The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes how to configure Hardware Bypass for inline sets in Firepower Device Manager (FDM) managed Secure Firewall 7.7.0.
Cisco recommends that you have knowledge of these topics:
The information in this document is based on these software and hardware versions:
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
Inline Sets feature was added to FDM in 7.4.1. Inline Sets enable inspection on an L2 network without the need of routing: Configure FTD Interfaces in Inline-Pair Mode
Contrasting Previous to This Release
Secure Firewall 7.0 Bypass Feature
What’s New
Deployment Scenarios
Software & Hardware Versions
Software and Hardware
Other Aspects of Support
Licensing and Compatibility
Functional Feature Description
Inline Set Network Diagram
Flow Diagram
Network Diagram
Inline Set Creation Flow
This section describes the steps to configure Hardware Bypass on FDM
Step 1: Edit Interfaces.
Note: The mode is automatically changed to Inline after the interface is added in an Inline Pair.
Step 2: Create an Inline Set.
Create Inline Set
.
Capabilities and Limitations
Snort Fail Open vs Hardware Bypass
Hardware BypassTriggers
Hardware Bypass can be triggered in the folowing scenarios:
To see which interfaces support Hardware Bypass:
Step 3: Configure inline sets Advanced Setting.
Snort Fail Open Settings.
Propagate Link State.
Click OK to create the inline set.
Step 4: Apply to a Security Zone (optional).
Note: For interfaces, the mode automatically changed to Inline after the interface is added in an Inline Pair.
Step 4: Deploy
Edit and Delete Inline Sets
REST API Endpoints
Interface Info REST API Models
Interface Info REST API
Interface Info REST API Example
Interface Info REST API Example
Note: This is a snippet from the full call, due to size.
Inline Set REST APIs Model
Inline Set REST API
Inline Set REST API Example
Inline Set REST API Example
Note: For other Bypass modes, replace STANDBY with either DISABLED or BYPASS_FORCE.
Configure and Deploy an Inline Set
1.Get interface IDs (see API Explorer for payload examples).
GET/devices/default/interfaces
2.Create Inline Set (see API Explorer for payload examples).
POST/devices/default/inlinesets
3.Create Security Zone (see API Explorer for payload examples) (optional).
POST/object/securityzones
4.Deploy to device (see API Explorer for payload examples).
POST/operational/deploy
Configure and Deploy an Inline Set with Hardware Bypass
1.Get interface IDs and information about Hardware Bypass interface pairs (see API Explorer for payload examples).
GET/operational/interfaceinfo/{objId}
2.Create Inline Set (see API Explorer for payload examples).
POST/devices/default/inlinesets
3.Create Security Zone (see API Explorer for payload examples) (optional).
POST/object/securityzones
4.Deploy to device (see API Explorer for payload examples).
POST/operational/deploy
Edit an Inline Set
1. Get interface IDs (see API Explorer for payload examples).
GET/devices/default/interfaces
2. Get Inline Sets.
GET/devices/default/inlinesets
3. Edit the Inline Set (see API Explorer for payload examples).
PUT/devices/default/inlinesets/{objId}
4. Deploy to device (see API Explorer for payload examples).
POST/operational/deploy
> show running-config inline-set
inline-set test_inline_0
interface-pair test2 test1
inline-set test_inline_1
hardware-bypass standby
interface-pair test27 test28
inline-set test_inline_2
hardware-bypass bypass
interface-pair test26 test25
> show inline-set
Inline-set test_inline_0
Mtuis 1600 bytes
Fail-open for snort down is off
Fail-open for snort busy is off
Tap mode is off
Propagate-link-state option is off
hardware-bypass mode is disabled
Interface-Pair[1]:
Interface: Ethernet1/3 "test1"
Current-Status: DOWN
Interface: Ethernet1/4 "test2"
Current-Status: DOWN
Bridge Group ID: 519
> show inline-set
Inline-set test_inline_1
Mtuis 1500 bytes
Fail-open for snort down is off
Fail-open for snort busy is off
Tap mode is off
Propagate-link-state option is off
hardware-bypass mode is standby
Interface-Pair[1]:
Interface: Ethernet2/7 "test27"
Current-Status: DOWN
Interface: Ethernet2/8 "test28"
Current-Status: DOWN
Bridge Group ID: 618
> show inline-set
Inline-set test_inline_1
Mtuis 1500 bytes
Fail-open for snort down is off
Fail-open for snort busy is off
Tap mode is off
Propagate-link-state option is off
hardware-bypass mode is bypass
Interface-Pair[1]:
Interface: Ethernet2/6 "test26"
Current-Status: DOWN
Interface: Ethernet2/5 "test25"
Current-Status: DOWN
Bridge Group ID: 610
> show interface
...
Interface Ethernet1/7 "", is admin down, line protocol is down
Hardware is EtherSVI, BW 1000 Mbps, DLY 10 usec
Available but not configured via nameif
...
Interface Ethernet2/7 "", is admin down, line protocol is down
Hardware is EtherSVI, BW 1000 Mbps, DLY 10 usec
Hardware bypass is supported with interface Ethernet2/8
Available but not configured via nameif
...
Interface Ethernet2/8 "", is admin down, line protocol is down
Hardware is EtherSVI, BW 1000 Mbps, DLY 10 usec
Hardware bypass is supported with interface Ethernet2/7
Available but not configured via nameif
MTU Size
GUI Validation
Note: The first pair (Ethernet2/1-Ethernet2/2) is valid.
REST API Response Shows Errors
REST API Validation
Verify Logs from CLI
Logs can be found in /ngfw/var/log/cisco/ngfw-onbox.log.
Search for Inline Set.
Example of possible errors found in logs:
Two interfaces do not support bypass.
Two interfaces are not a valid bypass pair.
root@FPR-3110-Pair:/home/admin# cd /ngfw/var/log/cisco/
root@FPR-3110-Pair:/ngfw/var/1og/cisco# cat ngfw-onbox.log | grep "InlineSet"
2024-08-28 12:35:00 ajp-nio-8009-exec-1: ERROR InlineSetValidator: 548 - Invalid
interface pair for Bypass. Interface Ethernet2/4 can be paired with Ethernet2/3.
2024-08-28 12:35:00 ajp-nio-8009-exec-1: ERROR InlineSetValidator:548 - Invalid
interface pair for Bypass. Interface Ethernet2/5 can be paired with Ethernet2/6.
2024-08-28 12:35:00 ajp-nio-8009-exec-1: ERROR InlineSetValidator:541 - Bypass
is not available for Interface Ethernet1/3.
2024-08-28 12:35:00 ajp-nio-8009-exec-1: ERROR InlineSetValidator:541 - Bypass
is not available for Interface
FDM Monitoring
> system support trace
Enable firewall-engine-debug too? [n]:
Please specify an IP protocol: ICMP
Please specify a client IP address:
Please specify a server IP address:
Monitoring packet tracer debug messages
[ packets show up here ]
Q: Is HA supported with inline-sets on FDM?
A: Inline Sets without Bypass are supported.
Inline Sets with Bypass are NOT supported.
Q: Are the spanning-tree BPDUs blocked on the inline-set pair?
A: No, they are not blocked.
Q: Are FTW cards supported in 3100?
A: Yes, FTW netmods have been supported since the 3100 Series was introduced with 7.1/9.17. Hardware Bypass is available starting 7.7.0.
Q: For 3100 FTW cards, is Bypass modes of Disabled, Standby, Bypass-Force like on FMC supported or not?
A: Hardware Bypass is available starting 7.7.0 on 3100 devices with FTW cards.
Q: Are Inline-Sets with port channels supported where the traffic is asymmetric across the port-channels as well?
A: No validation is performed on the PortChannel configured speed, so as long as the FTD supports it, it must be supported.
Q: In the event Snort fails for inspection, is failopen supported?
A: Please see the documentation on this setting on Firepower Management Center Configuration Guide.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
23-Apr-2025
|
Initial Release |