05-23-2024 08:22 AM
Hi,
Is the FMC managed FTD supposed to be reaching out to CISCO for security Intelligence?
I have an FTD reaching out to 63.97.201.67.
Is that normal. I thought the FMC reaches out to import and deploy to the FTDs.
05-23-2024 08:30 AM - edited 05-23-2024 08:42 AM
05-23-2024 08:36 AM
Yes, that is normal. While FMC manages multiple FTD devices and pushes security policies to them, FTD can also reach out to third-party security intelligence sources for updates, such as the Cisco Talos Intelligence reputation feed at 63.97.201.67.
In summary, FMC manages your FTD devices and provides them with security policies. FTDs can get security intelligence from FMC or directly from third-party sources like Cisco Talos Intelligence. Here is the link to read more into it.
05-23-2024 09:57 AM
What i need is the FMC reaching out to cisco. Only the FMC will pull updated and deploy them to the FTD. Now can i configure the FTD to never reach out to any HTTP/s?
05-23-2024 10:37 AM
May I inquire about the specific motivation behind your interest in this? I ask because there seems to be a deliberate design choice resembling that of Cisco Firewall.
I have not test this method but it may work and may not work. To ensure that only the Firepower Management Center (FMC) reaches out to Cisco for updates and that the FTD devices do not reach out to any HTTP/s URLs, you can configure your FTD devices accordingly.
Ensure that the FTD devices are not set to independently reach out for updates. This can typically be done through the FMC by configuring the device settings.
Implement access control policies to block outbound HTTP/s traffic from the FTD devices. (Do this in change windows if possible).
You can configure the FMC to handle all the updates
Ensure that your FMC is configured to fetch updates from Cisco and then deploy them to the FTD devices.
-Go to System > Updates in the FMC.
Ensure the FMC is scheduled to check for and download updates from Cisco.
Deploy these updates to your managed FTD devices.
05-23-2024 10:54 AM
Please how do i Ensure that the FTD devices are not set to independently reach out for updates. This can typically be done through the FMC by configuring the device settings.?
The configure manager is set on the FMC, but for some reason that FTD is reaching outside. I can make a rule blocking those connections but i want to tell the FTD itself not to reach out but to only talk to the FMC
05-23-2024 11:35 AM - edited 05-23-2024 11:50 AM
What you might can do is deny the FTD managment interface accessing the Internet.
OR
you can define a new subnet range where this new subnet does not have internet access. In order to change the mgmt ip address follow this post Here pasting what has been said.
1) From FMC, click Devices > Device Management, and edit the FTD
2) Go to Device tab under that device in "Management" section (as in Rodrigo's screenshot) and switch the toggle to "Disable Management"
05-23-2024 12:39 PM
As noted in the thread, the communications you are observing are not SI updates. It is the FTD sending information to ThreatGrid (now known as Secure Malware Analytics) for things like checking if a file is known malicious or, depending on your file policy, possibly submitting a file for analysis in the cloud.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide