Sending ALL processes the KILL signal ...
Error: poshd was not running... Starting ...
Sat Oct 3 01:02:33 UTC 2020
Deactivating swap...
Unmounting local filesystems...
Rebooting... [ 3915.645843] reboot: Restarting system // FTD WILL AUTO REBOOT
*******************************************************************************
Cisco System ROMMON, Version 1.0.08, RELEASE SOFTWARE
Copyright (c) 1994-2019 by Cisco Systems, Inc.
Compiled Mon 06/17/2019 15:54:21.43 by builder
*******************************************************************************
Current image running: Boot ROM1
Last reset cause: ResetRequest (0x00001000)
DIMM0 : Present
Platform FPR-1010 with 8192 MBytes of main memory
BIOS has been successfully locked !!
MAC Address: 5c:5a:c7:b8:f7:80
Use BREAK or ESC to interrupt boot.
Use SPACE to begin boot immediately.
Boot in 4 seconds.
Use SPACE to begin boot immediately.
Located .boot_string
Image size 59 inode num 16, bks cnt 1 blk size 8*512
Attempt autoboot: "boot disk0:installables/switch/fxos-k8-fp1k-lfbff.2.7.1.107.SPA"
Located installables/switch/fxos-k8-fp1k-lfbff.2.7.1.107.SPA
Image size 176580624 inode num 114030, bks cnt 43111 blk size 8*512
#####################################################################
<OUTPUT TRUNCATED>
#####################################################################
+-------------------------------------------------------------------+
+------------------------- SUCCESS ---------------------------------+
+-------------------------------------------------------------------+
| |
| LFBFF signature authentication passed !!! |
| |
+-------------------------------------------------------------------+
LFBFF signature verified.
+-------------------------------------------------------------------+
+------------------------- SUCCESS ---------------------------------+
+-------------------------------------------------------------------+
| |
| LFBFF controller type check passed !!! |
| |
+-------------------------------------------------------------------+
Linux version: 4.1.21-WR8.0.0.25_standard (builders@sjc-releng14) #1 SMP Sat Sep 21 10:25:19 PDT 2019
kernel_image = 0x73bf3c58, kernel_size=0x50abd0
Image validated
INIT: version 2.88 booting
Starting udev
Configuring network interfaces... done.
Populating dev cache
Primary SSD discovered
fsck from util-linux 2.26.2
[/sbin/fsck.ext3 (1) -- /dev/sda1] fsck.ext3 -a /dev/sda1
/dev/sda1: clean, 8743/488640 files, 758579/1953024 blocks
fsck(/dev/sda1) returned 0
fsck from util-linux 2.26.2
[/sbin/fsck.ext3 (1) -- /dev/sda2] fsck.ext3 -a /dev/sda2
/dev/sda2: clean, 12/61056 files, 8242/244224 blocks
fsck(/dev/sda2) returned 0
fsck from util-linux 2.26.2
[/sbin/fsck.ext3 (1) -- /dev/sda3] fsck.ext3 -a /dev/sda3
/dev/sda3: clean, 14/61056 files, 8244/244224 blocks
fsck(/dev/sda3) returned 0
fsck from util-linux 2.26.2
[/sbin/fsck.ext3 (1) -- /dev/sda4] fsck.ext3 -a /dev/sda4
/dev/sda4: clean, 12/1831424 files, 158992/7324160 blocks
fsck(/dev/sda4) returned 0
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
FIPS POST Test Script
NOTICE: The FIPS POST is not run because the FIPS feature is not enabled
Running postinst /etc/rpm-postinsts/100-dnsmasq...
Running postinst /etc/rpm-postinsts/101-dnsmasq...
INIT: Entering runlevel: 3
Starting system message bus: dbus.
Stopping all devices.
Starting all devices.
Processing /etc/c3xxx_dev0.conf
Checking status of all devices.
There is 1 QAT acceleration device(s) in the system:
qat_dev0 - type: c3xxx, inst_id: 0, node_id: 0, bsf: 01:00.0, #accel: 3 #engines: 6 state: up
ip6tables: Applying firewall rules: [ OK ]
iptables: Applying firewall rules: [ OK ]
Starting OpenBSD Secure Shell server: sshd
generating ssh ed25519 key...
done.
Starting rpcbind daemon...done.
starting statd: done
Starting Advanced Configuration and Power Interface daemon: acpid: starting up with netlink and the input layer
acpid.
acpid: 1 rule loaded
acpid: waiting for events: event logging is off
starting 8 nfsd kernel threads: done
starting mountd: done
Starting ntpd: done
Starting random number generator daemonUnable to open file: /dev/tpm0
.
Starting internet superserver: xinetd.
No makedumpfile found.
Starting fan control daemon: fancontrol... done.
INFO: in validating image ...
INFO: manager_validate_image: fxmgr_absfilename /mnt/boot/installables/switch/fxos-k9-manager.2.7.1.107.SPA
INFO: Validating image /mnt/boot/installables/switch/fxos-k9-manager.2.7.1.107.SPA signature ...
: File /mnt/boot/installables/switch/fxos-k9-manager.2.7.1.107.SPA size 26368896
Done!
Computed Hash SHA2: 1434b368fd187e7dd366e44b8e9d382c
7ef4d0e803ca4c6eadd510f4ee7213f7
de1b8ffa2bba0722ccb1e5dca1665803
2902019adf38b942babec942329cfd54
Embedded Hash SHA2: 1434b368fd187e7dd366e44b8e9d382c
7ef4d0e803ca4c6eadd510f4ee7213f7
de1b8ffa2bba0722ccb1e5dca1665803
2902019adf38b942babec942329cfd54
The digital signature of the file: fxos-k9-manager.2.7.1.107.SPA verified successfully
INFO: beginning of manager_install
INFO: manager_install: fxmgr=/mnt/boot/installables/switch/fxos-k9-manager.2.7.1.107.SPA chmgr= update=false
INFO: Creating directory /tmp/fxmgr
INFO: /bin/tar -xvzf /tmp/fxmgr/fxos-kp-manager.2.7.1.107.tgz ...
INFO: manager_install: shutting down the old version ...
INFO: Terminating DME and all AGs ...
INFO: --
INFO: manager_install: Unlinking a old libraries ...
INFO: manager_install: Deleting the old manager image ...
INFO: manager_install: Installing the new image ...
INFO: deleting unnecessary xml file..!!
INFO: deleted unnecessary xml file..!!
INFO: manager_post_install ...
INFO: manager_post_install: fxmgr=/mnt/boot/installables/switch/fxos-k9-manager.2.7.1.107.SPA chmgr= update=false
INFO: manager_post_install: Linking libraries ...
INFO: manager_post_install: Linking binaries ...
Completed system initial setup.
INFO: Trying to add iptables and ip6tables rules ...
INFO: Set up Application Diagnostic Interface ...
INFO: Configure management interface ...
Firepower 1xxx platform..
RTNETLINK answers: File exists
RTNETLINK answers: File exists
Assigning ip to eth0 in FPR-1xxx platform
ERROR: interface management0 is not ready after waiting for 60 seconds.
Current link status: [19: management0: <NO-CARRIER,BROADCAST,MULTICAST,PROMISC,UP> mtu 1500 qdisc noqueue state DOWN mode DEFAULT group default \ link/ether 5c:5a:c7:b8:f7:80 brd ff:ff:ff:ff:ff:ff]
INFO: Configure rmu interface ...
Bring up rmu and swp1-swp10 switch interfaces
create and bringup lldp sub-interface on lldp-swp7, lldp-swp8
create and bringup lacp and mgmt sub-interface on (lacp-swp1 to lacp-swp8), (mgmt-swp1 to mgmt-swp8)
Stopping rpcbind daemon...
done.
stopping mountd: done
stopping nfsd: .done
INFO: Configure system files ...
INFO: System Name is: firepower-1010
Starting sensors logging daemon: sensord... done.
INFO: console : ttyS0, speed : 9600
INFO: manager_startup: setting up fxmgr apache ...
INFO: manager_startup: Start manager httpd setup...
INFO: manager_startup: /opt/cisco/config/certstore/default.key not found on platform, re-generating files
INFO: manager_startup: reset httpd app config to default
httpdRegister INFO: [httpd.3886 -4 192.168.45.45 -n localhost]
httpdRegister INFO: Starting httpd setup/registration...
httpdRegister INFO: Completed httpd setup/registration!
INFO: httpdRegister [httpd.3886 script exit]
INFO: manager_startup: Completed manager httpd setup!
Starting crond: OK
INFO: System Disk /dev/sda present. Status: Operable.
firepower-1010 login:
Waiting for Application infrastructure to be ready...
Verifying the signature of the Application image...
Creating FXOS swap file ...
Oct 3 01:05:46 firepower-1010 FPRM: <<%FPRM-2-DEFAULT_INFRA_VERSION_MISSING>> [F1309][critical][default-infra-version-missing][org-root/fw-infra-pack-default] Bundle version in firmware package is empty, need to re-install
Oct 3 01:05:49 firepower-1010 port-manager: Alert: Internal1/2 link changed to UP
Oct 3 01:05:49 firepower-1010 port-manager: Alert: Internal1/1 link changed to UP
Oct 3 01:06:19 firepower-1010 port-manager: Alert: Ethernet1/2 link changed to UP
Oct 3 01:06:20 firepower-1010 port-manager: Alert: Ethernet1/2 link changed to DOWN
Oct 3 01:06:23 firepower-1010 port-manager: Alert: Ethernet1/2 link changed to UP
Oct 3 01:07:15 firepower-1010 FPRM: <<%FPRM-2-DEFAULT_INFRA_VERSION_MISSING>> [F1309][cleared][default-infra-version-missing][org-root/fw-infra-pack-default] Bundle version in firmware package is empty, need to re-install
Oct 3 01:09:20 firepower-1010 port-manager: Alert: Ethernet1/2 link changed to DOWN
Threat Defense System: CMD=-install, CSP-ID=cisco-ftd.6.5.0.115__ftd_001_JMX2324G1THBG7ZUP1, FLAG=''
System begins installation ...
Cisco FTD installation finished successfully.
Verifying signature for cisco-ftd.6.5.0.115 ...
Verifying signature for cisco-ftd.6.5.0.115 ... success
Threat Defense System: CMD=-start, CSP-ID=cisco-ftd.6.5.0.115__ftd_001_JMX2324G1THBG7ZUP1, FLAG=''
System starting ...
Registering to process manager ...
Cisco FTD started successfully.
Cisco FTD initializing ...
Verify FSIC, File System Integrity Check
Configuring model to 78A...
Obtained uid 501 and gid 501 for external user
verify_fsic(start)
Do not run FSIC twice for SSP systems...
Initializing Threat Defense ... [ OK ]
Starting system log daemon... [ OK ]
Disk free check passed, creating swap...
Building swapfile /ngfw/Volume/.swaptwo of size 5494382kb
5494382+0 records in
5494382+0 records out
5626247168 bytes (5.6 GB) copied, 19.6011 s, 287 MB/s
Setting up swapspace version 1, size = 5.2 GiB (5626241024 bytes)
no label, UUID=4388fe75-ad4e-4747-a9e9-459db271b723
Adding swapfile /ngfw/Volume/.swaptwo
Flushing all current IPv4 rules and user defined chains: ...success
Clearing all current IPv4 rules and user defined chains: ...success
Applying iptables firewall rules:
Flushing chain `PREROUTING'
Flushing chain `INPUT'
Flushing chain `FORWARD'
Flushing chain `OUTPUT'
Flushing chain `POSTROUTING'
Flushing chain `INPUT'
Flushing chain `FORWARD'
Flushing chain `OUTPUT'
Applying rules successed
Flushing all current IPv6 rules and user defined chains: ...success
Clearing all current IPv6 rules and user defined chains: ...success
Applying ip6tables firewall rules:
Flushing chain `PREROUTING'
Flushing chain `INPUT'
Flushing chain `FORWARD'
Flushing chain `OUTPUT'
Flushing chain `POSTROUTING'
Flushing chain `INPUT'
Flushing chain `FORWARD'
Flushing chain `OUTPUT'
Applying rules successed
Starting nscd... [ OK ]
Starting , please wait......complete.
cleaning up *.TMM and *.TMD files
Firstboot detected, executing scripts
Executing S01virtual-machine-reconfigure [ OK ]
Executing S01z_copy_startup-config [ OK ]
Executing S02aws-pull-cfg [ OK ]
Executing S02configure_onbox [ OK ]
Executing S03generate_db_access.sh [ OK ]
Executing S04fix-httpd.sh [ OK ]
Executing S05set-default-ipv4.pl [ OK ]
Executing S06addusers [ OK ]
Executing S07uuid-init [ OK ]
Executing S08configure_mysql [ OK ]
************ Attention *********
Initializing the configuration database. Depending on available
system resources (CPU, memory, and disk), this may take 30 minutes
or more to complete.
************ Attention *********
Executing S09database-init [ OK ]
Executing S11database-populate [ OK ]
Executing S12install_infodb [ OK ]
Executing S15set-locale.sh [ OK ]
Executing S16update-sensor.pl [ OK ]
Executing S19cert-tun-init [ OK ]
Executing S20cert-init [ OK ]
Executing S21disable_estreamer [ OK ]
Executing S25create_default_des.pl [ OK ]
Executing S30init_lights_out_mgmt.pl [ OK ]
Executing S33azure-waagent [ OK ]
Executing S40install_default_filters.pl [ OK ]
Executing S41install_default_app_filters.pl [ OK ]
Executing S43install_default_report_templates.pl [ OK ]
Executing S44install_analysis_objects.pl [ OK ]
Executing S45install_default_realms.pl [ OK ]
Executing S47install_default_sandbox_EO.pl [ OK ]
Executing S50install-remediation-modules [ OK ]
Executing S51install_health_policy.pl [ OK ]
Executing S52install_system_policy.pl [ OK ]
Executing S53change_reconciliation_baseline.pl [ OK ]
Executing S70remove_casuser.pl [ OK ]
Executing S70update_sensor_objects.sh [ OK ]
Executing S85patch_history-init [ OK ]
Executing S96grow_var.sh [ OK ]
Executing S96install_vmware_tools.pl [ OK ]
********** Attention **********
Initializing the system's localization settings. Depending on available
system resources (CPU, memory, and disk), this may take 10 minutes
or more to complete.
********** Attention **********
Executing S96localize-templates [ OK ]
Executing S96ovf-data.pl [ OK ]
Executing S97compress-client-resources [ OK ]
Executing S97create_platinum_forms.pl [ OK ]
Executing S97install_cas [ OK ]
Executing S97install_cloud_support.pl [ OK ]
Executing S97install_geolocation.pl [ OK ]
Executing S97install_ssl_inspection.pl [ OK ]
Executing S97update_modprobe.pl [ OK ]
Executing S98check-db-integrity.sh [ OK ]
Executing S98htaccess-init [ OK ]
Executing S99configure_mysql [ OK ]
Executing S99correct_ipmi.pl [ OK ]
Executing S99ngfw_onbox [ OK ]
Executing S99ssl_hw_mode.sh [ OK ]
Executing S99start-system [ OK ]
Executing S99z_db_restore [ OK ]
Firstboot scripts finished.
Configuring NTP... [ OK ]
Stopping all devices.
Starting all devices.
Processing /etc/c3xxx_dev0.conf
Checking status of all devices.
There is 1 QAT acceleration device(s) in the system:
qat_dev0 - type: c3xxx, inst_id: 0, node_id: 0, bsf: 01:00.0, #accel: 3 #engines: 6 state: up
SIOCSIFADDR: No such device
br0: ERROR while getting interface flags: No such device
SIOCSIFNETMASK: No such device
br0: ERROR while getting interface flags: No such device
Model reconfigure detected, executing scripts
Pinging mysql
Found mysql is running
Executing 45update-sensor.pl [ OK ]
Executing 55recalculate_arc.pl [ OK ]
Sat Oct 3 01:27:33 UTC 2020
Starting MySQL...
Pinging mysql
Pinging mysql, try 1
Found mysql is running
Running initializeObjects...
Stopping MySQL...
Killing mysqld with pid 14511
Wait for mysqld to exit\c
done
Sat Oct 3 01:27:44 UTC 2020
Skipping sfifd for this platform...
Starting Cisco Firepower 1010 Threat Defense, please wait...No PM running!
...started.
Cisco FTD initialization finished successfully.
memif is not enabled.
IO Memory Nodes: 1
IO Memory Per Node: 549453824 bytes num_pages = 134144 page_size = 4096
Global Reserve Memory Per Node: 786432000 bytes Nodes=1
LCMB: got 1073741824 bytes on numa-id=0, phys=0x200000000, virt=0x2b8c80000000
LCMB: HEAP-CACHE POOL got 782237696 bytes on numa-id=0, virt=0x2b8cc0000000
total mem 2948718463 system 8394874880 kernel 11037767 image 111086672
new 2948718463 old 660540496 reserve 1855979520 priv new 1103776710 priv old 0
Processor memory: 2948718463
POST started...
POST finished, result is 0 (hint: 1 means it failed)
Compiled on Thu 19-Sep-19 17:23 PDT by builders
SSL Hardware Offload is Enabled
Snort trust pinhole is NOT Enabled
FPR-1010 platform
Total NICs found: 6
x550em_kr rev 0x11 10 Gigabit Ethernet, index 00 MAC: 00a0.c900.0000
en_vtun rev00 Backplane Ext-Mgmt Interface @ index 02 MAC: 5c5a.c7b8.f781
en_vtun rev00 Backplane Tap Interface @ index 03 MAC: 0000.0100.0001
en_vtun rev00 Backplane Control Interface @ index 05 MAC: 0000.0300.0101
WARNING: Attribute already exists in the dictionary.
License mode file was not found. Assuming this is the initial bootup. Setting the license mode to Smart Licensing.
INFO: Unable to read firewall mode from flash
Writing default firewall mode (single) to flash
INFO: Unable to read cluster interface-mode from flash
Writing default mode "None" to flash
*** Intel QAT Crypto on-board accelerator detected
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
Encryption hardware device : Cisco FP Crypto on-board accelerator (revision 0x11)
Driver version : 4.1.0
****************************** Warning *******************************
This product contains cryptographic features and is
subject to United States and local country laws
governing, import, export, transfer, and use.
Delivery of Cisco cryptographic products does not
imply third-party authority to import, export,
distribute, or use encryption. Importers, exporters,
distributors and users are responsible for compliance
with U.S. and local country laws. By using this
product you agree to comply with applicable laws and
regulations. If you are unable to comply with U.S.
and local laws, return the enclosed items immediately.
A summary of U.S. laws governing Cisco cryptographic
products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by
sending email to export@cisco.com.
******************************* Warning *******************************
Copyright (c) 1996-2017 by Cisco Systems, Inc.
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Error No such device in set_linux_mac_address: Failed to assign MAC address for br0
Reading from flash...
!
Cryptochecksum (changed): 6929aede 6646bb60 e7c2f077 d48e4bc9
INFO: Power-On Self-Test in process.
.......................................................................
INFO: Power-On Self-Test complete.
INFO: Starting SW-DRBG health test...
INFO: SW-DRBG health test passed.
M_MMAP_THRESHOLD 65536, M_MMAP_MAX 44993
User enable_1 logged in to firepower
Logins over the last 1 days: 1.
Failed logins since the last login: 0.
Type help o '?' for a list of availabl¥+¹‘͹
firepower>
firepower login:
The ASA to FTD reimage completed around 35 minutes. I've assigned my laptop with a static IP 192.168.45.10/24 and HTTPS to 192.168.45.45 (FTD default Management IP address).
firepower login: admin
Password: <Admin123> // FTD DEFAULT PASSWORD
Successful login attempts for user 'admin' : 1
Copyright 2004-2019, Cisco and/or its affiliates. All rights reserved.
Cisco is a registered trademark of Cisco Systems, Inc.
All other trademarks are property of their respective owners.
Cisco Fire Linux OS v6.5.0 (build 4)
Cisco Firepower 1010 Threat Defense v6.5.0 (build 115)
Cisco Firepower Extensible Operating System (FX-OS) Software
TAC support: http://www.cisco.com/tac
Copyright (c) 2009-2019, Cisco Systems, Inc. All rights reserved.
The copyrights to certain works contained in this software are
owned by other third parties and used and distributed under
license.
Certain components of this software are licensed under the "GNU General Public
License, version 3" provided with ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html. See User Manual (''Licensing'') for
details.
Certain components of this software are licensed under the "GNU General Public
License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html. See User Manual
(''Licensing'') for details.
Certain components of this software are licensed under the "GNU LESSER GENERAL
PUBLIC LICENSE, version 3" provided with ABSOLUTELY NO WARRANTY under the terms
of "GNU LESSER GENERAL PUBLIC LICENSE" Version 3", available here:
http://www.gnu.org/licenses/lgpl.html. See User Manual (''Licensing'') for
details.
Certain components of this software are licensed under the "GNU Lesser General
Public License, version 2.1" provided with ABSOLUTELY NO WARRANTY under the
terms of "GNU Lesser General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html. See User Manual
(''Licensing'') for details.
Certain components of this software are licensed under the "GNU Library General
Public License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms
of "GNU Library General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html. See User Manual
(''Licensing'') for details.
firepower# connect ftd
You must accept the EULA to continue.
Press <ENTER> to display the EULA: <ENTER>
End User License Agreement
Effective: May 22, 2017
This is an agreement between You and Cisco Systems, Inc. or its affiliates
("Cisco") and governs your Use of Cisco Software. "You" and "Your" means the
individual or legal entity licensing the Software under this EULA. "Use" or
"Using" means to download, install, activate, access or otherwise use the
Software. "Software" means the Cisco computer programs and any Upgrades made
available to You by an Approved Source and licensed to You by Cisco.
"Documentation" is the Cisco user or technical manuals, training materials,
specifications or other documentation applicable to the Software and made
available to You by an Approved Source. "Approved Source" means (i) Cisco or
(ii) the Cisco authorized reseller, distributor or systems integrator from whom
you acquired the Software. "Entitlement" means the license detail; including
license metric, duration, and quantity provided in a product ID (PID) published
on Cisco's price list, claim certificate or right to use notification.
"Upgrades" means all updates, upgrades, bug fixes, error corrections,
enhancements and other modifications to the Software and backup copies thereof.
This agreement, any supplemental license terms and any specific product terms
at www.cisco.com/go/softwareterms (collectively, the "EULA") govern Your Use of
the Software.
1. Acceptance of Terms. By Using the Software, You agree to be bound by the
terms of the EULA. If you are entering into this EULA on behalf of an entity,
you represent that you have authority to bind that entity. If you do not have
such authority or you do not agree to the terms of the EULA, neither you nor
the entity may Use the Software and it may be returned to the Approved Source
for a refund within thirty (30) days of the date you acquired the Software or
Cisco product. Your right to return and refund applies only if you are the
original end user licensee of the Software.
2. License. Subject to payment of the applicable fees and compliance with this
EULA, Cisco grants You a limited, non-exclusive and non-transferable license to
Use object code versions of the Software and the Documentation solely for Your
internal operations and in accordance with the Entitlement and the
Documentation. Cisco licenses You the right to Use only the Software You
acquire from an Approved Source. Unless contrary to applicable law, You are not
licensed to Use the Software on secondhand or refurbished Cisco equipment not
authorized by Cisco, or on Cisco equipment not purchased through an Approved
Source. In the event that Cisco requires You to register as an end user, Your
license is valid only if the registration is complete and accurate. The
Software may contain open source software, subject to separate license terms
made available with the Cisco Software or Documentation.
If the Software is licensed for a specified term, Your license is valid solely
for the applicable term in the Entitlement. Your right to Use the Software
begins on the date the Software is made available for download or installation
and continues until the end of the specified term, unless otherwise terminated
in accordance with this Agreement.
3. Evaluation License. If You license the Software or receive Cisco product(s)
for evaluation purposes or other limited, temporary use as authorized by Cisco
("Evaluation Product"), Your Use of the Evaluation Product is only permitted
for the period limited by the license key or otherwise stated by Cisco in
writing. If no evaluation period is identified by the license key or in
writing, then the evaluation license is valid for thirty (30) days from the
date the Software or Cisco product is made available to You. You will be
invoiced for the list price of the Evaluation Product if You fail to return or
stop Using it by the end of the evaluation period. The Evaluation Product is
licensed "AS-IS" without support or warranty of any kind, expressed or implied.
Cisco does not assume any liability arising from any use of the Evaluation
Product. You may not publish any results of benchmark tests run on the
Evaluation Product without first obtaining written approval from Cisco. You
authorize Cisco to use any feedback or ideas You provide Cisco in connection
with Your Use of the Evaluation Product.
4. Ownership. Cisco or its licensors retain ownership of all intellectual
property rights in and to the Software, including copies, improvements,
enhancements, derivative works and modifications thereof. Your rights to Use
the Software are limited to those expressly granted by this EULA. No other
rights with respect to the Software or any related intellectual property rights
are granted or implied.
5. Limitations and Restrictions. You will not and will not allow a third party
to:
a. transfer, sublicense, or assign Your rights under this license to any other
person or entity (except as expressly provided in Section 12 below), unless
expressly authorized by Cisco in writing;
b. modify, adapt or create derivative works of the Software or Documentation;
c. reverse engineer, decompile, decrypt, disassemble or otherwise attempt to
derive the source code for the Software, except as provided in Section 16
below;
d. make the functionality of the Software available to third parties, whether
as an application service provider, or on a rental, service bureau, cloud
service, hosted service, or other similar basis unless expressly authorized by
Cisco in writing;
e. Use Software that is licensed for a specific device, whether physical or
virtual, on another device, unless expressly authorized by Cisco in writing; or
f. remove, modify, or conceal any product identification, copyright,
proprietary, intellectual property notices or other marks on or within the
Software.
6. Third Party Use of Software. You may permit a third party to Use the
Software licensed to You under this EULA if such Use is solely (i) on Your
behalf, (ii) for Your internal operations, and (iii) in compliance with this
EULA. You agree that you are liable for any breach of this EULA by that third
party.
7. Limited Warranty and Disclaimer.
a. Limited Warranty. Cisco warrants that the Software will substantially
conform to the applicable Documentation for the longer of (i) ninety (90) days
following the date the Software is made available to You for your Use or (ii)
as otherwise set forth at www.cisco.com/go/warranty. This warranty does not
apply if the Software, Cisco product or any other equipment upon which the
Software is authorized to be used: (i) has been altered, except by Cisco or its
authorized representative, (ii) has not been installed, operated, repaired, or
maintained in accordance with instructions supplied by Cisco, (iii) has been
subjected to abnormal physical or electrical stress, abnormal environmental
conditions, misuse, negligence, or accident; (iv) is licensed for beta,
evaluation, testing or demonstration purposes or other circumstances for which
the Approved Source does not receive a payment of a purchase price or license
fee; or (v) has not been provided by an Approved Source. Cisco will use
commercially reasonable efforts to deliver to You Software free from any
viruses, programs, or programming devices designed to modify, delete, damage or
disable the Software or Your data.
b. Exclusive Remedy. At Cisco's option and expense, Cisco shall repair,
replace, or cause the refund of the license fees paid for the non-conforming
Software. This remedy is conditioned on You reporting the non-conformance in
writing to Your Approved Source within the warranty period. The Approved Source
may ask You to return the Software, the Cisco product, and/or Documentation as
a condition of this remedy. This Section is Your exclusive remedy under the
warranty.
c. Disclaimer.
Except as expressly set forth above, Cisco and its licensors provide Software
"as is" and expressly disclaim all warranties, conditions or other terms,
whether express, implied or statutory, including without limitation,
warranties, conditions or other terms regarding merchantability, fitness for a
particular purpose, design, condition, capacity, performance, title, and
non-infringement. Cisco does not warrant that the Software will operate
uninterrupted or error-free or that all errors will be corrected. In addition,
Cisco does not warrant that the Software or any equipment, system or network on
which the Software is used will be free of vulnerability to intrusion or
attack.
8. Limitations and Exclusions of Liability. In no event will Cisco or its
licensors be liable for the following, regardless of the theory of liability or
whether arising out of the use or inability to use the Software or otherwise,
even if a party been advised of the possibility of such damages: (a) indirect,
incidental, exemplary, special or consequential damages; (b) loss or corruption
of data or interrupted or loss of business; or (c) loss of revenue, profits,
goodwill or anticipated sales or savings. All liability of Cisco, its
affiliates, officers, directors, employees, agents, suppliers and licensors
collectively, to You, whether based in warranty, contract, tort (including
negligence), or otherwise, shall not exceed the license fees paid by You to any
Approved Source for the Software that gave rise to the claim. This limitation
of liability for Software is cumulative and not per incident. Nothing in this
Agreement limits or excludes any liability that cannot be limited or excluded
under applicable law.
9. Upgrades and Additional Copies of Software. Notwithstanding any other
provision of this EULA, You are not permitted to Use Upgrades unless You, at
the time of acquiring such Upgrade:
a. already hold a valid license to the original version of the Software, are in
compliance with such license, and have paid the applicable fee for the Upgrade;
and
b. limit Your Use of Upgrades or copies to Use on devices You own or lease; and
c. unless otherwise provided in the Documentation, make and Use additional
copies solely for backup purposes, where backup is limited to archiving for
restoration purposes.
10. Audit. During the license term for the Software and for a period of three
(3) years after its expiration or termination, You will take reasonable steps
to maintain complete and accurate records of Your use of the Software
sufficient to verify compliance with this EULA. No more than once per twelve
(12) month period, You will allow Cisco and its auditors the right to examine
such records and any applicable books, systems (including Cisco product(s) or
other equipment), and accounts, upon reasonable advanced notice, during Your
normal business hours. If the audit discloses underpayment of license fees, You
will pay such license fees plus the reasonable cost of the audit within thirty
(30) days of receipt of written notice.
11. Term and Termination. This EULA shall remain effective until terminated or
until the expiration of the applicable license or subscription term. You may
terminate the EULA at any time by ceasing use of or destroying all copies of
Software. This EULA will immediately terminate if You breach its terms, or if
You fail to pay any portion of the applicable license fees and You fail to cure
that payment breach within thirty (30) days of notice. Upon termination of this
EULA, You shall destroy all copies of Software in Your possession or control.
12. Transferability. You may only transfer or assign these license rights to
another person or entity in compliance with the current Cisco
Relicensing/Transfer Policy (www.cisco.com/c/en/us/products/
cisco_software_transfer_relicensing_policy.html). Any attempted transfer or,
assignment not in compliance with the foregoing shall be void and of no effect.
13. US Government End Users. The Software and Documentation are "commercial
items," as defined at Federal Acquisition Regulation ("FAR") (48 C.F.R.) 2.101,
consisting of "commercial computer software" and "commercial computer software
documentation" as such terms are used in FAR 12.212. Consistent with FAR 12.211
(Technical Data) and FAR 12.212 (Computer Software) and Defense Federal
Acquisition Regulation Supplement ("DFAR") 227.7202-1 through 227.7202-4, and
notwithstanding any other FAR or other contractual clause to the contrary in
any agreement into which this EULA may be incorporated, Government end users
will acquire the Software and Documentation with only those rights set forth in
this EULA. Any license provisions that are inconsistent with federal
procurement regulations are not enforceable against the U.S. Government.
14. Export. Cisco Software, products, technology and services are subject to
local and extraterritorial export control laws and regulations. You and Cisco
each will comply with such laws and regulations governing use, export,
re-export, and transfer of Software, products and technology and will obtain
all required local and extraterritorial authorizations, permits or licenses.
Specific export information may be found at: tools.cisco.com/legal/export/pepd/
Search.do
15. Survival. Sections 4, 5, the warranty limitation in 7(a), 7(b) 7(c), 8, 10,
11, 13, 14, 15, 17 and 18 shall survive termination or expiration of this EULA.
16. Interoperability. To the extent required by applicable law, Cisco shall
provide You with the interface information needed to achieve interoperability
between the Software and another independently created program. Cisco will
provide this interface information at Your written request after you pay
Cisco's licensing fees (if any). You will keep this information in strict
confidence and strictly follow any applicable terms and conditions upon which
Cisco makes such information available.
17. Governing Law, Jurisdiction and Venue.
If You acquired the Software in a country or territory listed below, as
determined by reference to the address on the purchase order the Approved
Source accepted or, in the case of an Evaluation Product, the address where
Product is shipped, this table identifies the law that governs the EULA
(notwithstanding any conflict of laws provision) and the specific courts that
have exclusive jurisdiction over any claim arising under this EULA.
Country or Territory | Governing Law | Jurisdiction and Venue
=========================|=========================|===========================
United States, Latin | State of California, | Federal District Court,
America or the | United States of | Northern District of
Caribbean | America | California or Superior
| | Court of Santa Clara
| | County, California
-------------------------|-------------------------|---------------------------
Canada | Province of Ontario, | Courts of the Province of
| Canada | Ontario, Canada
-------------------------|-------------------------|---------------------------
Europe (excluding | Laws of England | English Courts
Italy), Middle East, | |
Africa, Asia or Oceania | |
(excluding Australia) | |
-------------------------|-------------------------|---------------------------
Japan | Laws of Japan | Tokyo District Court of
| | Japan
-------------------------|-------------------------|---------------------------
Australia | Laws of the State of | State and Federal Courts
| New South Wales | of New South Wales
-------------------------|-------------------------|---------------------------
Italy | Laws of Italy | Court of Milan
-------------------------|-------------------------|---------------------------
China | Laws of the People's | Hong Kong International
| Republic of China | Arbitration Center
-------------------------|-------------------------|---------------------------
All other countries or | State of California | State and Federal Courts
territories | | of California
-------------------------------------------------------------------------------
The parties specifically disclaim the application of the UN Convention on
Contracts for the International Sale of Goods. In addition, no person who is
not a party to the EULA shall be entitled to enforce or take the benefit of any
of its terms under the Contracts (Rights of Third Parties) Act 1999. Regardless
of the above governing law, either party may seek interim injunctive relief in
any court of appropriate jurisdiction with respect to any alleged breach of
such party's intellectual property or proprietary rights.
18. Integration. If any portion of this EULA is found to be void or
unenforceable, the remaining provisions of the EULA shall remain in full force
and effect. Except as expressly stated or as expressly amended in a signed
agreement, the EULA constitutes the entire agreement between the parties with
respect to the license of the Software and supersedes any conflicting or
additional terms contained in any purchase order or elsewhere, all of which
terms are excluded. The parties agree that the English version of the EULA will
govern in the event of a conflict between it and any version translated into
another language.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco
and/or its affiliates in the U.S. and other countries. To view a list of Cisco
trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks
mentioned are the property of their respective owners. The use of the word
partner does not imply a partnership relationship between Cisco and any other
company. (1110R)
Please enter 'YES' or press <ENTER> to AGREE to the EULA: <ENTER>
System initialization in progress. Please stand by.
You must configure the network to continue.
You must configure at least one of IPv4 or IPv6.
Do you want to configure IPv4? (y/n) [y]:
Do you want to configure IPv6? (y/n) [n]:
Configure IPv4 via DHCP or manually? (dhcp/manual) [manual]:
Enter an IPv4 address for the management interface [192.168.45.45]: 192.168.1.45
Enter an IPv4 netmask for the management interface [255.255.255.0]:
Enter the IPv4 default gateway for the management interface [data-interfaces]: 192.168.1.1
Enter a fully qualified hostname for this system [firepower]: fpr1010-lab
Enter a comma-separated list of DNS servers or 'none' [208.67.222.222,208.67.220.220]:
Enter a comma-separated list of search domains or 'none' []:
If your networking information has changed, you will need to reconnect.
Setting DNS servers: 208.67.222.222 208.67.220.220
No domain name specified to configure.
Setting hostname as fpr1010-lab
DHCP Server Disabled
Setting static IPv4: 192.168.1.45 netmask: 255.255.255.0 gateway: 192.168.1.1 on management0
Updating routing tables, please wait...
All configurations applied to the system. Took 3 Seconds.
Saving a copy of running network configuration to local disk.
For HTTP Proxy configuration, run 'configure network http-proxy'
Manage the device locally? (yes/no) [yes]: // HIT ENTER TO ACCESS FTD VIA FDM
Configuring firewall mode to routed
Update policy deployment information
- add device configuration
Successfully performed firstboot initial configuration steps for Firepower Device Manager for Firepower Threat Defense.
>
Re-login to FDM using the new Management IP address 192.168.1.45 and continue to the initial setup wizard.