cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1546
Views
5
Helpful
4
Replies

FMC FTD Compatibility

Turbo727
Level 1
Level 1

We currently have a few FTD firewalls running 6.4 managed by FMC 6.4. We are going to upgrade the FMC to 7.0 in preparation for new firewalls.

After FMC upgrade, it will be like FTD 6.4 + FMC 7.0. As I understand, 3des and dh5 are depreciated since ver 6.7. Are we going to be OK if we continue with this combination? 

4 Replies 4

manabans
Cisco Employee
Cisco Employee

FMC upgrade to v7.0.x should be able to manage the FTD version v6.4.0 or later. If any managed device is below v6.4.0, then the FMC upgrade won't proceed.

Refer to Table 2. Minimum Version to Upgrade to Version 7.0 - for more details,
https://www.cisco.com/c/en/us/td/docs/security/firepower/70/relnotes/firepower-release-notes-700/upgrade.html 

Turbo727
Level 1
Level 1

Thanks for that. I have reviewed the document.

What I want to confirm is that as long as the FTD stays on 6.4, the VPN should not be affected.

The deprecated features/configurations need to be changed and verified before proceeding with the FMC upgrade to v7.0.0. Deprecated features include,
1. Diffie-Hellman groups: 2, 5, and 24.
2. Group 5 continues to be supported in FMC deployments for IKEv1, but we recommend you change to a stronger option.
3. Encryption algorithms for users who satisfy export controls for strong encryption: DES, 3DES, AES-GMAC, AES-GMAC-192, AES-GMAC-256. DES continues to be supported (and is the only option) for users who do not satisfy export controls.
4. The NULL "encryption algorithm" (authentication without encryption, for testing purposes) continues to be supported in FMC deployments for both IKEv1 and IKEv2 IPsec proposals. However, it is no longer supported in IKEv2 policies.
5. Hash algorithms: MD5.
6. Before you upgrade, use the object manager to update your PKI certificate enrollments with stronger options: Objects > PKI > Cert Enrollment. Otherwise, although the upgrade preserves your current settings, VPN connections through the device will fail. To continue managing older FTD devices only (Version 6.4–6.7.x) with these weaker options, select the new Enable Weak-Crypto option for each device on the Devices > Certificates page.

Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/670/relnotes/firepower-release-notes-670/m_features_functionality.html#id_110361 
https://www.cisco.com/c/en/us/td/docs/security/firepower/70/relnotes/firepower-release-notes-700/features.html#Cisco_Generic_Topic.dita_37583bb6-5134-486c-ae8c-84983303d9fa 

You must change any policies that use the deprecated algorithms prior to upgrading.

As noted in the 6.7 release notes:

"If you are still using these features in IKE proposals or IPsec policies, change and verify your VPN configuration before you upgrade"

Review Cisco Networking for a $25 gift card