cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1521
Views
5
Helpful
4
Replies

Snort2 Problems with FTD v7.0.1 and v7.1

ida71
Level 1
Level 1

Is anyone else having issues with v7.0.1 & Snort3 or Snort2  ?

 

I'm posting this here as Cisco seem unable or unwilling to fix this issue.

 

I upgraded 2 new HA Pairs of 2140's to v7.0.1 as the current Gold Star release with Snort3 enabled. 2 weeks into live use, Snort3 barfed & stopped processing traffic, this did NOT cause a failover, as the Snort process was still showing as running. manual failover restored traffic, but the failed unit had to be rebooted to restore it to a useable state.  Two days later the second pair suffered the same fate.

 

After numerous TAC file dumps, core dumps & Tech Support file uploads & 2 recurrences of the issue on both pairs (4 fails) they finally identified a non public bug in the middle of January & had a duplicate for another customer.  The advice was they  would not be able to patch this until an April release   So advised that upgrading to v7.1 would cure the issue.

 

FMC was upgraded & now many things in the FMC (Appliance 1600 HA pair) do not work properly, such as searching in a policy. Database for unified events shows wrong data if you expand a line. And a few other minor things.

 

FTD's were upgraded, 1st pair needed access to internet from management interface, as it re-registers during upgrade, didn't see that in the release notes! Cisco advice with v7.1 is to enable TLS Discovery (it practically forces it on you) After fixing the registration issue. I tried to enable Snort3, which immediately crashed all traffic through the FTD & caused a split brain when trying to fail back to Snort2, turns out one of the HA pair did NOT accept the switch back.  Multiple reboots required to bring them to stable state. 2nd Pair did the same so be aware.

 

So now running v7.1, Snort2, TLS discovery disabled & many rules with Intrusion protection = None, plus SMB Detector disabled. Still have the same issues with Snort locking up, burning up 1 CPU till maxed out & 1550 Blocks exhaustion, causes traffic flow to stop. HA says all good & does NOT failover.

 

More dumps, multiple TAC engineers, no solution after weeks of waiting, with random firewall failures.

 

My advice do NOT upgrade to v7.x yet, its NOT fit for purpose.

 

If anyone has any magic insight into the inner working of Snort, let me know. The only course of action open to us at the moment is to failover to standby & reboot the other unit every 7 days ! Or Snort will force that on us when its feels like it.

Unlike inline IPS mode, you can't force traffic to flow on Snort failure, but as all the processes still show as running, even that might not keep things flowing if it was an option.

 

We have more 2140 HA pairs in another location on v6.6.x running 10 times the traffic load with same rule base without incident. So its definitely v7 related.

4 Replies 4

Marvin Rhoads
Hall of Fame
Hall of Fame

Sorry to hear about the issues you're experiencing.

I've had some issues getting FMCs upgraded to 7.0 (both hardware-based and VMs) but, once there, they systems I've worked on have been pretty solid. That includes all the hardware series - 1100, 2100, 4100 and 9300 in standalone, HA and clustered configurations.

My customers are running a mix of Snort 2 and Snort 3. None of my customers are on 7.1 yet, most are on 7.0.1 with the 7.0.1.1. patch being installed this past several days.

ida71
Level 1
Level 1

Thanks Marvin, just following TAC advice but its not fixed & downgrade is a major PITA especially as the equipment is an ocean away.

 

czellers
Level 1
Level 1

ida71
Level 1
Level 1

The Bug suggested fix is only temporary, at the bottom its states v7.0.3 as a fixed release, which is where we will be heading soon.

I ended up downgrading to v6.6.4 but that has now developed a similar bug. Cisco Dev's need to up their game significantly. Whilst the FTD/FMC features & functionality is getting close to NGFW, its currently about 8years in arrears of other products IMO. I would NOT recommend to anyone the use of FTD's based on my current experience.  Look to other vendors if you want a stable reliable Firewall platform.  ASA goes EoL in 2025, so Cisco have 3 years to get this thing right, lets hope they get there.

I have never raised so many TAC calls for any Cisco product as these in over 20years of working with their equipment .

 

 

Review Cisco Networking for a $25 gift card