04-03-2017 11:03 AM - edited 03-12-2019 02:10 AM
I have a pair of Firepower 4110s. Is there any way to restrict what IP addresses are even able to connect to the Chassis management interface SSH, HTTPS, and SNMP interfaces? And same for the CLI on the FTD logical device management interface?
Solved! Go to Solution.
04-04-2017 04:11 AM
FX-OS 2.1 added lockdown features as part of FIPS/CC (Common Criteria) certification.
See the Configuration guide here:
http://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/fxos211/web-config/b_GUI_ConfigGuide_FXOS_211/security_certifications_compliance.html#id_30486
http://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/platform_settings_for_firepower_threat_defense.html#task_2133E7672043462081102935A3042AB3
04-04-2017 04:11 AM
FX-OS 2.1 added lockdown features as part of FIPS/CC (Common Criteria) certification.
See the Configuration guide here:
http://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/fxos211/web-config/b_GUI_ConfigGuide_FXOS_211/security_certifications_compliance.html#id_30486
http://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/platform_settings_for_firepower_threat_defense.html#task_2133E7672043462081102935A3042AB3
04-04-2017 08:50 AM
Ah, yes, thank you, it looks like the software version is the answer for the FX-OS chassis management interface.
However, it seems like the platform settings policy restrictions apply only to the virtual diagnostic interface or the inband data interfaces, and not to the virtual management interface. Anything is able to establish SSH connections to the FTD management interface, regardless of what is configured in the platform policy. This is what I am trying to lock down.
From the config guide, this is the problem:
The physical management interface is shared between the Diagnostic logical interface and the Management logical interface; this configuration applies only to the Diagnostic logical interface, if used. The Management logical interface is separate from the other interfaces on the device. It is used to set up and register the device to the Firepower Management Center. It has a separate IP address and static routing.
04-04-2017 08:56 AM
Hmm I don't have one handy to verify on, but the FTD Management interface access restriction by source IP for both HTTPS and SSH should be a policy enforced by the platform settings.
If that's not working for you, I'd check with a TAC case whether it's setup and deployed properly or if there's a bug identified on this new feature.
The FMC Configuration Guide clearly indicates it's a feature:
04-10-2017 09:04 AM
Just an update that TAC confirmed that at this time there is no way to create access controls on the FTD management interface. The diagnostic interface only is the one that the platform settings policy applies to.
04-10-2017 07:09 PM
That's good to know. Thanks for the update.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide