- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-03-2017 11:03 AM - edited 03-12-2019 02:10 AM
I have a pair of Firepower 4110s. Is there any way to restrict what IP addresses are even able to connect to the Chassis management interface SSH, HTTPS, and SNMP interfaces? And same for the CLI on the FTD logical device management interface?
Solved! Go to Solution.
- Labels:
-
NGFW Firewalls
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-04-2017 04:11 AM
FX-OS 2.1 added lockdown features as part of FIPS/CC (Common Criteria) certification.
See the Configuration guide here:
http://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/fxos211/web-config/b_GUI_ConfigGuide_FXOS_211/security_certifications_compliance.html#id_30486
Similar settings for the FTD logical devices are done from your FMC, under a platform settings policy, as described here:
http://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/platform_settings_for_firepower_threat_defense.html#task_2133E7672043462081102935A3042AB3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-04-2017 04:11 AM
FX-OS 2.1 added lockdown features as part of FIPS/CC (Common Criteria) certification.
See the Configuration guide here:
http://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/fxos211/web-config/b_GUI_ConfigGuide_FXOS_211/security_certifications_compliance.html#id_30486
Similar settings for the FTD logical devices are done from your FMC, under a platform settings policy, as described here:
http://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/platform_settings_for_firepower_threat_defense.html#task_2133E7672043462081102935A3042AB3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-04-2017 08:50 AM
Ah, yes, thank you, it looks like the software version is the answer for the FX-OS chassis management interface.
However, it seems like the platform settings policy restrictions apply only to the virtual diagnostic interface or the inband data interfaces, and not to the virtual management interface. Anything is able to establish SSH connections to the FTD management interface, regardless of what is configured in the platform policy. This is what I am trying to lock down.
From the config guide, this is the problem:
The physical management interface is shared between the Diagnostic logical interface and the Management logical interface; this configuration applies only to the Diagnostic logical interface, if used. The Management logical interface is separate from the other interfaces on the device. It is used to set up and register the device to the Firepower Management Center. It has a separate IP address and static routing.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-04-2017 08:56 AM
Hmm I don't have one handy to verify on, but the FTD Management interface access restriction by source IP for both HTTPS and SSH should be a policy enforced by the platform settings.
If that's not working for you, I'd check with a TAC case whether it's setup and deployed properly or if there's a bug identified on this new feature.
The FMC Configuration Guide clearly indicates it's a feature:
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-10-2017 09:04 AM
Just an update that TAC confirmed that at this time there is no way to create access controls on the FTD management interface. The diagnostic interface only is the one that the platform settings policy applies to.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-10-2017 07:09 PM
That's good to know. Thanks for the update.
