<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cannot Register SFR Module to FMC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3785420#M1040068</link>
    <description>Yea, I've kind of just been coming back to this in spare time...&lt;BR /&gt;&lt;BR /&gt;Yes, the FMC does have 2 other SFR modules connected to it. Those SFR modules are located on the ASA Failover pair located in the same physical location as FMC, and on same Vlan.  Not that should make a difference, but thought I would mention it.&lt;BR /&gt;&lt;BR /&gt;Since I did have that SSD failure on that problem ASA a few weeks ago, is there anyway you could see the SSD being bad and that causing the issue? Even after doing re-image/re-install of SFR module, the same problem persisted...&lt;BR /&gt;&lt;BR /&gt;-Matt</description>
    <pubDate>Tue, 22 Jan 2019 19:41:26 GMT</pubDate>
    <dc:creator>Matthew Martin</dc:creator>
    <dc:date>2019-01-22T19:41:26Z</dc:date>
    <item>
      <title>Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767625#M1040047</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When attempting to Register a new SFR Module to our FMC I receive the message: &lt;EM&gt;"Could not establish a connection with device."&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FMC_Error.png" style="width: 565px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26579i8FBCEFCF725859FD/image-size/large?v=v2&amp;amp;px=999" role="button" title="FMC_Error.png" alt="FMC_Error.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I know for sure the reg key is correct and I am able to ping each device from the other without issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The FMC device is located in our HQ and the SFR Module is located across WAN in a DR location. Also, I had no problems registering 2 other SFR modules which were located in the same physical location as the FMC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried the &lt;STRONG&gt;"telnet &amp;lt;fmc_ipaddress&amp;gt; 8305"&lt;/STRONG&gt; command from the SFR Module to the FMC, and receive the following message:&lt;/P&gt;
&lt;PRE&gt;admin@ASASFR3:~$ telnet 192.168.2.20 8305
Trying 192.168.2.20...
telnet: connect to address 192.168.2.20: Connection refused
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Log from /var/log/messages shows:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE&gt;admin@ASASFR3:~$ tail -f /var/log/messages
Dec 20 22:35:26 ASASFR3 SF-IMS[11384]: [11401] sftunneld:tunnsockets [INFO] Accepted IPv4 connection from 192.168.2.20:55608/tcp
Dec 20 22:35:26 ASASFR3 SF-IMS[11384]: [17278] sftunneld:sf_ssl [INFO] Processing connection from 192.168.2.20:55608/tcp (socket 11)
Dec 20 22:35:33 ASASFR3 SF-IMS[11384]: [11402] sftunneld:sf_peers [INFO] Peer 192.168.2.20 needs a single connection
Dec 20 22:35:33 ASASFR3 SF-IMS[11384]: [11402] sftunneld:sf_connections [INFO] Start connection to : 192.168.2.20 (wait 44 seconds is up)
Dec 20 22:35:33 ASASFR3 SF-IMS[11384]: [17281] sftunneld:sf_peers [INFO] Peer 192.168.2.20 needs a single connection
Dec 20 22:35:33 ASASFR3 SF-IMS[11384]: [17281] sftunneld:sf_ssl [INFO] Connect to 192.168.2.20 on port 8305 - eth0
Dec 20 22:35:33 ASASFR3 SF-IMS[11384]: [17281] sftunneld:sf_ssl [INFO] Initiate IPv4 connection to 192.168.2.20 (via eth0)
Dec 20 22:35:33 ASASFR3 SF-IMS[11384]: [17281] sftunneld:sf_ssl [INFO] Initiating IPv4 connection to 192.168.2.20:8305/tcp
Dec 20 22:35:33 ASASFR3 SF-IMS[11384]: [17281] sftunneld:sf_ssl [INFO] Wait to connect to 8305 (IPv6): 192.168.2.20
Dec 20 22:35:33 ASASFR3 SF-IMS[11384]: [17281] sftunneld:sf_ssl [INFO] Connected to 192.168.2.20:8305 (IPv4)
Dec 20 22:37:10 ASASFR3 SF-IMS[25616]: [25616] CloudAgent:CloudAgent [INFO] IPRep, time to check for updates
Dec 20 22:37:10 ASASFR3 SF-IMS[25616]: [25616] CloudAgent:CloudAgent [INFO] ClamUpd, time to check for updates
Dec 20 22:37:56 ASASFR3 SF-IMS[11384]: [17278] sftunneld:sf_ssl [INFO] Wait SSL_accept_nb: TIMEOUT TO COMPLETE
Dec 20 22:37:56 ASASFR3 SF-IMS[11384]: [17278] sftunneld:sf_ssl [ERROR] Accept:SSL handshake failed
Dec 20 22:37:56 ASASFR3 SF-IMS[11384]: [17278] sftunneld:sf_ssl [WARN] SSL Verification status: ok
Dec 20 22:38:00 ASASFR3 SF-IMS[11384]: [11401] sftunneld:tunnsockets [INFO] Accepted IPv4 connection from 192.168.2.20:58792/tcp
Dec 20 22:38:00 ASASFR3 SF-IMS[11384]: [17403] sftunneld:sf_ssl [INFO] Processing connection from 192.168.2.20:58792/tcp (socket 11)
Dec 20 22:38:03 ASASFR3 SF-IMS[11384]: [17281] sftunneld:sf_ssl [INFO] Wait SSL_connect_nb: TIMEOUT TO COMPLETE
Dec 20 22:38:03 ASASFR3 SF-IMS[11384]: [17281] sftunneld:sf_ssl [ERROR] Connect:SSL handshake failed
Dec 20 22:38:03 ASASFR3 SF-IMS[11384]: [17281] sftunneld:sf_ssl [WARN] SSL Verification status: ok
Dec 20 22:38:03 ASASFR3 SF-IMS[11384]: [17281] sftunneld:sf_ssl [INFO] reconnect to peer '192.168.2.20' in 300 seconds
Dec 20 22:38:07 ASASFR3 SF-IMS[11384]: [11402] sftunneld:sf_peers [INFO] Peer 192.168.2.20 needs a single connection
Dec 20 22:38:07 ASASFR3 SF-IMS[11384]: [11402] sftunneld:sf_connections [INFO] Start connection to : 192.168.2.20 (wait 300 seconds is up)
Dec 20 22:38:07 ASASFR3 SF-IMS[11384]: [17408] sftunneld:sf_peers [INFO] Peer 192.168.2.20 needs a single connection
Dec 20 22:38:07 ASASFR3 SF-IMS[11384]: [17408] sftunneld:sf_ssl [INFO] Connect to 192.168.2.20 on port 8305 - eth0
Dec 20 22:38:07 ASASFR3 SF-IMS[11384]: [17408] sftunneld:sf_ssl [INFO] Initiate IPv4 connection to 192.168.2.20 (via eth0)
Dec 20 22:38:07 ASASFR3 SF-IMS[11384]: [17408] sftunneld:sf_ssl [INFO] Initiating IPv4 connection to 192.168.2.20:8305/tcp
Dec 20 22:38:07 ASASFR3 SF-IMS[11384]: [17408] sftunneld:sf_ssl [INFO] Wait to connect to 8305 (IPv6): 192.168.2.20
Dec 20 22:38:07 ASASFR3 SF-IMS[11384]: [17408] sftunneld:sf_ssl [INFO] Connected to 192.168.2.20:8305 (IPv4)
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas on what the issue could be here? I have rebooted the FMC as well as re-installed SFR module on the ASA and it didn't seem to help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any thoughts or suggestions would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in Advance,&lt;/P&gt;
&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:35:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767625#M1040047</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2020-02-21T16:35:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767632#M1040048</link>
      <description>&lt;P&gt;go into your firewall box ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and console to sfr&lt;/P&gt;&lt;P&gt;give this command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;configure manager delete &lt;/PRE&gt;&lt;P&gt;than again&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;configure manager add &amp;lt;FireSIGHT MC IP&amp;gt; &amp;lt;Registration Key&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;than try to register the sfr in FMC again.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Dec 2018 23:02:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767632#M1040048</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-12-20T23:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767634#M1040049</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've actually tried that a few different times now using different reg keys, but none made a difference.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again,&lt;/P&gt;
&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Thu, 20 Dec 2018 23:02:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767634#M1040049</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2018-12-20T23:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767636#M1040050</link>
      <description>&lt;P&gt;please could you confirm the ASA model no and ASA software, FMC software version and SFR version&lt;/P&gt;</description>
      <pubDate>Thu, 20 Dec 2018 23:04:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767636#M1040050</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-12-20T23:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767679#M1040051</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Check compatibility between FMC and firepower module. Most new ASA firewalls come with firepower 5.4 which is not compatible with FMC running&amp;nbsp; 6.x. You will need to upgrade the firepower module using ASDM to at least 6.1 and add to FMC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can see the compatibility list at the following url:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/compatibility/firepower-compatibility.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/compatibility/firepower-compatibility.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 03:02:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767679#M1040051</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2018-12-21T03:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767985#M1040052</link>
      <description>&lt;P&gt;&lt;STRONG&gt;ASA5515: &lt;/STRONG&gt;ASA 5515-X with SW, 6 GE Data, 1 GE Mgmt, AC&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ASA Version:&lt;/STRONG&gt; 9.4(4)20&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SFR Module: &lt;/STRONG&gt;6.2.3-83&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;FMC Server:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FMC.png" style="width: 479px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/26606i9F858FDE141BDD4C/image-size/large?v=v2&amp;amp;px=999" role="button" title="FMC.png" alt="FMC.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Matt&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 17:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767985#M1040052</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2018-12-21T17:46:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767988#M1040053</link>
      <description>Thanks for the reply John.&lt;BR /&gt;&lt;BR /&gt;I think I'm ok in terms of compatibility. SFR is running 6.2.3-83 and FMC is running 6.2.3.6.&lt;BR /&gt;&lt;BR /&gt;-Matt</description>
      <pubDate>Fri, 21 Dec 2018 17:50:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3767988#M1040053</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2018-12-21T17:50:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3768020#M1040054</link>
      <description>&lt;P&gt;After attempting to Register the device again, The netstat command shows the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;FMC = &lt;/STRONG&gt;192.168.2.20&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;HQ ASA Primary SFR:&lt;/STRONG&gt; 192.168.2.57&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;HQ ASA Secondary SFR:&lt;/STRONG&gt; 192.168.2.58&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;DR ASA Primary SFR:&lt;/STRONG&gt; 10.50.123.57&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;EM&gt;*The last one listed above is the one I'm trying to Register...&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;From the FMC VM:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;admin@firepower:~$ netstat -pan | grep 8305
(Not all processes could be identified, non-owned process info
 will not be shown, you would have to be root to see it all.)
tcp        0      0 192.168.2.20:8305       0.0.0.0:*               LISTEN      -                   
tcp        0   2515 192.168.2.20:59999      10.50.123.57:8305       ESTABLISHED -                   
tcp        0   2178 192.168.2.20:8305       10.50.123.57:50367      ESTABLISHED -                   
tcp        0      0 192.168.2.20:54469      192.168.2.57:8305       ESTABLISHED -                   
tcp        0      0 192.168.2.20:51725      192.168.2.58:8305       ESTABLISHED -                   
tcp        0      0 192.168.2.20:60542      192.168.2.58:8305       ESTABLISHED -                   
tcp        0      0 192.168.2.20:46581      192.168.2.57:8305       ESTABLISHED -  &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;From SFR Module:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;admin@ASASFR3:~$ netstat -pan | grep 8305
(Not all processes could be identified, non-owned process info
 will not be shown, you would have to be root to see it all.)
tcp        0      0 10.50.123.57:8305       0.0.0.0:*               LISTEN      -                   
tcp        0      0 10.50.123.57:50367      192.168.2.20:8305       ESTABLISHED -                   
tcp        0      0 10.50.123.57:8305       192.168.2.20:59999      ESTABLISHED -  &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Here's /var/log/messages from both:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SFR Module:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Dec 21 18:45:06 ASASFR3 SF-IMS[15070]: [15078] sftunneld:sf_peers [INFO] Peer 192.168.2.20 needs a single connection&lt;BR /&gt;Dec 21 18:45:06 ASASFR3 SF-IMS[15070]: [15078] sftunneld:sf_connections [INFO] Start connection to : 192.168.2.20 (wait 4 seconds is up)&lt;BR /&gt;Dec 21 18:45:06 ASASFR3 SF-IMS[15070]: [15098] sftunneld:sf_peers [INFO] Peer 192.168.2.20 needs a single connection&lt;BR /&gt;Dec 21 18:45:06 ASASFR3 SF-IMS[15070]: [15098] sftunneld:sf_ssl [INFO] Connect to 192.168.2.20 on port 8305 - eth0&lt;BR /&gt;Dec 21 18:45:06 ASASFR3 SF-IMS[15070]: [15098] sftunneld:sf_ssl [INFO] Initiate IPv4 connection to 192.168.2.20 (via eth0)&lt;BR /&gt;Dec 21 18:45:06 ASASFR3 SF-IMS[15070]: [15098] sftunneld:sf_ssl [INFO] Initiating IPv4 connection to 192.168.2.20:8305/tcp&lt;BR /&gt;Dec 21 18:45:06 ASASFR3 SF-IMS[15070]: [15098] sftunneld:sf_ssl [INFO] Wait to connect to 8305 (IPv6): 192.168.2.20&lt;BR /&gt;Dec 21 18:45:06 ASASFR3 SF-IMS[15070]: [15098] sftunneld:sf_ssl [INFO] Connect to 192.168.2.20 failed on port 8305 socket 11 (Connection refused)&lt;BR /&gt;Dec 21 18:45:06 ASASFR3 SF-IMS[15070]: [15098] sftunneld:sf_ssl [INFO] No IPv4 connection to 192.168.2.20&lt;BR /&gt;Dec 21 18:45:06 ASASFR3 SF-IMS[15070]: [15098] sftunneld:sf_ssl [WARN] Unable to connect to peer '192.168.2.20'&lt;BR /&gt;Dec 21 18:45:06 ASASFR3 SF-IMS[15070]: [15098] sftunneld:sf_ssl [INFO] reconnect to peer '192.168.2.20' in 24 seconds&lt;BR /&gt;Dec 21 18:45:13 ASASFR3 SF-IMS[15070]: [15077] sftunneld:tunnsockets [INFO] Accepted IPv4 connection from 192.168.2.20:59999/tcp&lt;BR /&gt;Dec 21 18:45:13 ASASFR3 SF-IMS[15070]: [15101] sftunneld:sf_ssl [INFO] Processing connection from 192.168.2.20:59999/tcp (socket 11)&lt;BR /&gt;Dec 21 18:45:28 ASASFR3 SF-IMS[15070]: [15078] sftunneld:sf_peers [INFO] Peer 192.168.2.20 needs a single connection&lt;BR /&gt;Dec 21 18:45:28 ASASFR3 SF-IMS[15070]: [15078] sftunneld:sf_connections [INFO] Start connection to : 192.168.2.20 (wait 24 seconds is up)&lt;BR /&gt;Dec 21 18:45:28 ASASFR3 SF-IMS[15070]: [15111] sftunneld:sf_peers [INFO] Peer 192.168.2.20 needs a single connection&lt;BR /&gt;Dec 21 18:45:28 ASASFR3 SF-IMS[15070]: [15111] sftunneld:sf_ssl [INFO] Connect to 192.168.2.20 on port 8305 - eth0&lt;BR /&gt;Dec 21 18:45:28 ASASFR3 SF-IMS[15070]: [15111] sftunneld:sf_ssl [INFO] Initiate IPv4 connection to 192.168.2.20 (via eth0)&lt;BR /&gt;Dec 21 18:45:28 ASASFR3 SF-IMS[15070]: [15111] sftunneld:sf_ssl [INFO] Initiating IPv4 connection to 192.168.2.20:8305/tcp&lt;BR /&gt;Dec 21 18:45:28 ASASFR3 SF-IMS[15070]: [15111] sftunneld:sf_ssl [INFO] Wait to connect to 8305 (IPv6): 192.168.2.20&lt;BR /&gt;Dec 21 18:45:28 ASASFR3 SF-IMS[15070]: [15111] sftunneld:sf_ssl [INFO] Connected to 192.168.2.20:8305 (IPv4)&lt;BR /&gt;Dec 21 18:47:15 ASASFR3 SF-IMS[25616]: [25616] CloudAgent:CloudAgent [INFO] IPRep, time to check for updates&lt;BR /&gt;Dec 21 18:47:43 ASASFR3 SF-IMS[15070]: [15101] sftunneld:sf_ssl [INFO] Wait SSL_accept_nb: TIMEOUT TO COMPLETE&lt;BR /&gt;Dec 21 18:47:43 ASASFR3 SF-IMS[15070]: [15101] sftunneld:sf_ssl [ERROR] Accept:SSL handshake failed&lt;BR /&gt;Dec 21 18:47:43 ASASFR3 SF-IMS[15070]: [15101] sftunneld:sf_ssl [WARN] SSL Verification status: ok&lt;BR /&gt;Dec 21 18:47:47 ASASFR3 SF-IMS[15070]: [15077] sftunneld:tunnsockets [INFO] Accepted IPv4 connection from 192.168.2.20:49974/tcp&lt;BR /&gt;Dec 21 18:47:47 ASASFR3 SF-IMS[15070]: [15229] sftunneld:sf_ssl [INFO] Processing connection from 192.168.2.20:49974/tcp (socket 11)&lt;BR /&gt;Dec 21 18:47:58 ASASFR3 SF-IMS[15070]: [15111] sftunneld:sf_ssl [INFO] Wait SSL_connect_nb: TIMEOUT TO COMPLETE&lt;BR /&gt;Dec 21 18:47:58 ASASFR3 SF-IMS[15070]: [15111] sftunneld:sf_ssl [ERROR] Connect:SSL handshake failed&lt;BR /&gt;Dec 21 18:47:58 ASASFR3 SF-IMS[15070]: [15111] sftunneld:sf_ssl [WARN] SSL Verification status: ok&lt;BR /&gt;Dec 21 18:47:58 ASASFR3 SF-IMS[15070]: [15111] sftunneld:sf_ssl [INFO] reconnect to peer '192.168.2.20' in 300 seconds&lt;BR /&gt;Dec 21 18:48:02 ASASFR3 SF-IMS[15070]: [15078] sftunneld:sf_peers [INFO] Peer 192.168.2.20 needs a single connection&lt;BR /&gt;Dec 21 18:48:02 ASASFR3 SF-IMS[15070]: [15078] sftunneld:sf_connections [INFO] Start connection to : 192.168.2.20 (wait 300 seconds is up)&lt;BR /&gt;Dec 21 18:48:02 ASASFR3 SF-IMS[15070]: [15235] sftunneld:sf_peers [INFO] Peer 192.168.2.20 needs a single connection&lt;BR /&gt;Dec 21 18:48:02 ASASFR3 SF-IMS[15070]: [15235] sftunneld:sf_ssl [INFO] Connect to 192.168.2.20 on port 8305 - eth0&lt;BR /&gt;Dec 21 18:48:02 ASASFR3 SF-IMS[15070]: [15235] sftunneld:sf_ssl [INFO] Initiate IPv4 connection to 192.168.2.20 (via eth0)&lt;BR /&gt;Dec 21 18:48:02 ASASFR3 SF-IMS[15070]: [15235] sftunneld:sf_ssl [INFO] Initiating IPv4 connection to 192.168.2.20:8305/tcp&lt;BR /&gt;Dec 21 18:48:02 ASASFR3 SF-IMS[15070]: [15235] sftunneld:sf_ssl [INFO] Wait to connect to 8305 (IPv6): 192.168.2.20&lt;BR /&gt;Dec 21 18:48:02 ASASFR3 SF-IMS[15070]: [15235] sftunneld:sf_ssl [INFO] Connected to 192.168.2.20:8305 (IPv4)&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;From FMC:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;admin@firepower:~$ tail -n 1000 /var/log/messages
Dec 21 18:45:06 firepower SF-IMS[30493]: [30493] sfmgr:sfmanager [INFO] set peer PEER_ADD to register 10.50.123.57
Dec 21 18:45:06 firepower SF-IMS[30492]: [30492] sftunneld:sftunnel [INFO] Update Peers configuration requested from a local program (message= 8105)
Dec 21 18:45:06 firepower SF-IMS[30492]: [30492] sftunneld:sf_peers [INFO] Using a 20 entry queue for 10.50.123.57 - 8104
Dec 21 18:45:06 firepower SF-IMS[30492]: [30492] sftunneld:sf_peers [INFO] Using a 20 entry queue for 10.50.123.57 - 8121
Dec 21 18:45:06 firepower SF-IMS[30492]: [30492] sftunneld:stream_file [INFO] Stream CTX initialized for 10.50.123.57
Dec 21 18:45:06 firepower SF-IMS[30492]: [30492] sftunneld:sftunnel [INFO] set peer PEER_ADD 10.50.123.57 to register
Dec 21 18:45:06 firepower SF-IMS[30492]: [30492] sftunneld:sftunnel [INFO] IPv4 is  192.168.2.20  (key '192.168.2.20') on eth0
Dec 21 18:45:06 firepower SF-IMS[30492]: [30492] sftunneld:sftunnel [INFO] Local Peer supports separate events connection
Dec 21 18:45:06 firepower SF-IMS[4410]: [4410] pm:process [INFO] HUPing sfmbservice
Dec 21 18:45:06 firepower SF-IMS[4410]: [4410] pm:process [INFO] HUPing sfipproxy
Dec 21 18:45:06 firepower SF-IMS[30494]: [30494] sfmbservice:sfmb_service [INFO] sfmbservice received SIGHUP
Dec 21 18:45:06 firepower SF-IMS[30496]: [30496] ipproxy:ipproxy [INFO] Got HUP signal, re-reading configuration
Dec 21 18:45:06 firepower SF-IMS[30492]: [30501] sftunneld:control_services [INFO] Successfully Send Interfaces info to peer 192.168.2.57 over eth0
Dec 21 18:45:06 firepower SF-IMS[30492]: [30501] sftunneld:sf_heartbeat [INFO] Saved SW VERSION from peer 192.168.2.57 (6.2.3)
Dec 21 18:45:07 firepower SF-IMS[30492]: [30498] sftunneld:tunnsockets [INFO] Started listening on port 8305 IPv4(192.168.2.20) eth0
Dec 21 18:45:12 firepower SF-IMS[30492]: [30499] sftunneld:sf_peers [INFO] Peer 10.50.123.57 needs a single connection
Dec 21 18:45:12 firepower SF-IMS[30492]: [30499] sftunneld:sf_connections [INFO] Start connection to : 10.50.123.57 (wait 0 seconds is up)
Dec 21 18:45:12 firepower SF-IMS[30492]: [916] sftunneld:sf_peers [INFO] Peer 10.50.123.57 needs a single connection
Dec 21 18:45:12 firepower SF-IMS[30492]: [916] sftunneld:sf_ssl [INFO] Connect to 10.50.123.57 on port 8305 - eth0
Dec 21 18:45:12 firepower SF-IMS[30492]: [916] sftunneld:sf_ssl [INFO] Initiate IPv4 connection to 10.50.123.57 (via eth0)
Dec 21 18:45:12 firepower SF-IMS[30492]: [916] sftunneld:sf_ssl [INFO] Initiating IPv4 connection to 10.50.123.57:8305/tcp
Dec 21 18:45:12 firepower SF-IMS[30492]: [916] sftunneld:sf_ssl [INFO] Wait to connect to 8305 (IPv6): 10.50.123.57
Dec 21 18:45:13 firepower SF-IMS[30492]: [916] sftunneld:sf_ssl [INFO] Connected to 10.50.123.57:8305 (IPv4)
Dec 21 18:45:17 firepower SF-IMS[30492]: [30500] sftunneld:control_services [INFO] Successfully Send Interfaces info to peer 192.168.2.58 over eth0
Dec 21 18:45:17 firepower SF-IMS[30492]: [30500] sftunneld:sf_heartbeat [INFO] Saved SW VERSION from peer 192.168.2.58 (6.2.3)
Dec 21 18:45:28 firepower SF-IMS[30492]: [30498] sftunneld:tunnsockets [INFO] Accepted IPv4 connection from 10.50.123.57:50367/tcp
Dec 21 18:45:28 firepower SF-IMS[30492]: [1027] sftunneld:sf_ssl [INFO] Processing connection from 10.50.123.57:50367/tcp (socket 35)
Dec 21 18:46:00 firepower SF-IMS[4410]: [4410] pm:process [INFO] Started store_whitelist_history (1094)
Dec 21 18:46:00 firepower SF-IMS[4410]: [4410] pm:log [INFO] Process 'store_whitelist_history' closed output.
Dec 21 18:46:12 firepower SF-IMS[4823]: [4823] CloudAgent:CloudAgent [INFO] IPRep, time to check for updates
Dec 21 18:46:12 firepower SF-IMS[4823]: [4840] CloudAgent:IPReputation [INFO] The curl option for ip  verify_peer=1  verifyhost=0 
Dec 21 18:46:12 firepower SF-IMS[4823]: [4840] CloudAgent:IPReputation [INFO] The curl option for dns verifypeer=1    verifyhost=0
Dec 21 18:46:31 firepower Someone connected to me, receiving data...
Dec 21 18:46:31 firepower sla_worker : sizeof(msg) : 8192
Dec 21 18:46:31 firepower before recv(), total_bytes_read = 0, hdr_len = 8
Dec 21 18:46:31 firepower before recv(), total_bytes_read = 8, msg_len = 10
Dec 21 18:46:31 firepower process_msg : Received IPC message type : 12
Dec 21 18:46:31 firepower Response being sent to SAM : �&amp;#3;
Dec 21 18:46:31 firepower , len(msg being sent) = 2575
Dec 21 18:46:31 firepower sla_worker : sizeof(msg) : 8192
Dec 21 18:46:31 firepower before recv(), total_bytes_read = 0, hdr_len = 8
Dec 21 18:46:31 firepower Connection closed...
Dec 21 18:46:31 firepower Waiting for someone to connect to me...
Dec 21 18:47:05 firepower SF-IMS[5471]: [5842] SFDataCorrelator:Correlator [INFO] Purging 1 expired IP hosts (query time: 0.003 sec.)
Dec 21 18:47:08 firepower SF-IMS[30493]: [30516] sfmgr:sfmanager [INFO] Received Broadcast message route_size=132
Dec 21 18:47:09 firepower SF-IMS[30493]: [30518] sfmgr:sfmanager [INFO] Received Broadcast message route_size=132
Dec 21 18:47:43 firepower SF-IMS[30492]: [916] sftunneld:sf_ssl [INFO] Wait SSL_connect_nb: TIMEOUT TO COMPLETE
Dec 21 18:47:43 firepower SF-IMS[30492]: [916] sftunneld:sf_ssl [ERROR] Connect:SSL handshake failed
Dec 21 18:47:43 firepower SF-IMS[30492]: [916] sftunneld:sf_ssl [WARN] SSL Verification status: ok
Dec 21 18:47:43 firepower SF-IMS[30492]: [916] sftunneld:sf_ssl [INFO] reconnect to peer '10.50.123.57' in 0 seconds
Dec 21 18:47:46 firepower SF-IMS[30492]: [30499] sftunneld:sf_peers [INFO] Peer 10.50.123.57 needs a single connection
Dec 21 18:47:46 firepower SF-IMS[30492]: [30499] sftunneld:sf_connections [INFO] Start connection to : 10.50.123.57 (wait 0 seconds is up)
Dec 21 18:47:46 firepower SF-IMS[30492]: [1478] sftunneld:sf_peers [INFO] Peer 10.50.123.57 needs a single connection
Dec 21 18:47:46 firepower SF-IMS[30492]: [1478] sftunneld:sf_ssl [INFO] Connect to 10.50.123.57 on port 8305 - eth0
Dec 21 18:47:46 firepower SF-IMS[30492]: [1478] sftunneld:sf_ssl [INFO] Initiate IPv4 connection to 10.50.123.57 (via eth0)
Dec 21 18:47:46 firepower SF-IMS[30492]: [1478] sftunneld:sf_ssl [INFO] Initiating IPv4 connection to 10.50.123.57:8305/tcp
Dec 21 18:47:46 firepower SF-IMS[30492]: [1478] sftunneld:sf_ssl [INFO] Wait to connect to 8305 (IPv6): 10.50.123.57
Dec 21 18:47:47 firepower SF-IMS[30492]: [1478] sftunneld:sf_ssl [INFO] Connected to 10.50.123.57:8305 (IPv4)
Dec 21 18:47:58 firepower SF-IMS[30492]: [1027] sftunneld:sf_ssl [INFO] Wait SSL_accept_nb: TIMEOUT TO COMPLETE
Dec 21 18:47:58 firepower SF-IMS[30492]: [1027] sftunneld:sf_ssl [ERROR] Accept:SSL handshake failed
Dec 21 18:47:58 firepower SF-IMS[30492]: [1027] sftunneld:sf_ssl [WARN] SSL Verification status: ok
Dec 21 18:48:02 firepower SF-IMS[30493]: [30493] sfmgr:sfmanager [INFO] Process received SIGHUP
Dec 21 18:48:02 firepower SF-IMS[30492]: [30498] sftunneld:tunnsockets [INFO] Accepted IPv4 connection from 10.50.123.57:35903/tcp
Dec 21 18:48:02 firepower SF-IMS[30492]: [1500] sftunneld:sf_ssl [INFO] Processing connection from 10.50.123.57:35903/tcp (socket 35)
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /var/sf/run/devcap.lock
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/cp /etc/sf/device_cap.conf /etc/sf/.device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 0664 /var/tmp/device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /var/tmp/device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 0664 /etc/sf/device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /etc/sf/device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /var/sf/run/devcap.lock
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/cp /etc/sf/device_cap.conf /etc/sf/.device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 0664 /var/tmp/device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /var/tmp/device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 0664 /etc/sf/device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /etc/sf/device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /var/sf/run/devcap.lock
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/cp /etc/sf/device_cap.conf /etc/sf/.device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:06 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 0664 /var/tmp/device_cap.conf
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:06 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /var/tmp/device_cap.conf
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 0664 /etc/sf/device_cap.conf
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /etc/sf/device_cap.conf
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/kill -s USR1 5440
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 0664 /var/sf/run/sftunnel.lock
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /var/sf/run/sftunnel.lock
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower SF-IMS[4410]: [4410] pm:process [INFO] Locking SFDataCorrelator
Dec 21 18:48:07 firepower SF-IMS[5471]: [1565] SFDataCorrelator:ControlHandler [INFO] Handling control connection from sudo_user '', cmd '/usr/bin/perl /usr/local/sf/bin/ActionQueueScrape.pl', pid 1560 (uid 0, gid 0)
Dec 21 18:48:07 firepower SF-IMS[5471]: [1565] SFDataCorrelator:DCEControl [INFO] DCEControlMessageReconfigure
Dec 21 18:48:07 firepower SF-IMS[5471]: [1565] SFDataCorrelator:Correlator [INFO] Initialize Host limit to 50000
Dec 21 18:48:07 firepower SF-IMS[5471]: [1565] SFDataCorrelator:Correlator [INFO] Host limit set to 50000
Dec 21 18:48:07 firepower SF-IMS[5471]: [1565] SFDataCorrelator:Correlator [INFO] Initialize User limit to 50000
Dec 21 18:48:07 firepower SF-IMS[5471]: [1565] SFDataCorrelator:Correlator [INFO] User limit set to 50000
Dec 21 18:48:07 firepower SF-IMS[5471]: [1565] SFDataCorrelator:Correlator [INFO] Event Rate Limit set to 5000
Dec 21 18:48:07 firepower SF-IMS[5471]: [1565] SFDataCorrelator:DCEControl [INFO] Pausing Event handlers
Dec 21 18:48:07 firepower SF-IMS[5471]: [1565] SFDataCorrelator:Correlator [INFO] DomainControl: Initialized 1 domains including 1 netmaps
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 0664 /var/sf/run/sftunnel.lock
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /var/sf/run/sftunnel.lock
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/cp /etc/sf/sftunnel.conf /etc/sf/.sftunnel.conf
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/usr/local/sf/bin/iftool
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chmod 0664 /var/tmp/sftunnel.conf
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower sudo:      www : TTY=unknown ; PWD=/ ; USER=root ; COMMAND=/bin/chown www:www /var/tmp/sftunnel.conf
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Dec 21 18:48:07 firepower sudo: pam_unix(sudo:session): session closed for user root
Dec 21 18:48:07 firepower SF-IMS[30493]: [30493] sfmgr:sfmanager [INFO] set peer PEER_REMOVED pending 10.50.123.57
Dec 21 18:48:07 firepower SF-IMS[30493]: [30493] sfmgr:sfmanager [INFO] free_peer 10.50.123.57.
Dec 21 18:48:07 firepower SF-IMS[30492]: [30492] sftunneld:sftunnel [INFO] Update Peers configuration requested from a local program (message= 8105)
Dec 21 18:48:07 firepower SF-IMS[30492]: [30492] sftunneld:sftunnel [INFO] set peer PEER_REMOVED 10.50.123.57 pending
Dec 21 18:48:07 firepower SF-IMS[30492]: [30492] sftunneld:sf_peers [INFO] Free not connected peer 10.50.123.57
Dec 21 18:48:07 firepower SF-IMS[30492]: [30492] sftunneld:sf_peers [INFO] Free peer 10.50.123.57 
Dec 21 18:48:07 firepower SF-IMS[30492]: [30492] sftunneld:sf_channel [INFO] &amp;gt;&amp;gt; ChannelState free_peer peer 10.50.123.57 / channelA / NONE [ msgSock &amp;amp; ssl_context ] &amp;lt;&amp;lt;
Dec 21 18:48:07 firepower SF-IMS[30492]: [30492] sftunneld:sf_channel [INFO] &amp;gt;&amp;gt; ChannelState free_peer peer 10.50.123.57 / channelB / NONE [ msgSock &amp;amp; ssl_context ] &amp;lt;&amp;lt;
Dec 21 18:48:07 firepower SF-IMS[30492]: [30492] sftunneld:stream_file [INFO] Stream CTX destroyed for 10.50.123.57
Dec 21 18:48:07 firepower SF-IMS[30492]: [30492] sftunneld:sf_peers [INFO] Free peer 10.50.123.57 on exit
Dec 21 18:48:07 firepower SF-IMS[30492]: [30492] sftunneld:stream_file [INFO] Stream CTX destroyed for 10.50.123.57
Dec 21 18:48:07 firepower SF-IMS[30492]: [30492] sftunneld:sftunnel [INFO] IPv4 is  192.168.2.20  (key '192.168.2.20') on eth0
Dec 21 18:48:07 firepower SF-IMS[30492]: [30492] sftunneld:sftunnel [INFO] Local Peer supports separate events connection
Dec 21 18:48:07 firepower SF-IMS[4410]: [4410] pm:process [INFO] HUPing sfmbservice
Dec 21 18:48:07 firepower SF-IMS[4410]: [4410] pm:process [INFO] HUPing sfipproxy&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Dec 2018 19:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3768020#M1040054</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2018-12-21T19:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3768272#M1040055</link>
      <description>&lt;P&gt;came across to this link might be helpful for you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.grandmetric.com/2018/04/23/troubleshoot-fmc-firepower-sensor-communication/" target="_blank"&gt;https://www.grandmetric.com/2018/04/23/troubleshoot-fmc-firepower-sensor-communication/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;however, could you try to uninstall the SFR in ASA and re-install a fresh copy might it mix the issue. as i have search for this error no sucess.&lt;/P&gt;&lt;PRE&gt;sf_ssl [ERROR] Connect:SSL handshake failed&amp;nbsp;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;seem like could be some cipher issue between the FMC and SFR not agreeing on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or if you have a cisco TAC open a case with cisco.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Dec 2018 22:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3768272#M1040055</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2018-12-22T22:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3774323#M1040056</link>
      <description>&lt;P&gt;Sorry for the delay. With the Holidays I was out of the office for a while and then there was an issue with the SSD. After I uninstalled the sfr module and then tried to re-install, there were a bunch of read/write I/O errors showing on the ASA. So I reloaded the ASA and after it came back up, it was no longer even recognizing the ASA was attached.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I was finally able to get someone in that location to remove and re-seat the SSD Drive and it was recognized again. So I then re-installed SFR and attempted to add the SFR module/sensor to the FMC and I am still getting the same results.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The one thing that really sticks out is the &lt;STRONG&gt;"Connect:SSL handshake failed"&lt;/STRONG&gt; error message shown below, even though at one point in the log it says connection successful...&lt;/P&gt;
&lt;PRE&gt;Jan  7 17:23:35 ASASFR3 SF-IMS[32353]: [32408] sftunneld:sf_ssl [INFO] Connect to 192.168.2.20 on port 8305 - eth0
Jan  7 17:23:35 ASASFR3 SF-IMS[32353]: [32408] sftunneld:sf_ssl [INFO] Initiate IPv4 connection to 192.168.2.20 (via eth0)
Jan  7 17:23:35 ASASFR3 SF-IMS[32353]: [32408] sftunneld:sf_ssl [INFO] Initiating IPv4 connection to 192.168.2.20:8305/tcp
Jan  7 17:23:35 ASASFR3 SF-IMS[32353]: [32408] sftunneld:sf_ssl [INFO] Wait to connect to 8305 (IPv6): 192.168.2.20
Jan  7 17:23:36 ASASFR3 SF-IMS[32353]: [32408] sftunneld:sf_ssl [INFO] Connected to 192.168.2.20:8305 (IPv4)
Jan  7 17:26:05 ASASFR3 SF-IMS[32353]: [32407] sftunneld:sf_ssl [INFO] Wait SSL_accept_nb: TIMEOUT TO COMPLETE
&lt;STRONG&gt;Jan  7 17:26:05 ASASFR3 SF-IMS[32353]: [32407] sftunneld:sf_ssl [ERROR] Accept:SSL handshake failed&lt;/STRONG&gt;
Jan  7 17:26:05 ASASFR3 SF-IMS[32353]: [32407] sftunneld:sf_ssl [WARN] SSL Verification status: ok
Jan  7 17:26:06 ASASFR3 SF-IMS[32353]: [32408] sftunneld:sf_ssl [INFO] Wait SSL_connect_nb: TIMEOUT TO COMPLETE
Jan  7 17:26:06 ASASFR3 SF-IMS[32353]: [32408] sftunneld:sf_ssl [ERROR] Connect:SSL handshake failed
Jan  7 17:26:06 ASASFR3 SF-IMS[32353]: [32408] sftunneld:sf_ssl [WARN] SSL Verification status: ok
Jan  7 17:26:06 ASASFR3 SF-IMS[32353]: [32408] sftunneld:sf_ssl [INFO] reconnect to peer '192.168.2.20' in 300 seconds
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From my laptop, I am able to run the command "telnet &amp;lt;sfr-ip-address&amp;gt; 8305" and it appears to connect just fine. But, I get a connection refused when trying the telnet command to the FMC. Is 8305 only used on the sensor?&lt;/P&gt;
&lt;PRE&gt;&amp;gt; telnet 192.168.2.20 8305
Trying 192.168.2.20...
telnet: connect to address 192.168.2.20: Connection refused
&lt;/PRE&gt;
&lt;P&gt;Any thoughts would be greatly appreciated!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Matt&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jan 2019 17:51:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3774323#M1040056</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2019-01-07T17:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3774328#M1040057</link>
      <description>&lt;P&gt;Well its seem like its refusing the connect. your best bet is open a TAC case if you have a contract.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jan 2019 17:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3774328#M1040057</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-07T17:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3774762#M1040058</link>
      <description>&lt;P&gt;Reimage SFR after re added to config-manger it will work&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 06:01:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3774762#M1040058</guid>
      <dc:creator>noufal.cdlm@gmail.com</dc:creator>
      <dc:date>2019-01-08T06:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3775268#M1040059</link>
      <description>&lt;P&gt;It could be your hard disk is faulty. As sound reading your description of the struggle with sfr.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 16:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3775268#M1040059</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-08T16:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781321#M1040060</link>
      <description>Sorry, I thought I had replied to this thread already. Guess not...&lt;BR /&gt;&lt;BR /&gt;I was able to re-image the SFR module on the SSD after getting the SSD re-seated in the ASA. But, I am still having the same issue with the logs showing SSL Handshake error. The strange thing is, according to the netstat command they are showing an Established connection on both ends.&lt;BR /&gt;&lt;BR /&gt;-Matt</description>
      <pubDate>Wed, 16 Jan 2019 17:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781321#M1040060</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2019-01-16T17:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781332#M1040061</link>
      <description>&lt;P&gt;were you not able to open a TAC case?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 17:12:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781332#M1040061</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-16T17:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781349#M1040062</link>
      <description>&lt;P&gt;I did. Basically, he just did a ping from the sfr to firepower with a large byte size and it showed packet loss so he concluded it was a networking issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But, I'm not really sure why this would cause an SSL handshake error...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Matt&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 17:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781349#M1040062</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2019-01-16T17:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781352#M1040063</link>
      <description>&lt;P&gt;strange. TAC should pick it up. or could be a junior engineer. just curious if you not explain him the issue?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 17:50:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781352#M1040063</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-16T17:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781367#M1040064</link>
      <description>Yea, we've been back and forth with email for a little while now and we had a WebEx session where he did the ping tests.&lt;BR /&gt;&lt;BR /&gt;He had also said that in their Database, a similar issue was fixed by adjusting the MTU of the SFR's eth0 to 1300. But, that didn't seem to help any in our case.&lt;BR /&gt;&lt;BR /&gt;We have a 100 Mbps pipe between our HQ where FIrepower VM is located and where the SFR module is located, so there aren't any Bandwidth issues or anything like that (*I checked ISP's reporting of bandwidth usage and that all seems good). We also have a packetshaper between the locations, but that doesn't appear to be limiting the byte transfer or anything along those lines.&lt;BR /&gt;&lt;BR /&gt;So I'm kind of at a loss for what the problem is... He did suggest spinning up a Firepower VM that is local to that SFR module, but we are in our busy season and my manager who handles that stuff is a bit swamped. Plus, I would assume there would be licensing that would get in the way...?&lt;BR /&gt;&lt;BR /&gt;Thanks Again for your replies, much appreciated.&lt;BR /&gt;&lt;BR /&gt;-Matt</description>
      <pubDate>Wed, 16 Jan 2019 18:02:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781367#M1040064</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2019-01-16T18:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781505#M1040065</link>
      <description>&lt;P&gt;He did suggest spinning up a Firepower VM that is local to that SFR module, but we are in our busy season and my manager who handles that stuff is a bit swamped. Plus, I would assume there would be licensing that would get in the way...?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;okay. in that case yes this is possible. ASA SFR come with traditional lic and you can rehost the problematic SFR to new FMC. but best if to check cisco lic team. I have my ASA SFR with VM FMC running. many time happens doing testing i break up my FMC. so what i do is i re-host my ASA on new FMC (i spin a new vFMC) and rehost my lic on it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this find you any help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 21:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3781505#M1040065</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-16T21:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot Register SFR Module to FMC</title>
      <link>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3785391#M1040066</link>
      <description>&lt;P&gt;So I have some new information.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I decided to try and do the pings again using the high byte count that caused the packet loss between the SFR Module and the FMC. But, instead of pinging the FMC address, I pinged some other VMs that are located on the exact same ESXi server&amp;nbsp;&lt;EM&gt;(*over the same physical hardware: wire, interface, etc...)&lt;/EM&gt; and that are on the same Vlan as the FMC. Doing these pings, with the same ping command, I experienced no packet loss at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I then hoped onto one of these VMs, and did the ping command with the same high byte count, and pinged the SFR module and experienced no packet loss here either.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, it appears that the issue lies somewhere with the FMC virtual machine itself. Would you agree?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Matt&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jan 2019 19:11:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-register-sfr-module-to-fmc/m-p/3785391#M1040066</guid>
      <dc:creator>Matthew Martin</dc:creator>
      <dc:date>2019-01-22T19:11:39Z</dc:date>
    </item>
  </channel>
</rss>

