cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
240
Views
0
Helpful
3
Replies

FMC 7.7.0 Health Alerts

Jeff Horton
Level 3
Level 3

I am getting the following Health Alerts on FMC running 7.7.0:

JeffHorton_0-1749136917416.png

How can I resolve these issues?

3 Replies 3

Marvin Rhoads
Hall of Fame
Hall of Fame

Your FMC must have working Internet access. Have you verified from FMC expert root user that you can reach Internet based resources?

The steps shown here have some good troubleshooting tips: https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/215838-fmc-and-ftd-smart-license-registration-a.html#toc-hId-46508244

 

root@INFR-SVR-FMCv:/Volume/home/admin# telnet tools.cisco.com 443
Trying 72.163.4.38...
Connected to tools.cisco.com.
Escape character is '^]'.
^CConnection closed by foreign host.
root@INFR-SVR-FMCv:/Volume/home/admin# curl -vvk https://tools.cisco.com
* Trying 173.37.145.8:443...
* Connected to tools.cisco.com (173.37.145.8) port 443 (#0)
* successfully set FIPS mode: 0
* ALPN, offering http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* successfully set FIPS mode: 0
* successfully set FIPS mode: 0
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* successfully set FIPS mode: 0
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: C=US; ST=California; L=San Jose; O=Cisco Systems Inc.; CN=tools.cisco.com
* start date: Nov 7 12:19:16 2024 GMT
* expire date: Nov 7 12:18:16 2025 GMT
* issuer: C=US; O=IdenTrust; OU=HydrantID Trusted Certificate Service; CN=HydrantID Server CA O1
* SSL certificate verify result: self signed certificate in certificate chain (19), continuing anyway.
> GET / HTTP/1.1
> Host: tools.cisco.com
> User-Agent: curl/7.82.0
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 302 Found
< Cache-Control: no-cache
< Content-length: 0
< Location: https://tools.cisco.com/healthcheck
<
* Connection #0 to host tools.cisco.com left intact

 

 

IS this normal? I saw another post where yours look similiar to mine.

 

Jeff Horton
Level 3
Level 3

I have confirmed it does so I will go thru the troubleshooting tips. Thanks.

Review Cisco Networking for a $25 gift card