<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Warning - v7.2.5 Upgrade on FPR-2140 removes Mgmt Interface SSH ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/warning-v7-2-5-upgrade-on-fpr-2140-removes-mgmt-interface-ssh/m-p/4989778#M1107545</link>
    <description>&lt;P&gt;This is just a piece of info. I recently started our next round of Cisco Gold Star upgrades due to v7.0.5 having a DoS attack vulnerability.&lt;/P&gt;&lt;P&gt;I initially upgraded 3 HA pairs of FPR-2120, followed by an HA pair FPR-2140's in middle of December 2023.&lt;/P&gt;&lt;P&gt;Today I got an incident from Security Team, stating the management interfaces on the 2140's were showing a SSH vulnerability from the latest Qualys scan. This was strange as I have SSH ACL's on all management interfaces &amp;amp; Qualys can't reach them.&lt;/P&gt;&lt;P&gt;On checking the reported FTD's the ACL's were gone !&amp;nbsp; See below where &amp;lt;snip&amp;gt; is removed content.&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt;&lt;/P&gt;&lt;P&gt;Cisco Firepower Extensible Operating System (FX-OS) v2.12.0 (build 519)&lt;BR /&gt;Cisco Firepower 2140 Threat Defense v7.2.5 (build 208)&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;BR /&gt;&amp;gt; show version&lt;BR /&gt;---------[ &amp;lt;snip&amp;gt;-FTD-2 ]----------&lt;BR /&gt;Model : Cisco Firepower 2140 Threat Defense (77) Version 7.2.5 (Build 208)&lt;BR /&gt;UUID : &amp;lt;snip&amp;gt;&lt;BR /&gt;Rules update version : 2023-12-07-001-vrt&lt;BR /&gt;VDB version : 377&lt;BR /&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;gt; show ssh-access-list&lt;BR /&gt;f2b-sshd tcp -- anywhere anywhere tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:ssh&lt;BR /&gt;Chain f2b-sshd (1 references)&lt;BR /&gt;ACCEPT tcp anywhere anywhere state NEW tcp dpt:ssh&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt;configure ssh-access-list &amp;lt;snip&amp;gt;&lt;/P&gt;&lt;P&gt;The ssh access list was changed successfully.&lt;/P&gt;&lt;P&gt;&amp;gt; show ssh-access-list&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;lt;&amp;lt;&amp;lt;&lt;/P&gt;&lt;P&gt;I checked the FPR-2120's &amp;amp; they still had their ACL's intact, so I suspect it Hardware related issue. I have logged a case with TAC for it.&lt;/P&gt;&lt;P&gt;Might be worth adding another post change validation check to your upgrades process.&lt;/P&gt;&lt;P&gt;Have Fun &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 04 Jan 2024 10:36:48 GMT</pubDate>
    <dc:creator>ida71</dc:creator>
    <dc:date>2024-01-04T10:36:48Z</dc:date>
    <item>
      <title>Warning - v7.2.5 Upgrade on FPR-2140 removes Mgmt Interface SSH ACL</title>
      <link>https://community.cisco.com/t5/network-security/warning-v7-2-5-upgrade-on-fpr-2140-removes-mgmt-interface-ssh/m-p/4989778#M1107545</link>
      <description>&lt;P&gt;This is just a piece of info. I recently started our next round of Cisco Gold Star upgrades due to v7.0.5 having a DoS attack vulnerability.&lt;/P&gt;&lt;P&gt;I initially upgraded 3 HA pairs of FPR-2120, followed by an HA pair FPR-2140's in middle of December 2023.&lt;/P&gt;&lt;P&gt;Today I got an incident from Security Team, stating the management interfaces on the 2140's were showing a SSH vulnerability from the latest Qualys scan. This was strange as I have SSH ACL's on all management interfaces &amp;amp; Qualys can't reach them.&lt;/P&gt;&lt;P&gt;On checking the reported FTD's the ACL's were gone !&amp;nbsp; See below where &amp;lt;snip&amp;gt; is removed content.&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;&amp;gt;&lt;/P&gt;&lt;P&gt;Cisco Firepower Extensible Operating System (FX-OS) v2.12.0 (build 519)&lt;BR /&gt;Cisco Firepower 2140 Threat Defense v7.2.5 (build 208)&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;BR /&gt;&amp;gt; show version&lt;BR /&gt;---------[ &amp;lt;snip&amp;gt;-FTD-2 ]----------&lt;BR /&gt;Model : Cisco Firepower 2140 Threat Defense (77) Version 7.2.5 (Build 208)&lt;BR /&gt;UUID : &amp;lt;snip&amp;gt;&lt;BR /&gt;Rules update version : 2023-12-07-001-vrt&lt;BR /&gt;VDB version : 377&lt;BR /&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;&amp;gt; show ssh-access-list&lt;BR /&gt;f2b-sshd tcp -- anywhere anywhere tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- anywhere anywhere state NEW tcp dpt:ssh&lt;BR /&gt;Chain f2b-sshd (1 references)&lt;BR /&gt;ACCEPT tcp anywhere anywhere state NEW tcp dpt:ssh&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;gt;configure ssh-access-list &amp;lt;snip&amp;gt;&lt;/P&gt;&lt;P&gt;The ssh access list was changed successfully.&lt;/P&gt;&lt;P&gt;&amp;gt; show ssh-access-list&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;ACCEPT tcp -- &amp;lt;snip&amp;gt; anywhere state NEW tcp dpt:ssh&lt;BR /&gt;&amp;gt;&lt;BR /&gt;&amp;lt;&amp;lt;&amp;lt;&lt;/P&gt;&lt;P&gt;I checked the FPR-2120's &amp;amp; they still had their ACL's intact, so I suspect it Hardware related issue. I have logged a case with TAC for it.&lt;/P&gt;&lt;P&gt;Might be worth adding another post change validation check to your upgrades process.&lt;/P&gt;&lt;P&gt;Have Fun &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2024 10:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/warning-v7-2-5-upgrade-on-fpr-2140-removes-mgmt-interface-ssh/m-p/4989778#M1107545</guid>
      <dc:creator>ida71</dc:creator>
      <dc:date>2024-01-04T10:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: Warning - v7.2.5 Upgrade on FPR-2140 removes Mgmt Interface SSH AC</title>
      <link>https://community.cisco.com/t5/network-security/warning-v7-2-5-upgrade-on-fpr-2140-removes-mgmt-interface-ssh/m-p/4989785#M1107547</link>
      <description>&lt;P&gt;I am assuming that you remembered to deploy policies after the upgrade?&lt;/P&gt;
&lt;P&gt;It is quite possible that something on the management plane has been changed and is missing some pre and post upgrade checks.&amp;nbsp; The jump from pre 7.2.x to 7.2.x and higher has a 40% change in code so missing checks is quite possible.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2024 10:45:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/warning-v7-2-5-upgrade-on-fpr-2140-removes-mgmt-interface-ssh/m-p/4989785#M1107547</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-01-04T10:45:22Z</dc:date>
    </item>
    <item>
      <title>Re: Warning - v7.2.5 Upgrade on FPR-2140 removes Mgmt Interface SSH AC</title>
      <link>https://community.cisco.com/t5/network-security/warning-v7-2-5-upgrade-on-fpr-2140-removes-mgmt-interface-ssh/m-p/4989792#M1107549</link>
      <description>&lt;P&gt;Yes Policy was deployed post upgrade, multiple times since too. Management Interface configuration is local &amp;amp; not FMC managed so should not evaporate. Worked fine on the 2120's so has to be some hardware/software cockup. I'll be doing more 2140's this weekend, so will check them post upgrade.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2024 10:54:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/warning-v7-2-5-upgrade-on-fpr-2140-removes-mgmt-interface-ssh/m-p/4989792#M1107549</guid>
      <dc:creator>ida71</dc:creator>
      <dc:date>2024-01-04T10:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: Warning - v7.2.5 Upgrade on FPR-2140 removes Mgmt Interface SSH AC</title>
      <link>https://community.cisco.com/t5/network-security/warning-v7-2-5-upgrade-on-fpr-2140-removes-mgmt-interface-ssh/m-p/4990127#M1107557</link>
      <description>&lt;P&gt;TAC suggest this is due to Bug, basically says this happens at random &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://urldefense.com/v3/__https:/bst.cloudapps.cisco.com/bugsearch/bug/CSCvz13564__;!!GFN0sa3rsbfR8OLyAw!bGpdgDe7BZ9OpB8Zg35TTgq2sZTSRhOskF3A9aXeJzz5PvUqUoyAFjmvyNx7ALZUCZfZOpIF5MTVzTT15D52sZaupYus9w$" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz13564&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2024 15:09:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/warning-v7-2-5-upgrade-on-fpr-2140-removes-mgmt-interface-ssh/m-p/4990127#M1107557</guid>
      <dc:creator>ida71</dc:creator>
      <dc:date>2024-01-04T15:09:41Z</dc:date>
    </item>
    <item>
      <title>Re: Warning - v7.2.5 Upgrade on FPR-2140 removes Mgmt Interface SSH AC</title>
      <link>https://community.cisco.com/t5/network-security/warning-v7-2-5-upgrade-on-fpr-2140-removes-mgmt-interface-ssh/m-p/4990167#M1107558</link>
      <description>&lt;P&gt;thanks alot for update us&amp;nbsp;&lt;BR /&gt;have a nice day&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jan 2024 15:43:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/warning-v7-2-5-upgrade-on-fpr-2140-removes-mgmt-interface-ssh/m-p/4990167#M1107558</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-04T15:43:25Z</dc:date>
    </item>
  </channel>
</rss>

