Supported Versions

Table 1. Supported Versions of the Cisco FTD Software for Each Supported Platform

FTD Device Package Version

Platform

FTD/FMC Version

ACI/APIC Version

1.0.3

Firepower-93xx

6.2.3

2.3(1f)

3.0(1k)

3.2(1l)

1.0.3

Firepower-41xx

6.2.3

2.3(1f)

3.0(1k)

3.2(1l)

1.0.3

Firepower-21xx

6.2.3

2.3(1f)

3.0(1k)

3.2(1l)

1.0.3

vFTD

6.2.3

2.3(1f)

3.0(1k)

3.2(1l)

New Features in Version 1.0(3)

  • IPv4 static route support

  • FTD clustering support

  • Ether-channel sub-interface support

IPv4 Static Route Support

The following fields are supported:

  • network (required)

  • gateway (required)

  • metric (optional)

  • isTunneled (optional)


Note


The SLA monitor option is not supported


Example of an IPv4 static route configured on the APIC:

Example of the IPv4 static route pushed to the FMC by the FTD-DP:

FTD Clustering Support

FTD cluster must be pre-configured on the FMC. For example:

Register the FTD cluster on the APIC. For example:

The logical cluster device is used the same way as a normal single device in the APIC.

When a serviceAudit is triggered on the APIC, such as Re-Query for Device Validation, or when a configuration is changed, such as the IP address of the externalInterface of the service graph, which causes a serviceModify, the FTD-DP can use the new FMC etherchannel REST API to push the corresponding configuration to the FMC, and ensure the changes are automatically deployed to the FTD cluster.

Existing Features From Version 1.0(2)

  • Virtual FTD VLAN trunking support

  • FTD High Availability (HA) support

  • Dynamic EPG update

  • Firepower 21xx support

  • Performance enhancements (FTD-DP scalability)

Existing Features From Version 1.0(1)

  • Create interface configuration for FTD

    • Configure enabled

    • Configure logical name

    • Configure MTU

    • Configure security zone

    • Configure inline set

    • Configure static IPv4 addresses

  • Create new bridge group interface for Transparent mode

    • Configure bridge group ID

    • Configure static IPv4 addresses

    • Configure interface reference

  • Create new inline set

    • Configure snort fail open down

    • Configure snort fail open busy

    • Configure MTU

    • FTD physical appliance with Inline Set requires a specially designed ACI service graph with the same VLAN ID on both interfaces

  • Create new or update existing access rule

    • Configure source and destination security zones

  • Create new or update existing access policy

    • Configure name

  • Create new security zone

    • Configure type

Resolved Enhancement Requests in Version 1.0(3)

Table 2. Enhancement Requests Resolved in the Cisco FTD Device Package, Version 1.0(3)

Caveat

Description

CSCvh58404

Enhancement: add IPv4 static route support in FTD-DP

CSCvh58431

Enhancement: add cluster support in FTD-DP (pre-configured)

CSCvh58443

Enhancement: add etherchannel support in FTD-DP

Resolved Caveats in Version 1.0(3)

Table 3. Caveats Resolved in the Cisco FTD Device Package, Version 1.0(3)

Caveat

Description

CSCvg73120

Associated interfaces deleted if BVI interface ID changed

Bug Search

As a registered Cisco.com user, sign in to view more information about each bug or caveat using the Cisco Bug Search Tool.

Features Not Supported in Version 1.0(3)

The APIC cannot configure the following features using the FTD device package:

  • Dynamic routing

  • Port-channels

  • Access control policy rule ports, IPs, or inspections

  • Network Address Translation (NAT)


Note


For any unsupported FTD feature, we recommended that you clean up the configuration manually before removing a service graph or deleting the tenant.


Known Issues

This section describes known issues and their workarounds.

CSCvj29517

In some circumstances, the FMC may be too busy to complete a service call from the APIC, which causes the same request to be made to the FMC again and again. This may occur when:

  • Using the FTD device package, version 1.0.3

  • Clustering deployment with Inline mode

Workaround

You can use the Cisco-provided Python script (attached to CSCvj29517) to access the APIC REST API and modify the timeout values:

  1. Run the script to change the timeout value to its maximum number:

    set_timeout.py <APIC_IP> <USERNAME> <PASSWORD> maximum
  2. Monitor the debug.log from the APIC to verify that the service call has completed. Or check the the FMC to verify that the intended changes have been pushed down to the FMC and the deployment to the FTD is complete.

  3. Run the script again to change the timeout value back to its default number. Otherwise, unexpected behavior may occur.

    set_timeout.py <APIC_IP> <USERNAME> <PASSWORD> default

CSCvf88494

When deleting a tenant with a large configuration, the device package process is killed before it can finish the service call, resulting in a configuration that may not be completely cleaned up on the FMC. This may occur when:

  • Using the FTD device package, version 1.0.2

  • The tenant contains a device that has more than 50 service graphs deployed

  • Deleting the tenant directly before detaching the service graphs

Workaround

Detach the service graphs before deleting the tenant, or increase various timeout values on the APIC using its REST API. The REST payload is like this:

<polUni>
    <infraInfra>
        <vnsMDev vendor=CISCO model=FTD_FI version=1.0>
           <vnsDevScript auditTimeout=10800 modifyTimeout=10800  watchdogTimeout=10800/> 
        </vnsMDev>
    </infraInfra>
</polUni>

You can use the Cisco-provided Python script (attached to CSCvf88494) to access the APIC REST API and modify the timeout values:

  1. Before deleting the tenant, run the script to change the timeout value to its maximum number:

    set_timeout.py <APIC_IP> <USERNAME> <PASSWORD> maximum
  2. Delete the tenant from the APIC.

  3. Monitor the debug.log from the APIC to verify that the service call has completed. Or check the FMC to verify that all relevant configuration data has been cleaned up (such as access rules, security zones, sub-interfaces, and inline sets).

  4. Run the script again to change the timeout value back to its default number. Otherwise, unexpected behavior may occur.

    set_timeout.py <APIC_IP> <USERNAME> <PASSWORD> default

Note


Note: If the “CISCO-FTD_FI-1.0” device package is not installed on the APIC, running the script results in a “Bad Request” error. This error message can be safely ignored, as the script is designed to affect this particular device package only.


For more information, see CSCvg00515, opened to track this issue.

CSCvg06100

VLAN trunking fails in Transparent mode on a virtual FTD.

Workaround

Opened to track the FMC issue in CSCvf90086.

Enable the trunking port after creating the L4-L7 device. Then, apply the service graph.

If the deployment fails:

  1. On the FMC:

    1. Navigate to Devices, and select the FTD.

    2. Delete the new BVI and the associated sub-interfaces. Click Save. Click Deploy.

    3. Wait for the FMC to complete the deployment.

  2. On the APIC:

    1. In the node tree on the left, navigate to L4-L7 Devices, and select the device.

    2. Verify that the Trunking Port check box is selected.

    3. Right-click the device, and select Re-Query For Device Validation.

CSCvc46536

Multiple graph deployment needs a different parameter name for an access rule.

Workaround

For instance, Access Rules is a common APIC configuration parameter that can be shared across multiple graph deployments on the same L4-L7 device. In order to attach each graph deployment's interface security zones to a common access rule, provide different names for the SourceZone and DestinationZone parameters. For example, append each parameter with a matching suffix name, such as SourceZone-campCtx and DestinationZone-campCtx in one case and SourceZone-sapCtx and DestinationZone-sapCtx in another.

For more information, see the FMC Configuration Guide in Related Documentation.