Cisco Firepower 8000 Series Getting Started Guide
Using the 8000 Series Stacking Cable
Connecting the Sensing Interfaces
Installing the Firepower 8000 Series Device
Initial Setup Using the Web Interface
Register a Firepower Device to a Management Center Using the CLI
Using the Shell to Redirect the Console Output
Using the Web Interface to Redirect the Console Output
Restoring a Device to Factory Defaults
Configuration and Event Backup Guidelines
Traffic Flow During the Restore Process
Understanding the Restore Process
Obtaining the Restore ISO and Update Files
Starting the Restore Utility Using KVM or Physical Serial Port
Starting the Restore Utility Using LightsOut Management
Using the Interactive Menu to Restore an Appliance
Identifying the Appliance’s Management Interface
Specifying ISO Image Location and Transport Method
Updating System Software and Intrusion Rules During Restore
Downloading the ISO and Update Files and Mounting the Image
Saving and Loading Restore Configurations
Setting Up LightsOut Management
This section lists the items included with each model. Note that contents are subject to change, and your exact contents might contain additional or fewer items.
A Firepower 8000 Series device can be delivered on a variety of chassis:
Figure 1 Firepower 81xx and AMP 8xxx Series Chassis and Management Interface
Note: Firepower 8120/8130/8140 and the AMP8050/AMP8150 models have identical chassis. If you are not sure which model you have, see your packing list.
Note: You can add a stacking kit to the Firepower 8140 for a total 2U configuration.
Figure 2 Firepower 82xx Series Chassis and Management Interface
–Firepower 8260 (4U model), the 40g primary chassis contains one stacking module and up to six sensing modules. The secondary chassis contains one stacking module. You can add up to two stacking kits for a total 8U configuration.
–Firepower 8270 (6U stacked model), the 40G primary chassis contains two stacking modules and up to five sensing modules. Two secondary chassis contains one stacking module. You can add one stacking kit for a total 8U configuration.
–Firepower 8290 (8U stacked model), the 40G primary chassis contains three stacking modules and up to four sensing modules. Three secondary chassis contains one stacking module. This model is fully configured and does not accept a stacking kit.
Figure 3 Firepower and AMP 83xx Series Chassis and Management Interface
–Firepower 8360 and AMP8360 (4U stacked models), the 40G primary chassis contains one stacking module and up to six sensing modules. One secondary chassis contains one stacking module. You can add up to two stacking kits for a total 8U configuration.
–Firepower 8370 and AMP8370 (6U stacked models), includes a 40G primary chassis with two stacking modules and up to five sensing modules. Two secondary chassis contains one stacking module. You can add one stacking kit for a total 8U configuration.
–Firepower 8390 and AMP8390 (8U stacked models), includes a 40G primary chassis with three stacking modules and up to four sensing modules. Three secondary chassis contains one stacking module. This model is fully configured and does not accept a stacking kit.
The sensing interfaces for the Firepower 8000 Series appliances can be delivered with copper or fiber interfaces.
A stacking module connects two like devices to increase the power of the primary device. Stacking module(s) are optional for Firepower 8140/ 8250/ 8350 and AMP8350; included for Firepower 8260/8270/8290, Firepower 8360/8370/8390, and AMP8360/8370/8390.
Note: You cannot connect devices with different configurations; for example, do not connect a Firepower 8250 to a Firepower 8350. For more information, see the Firepower 8000 Series Hardware Installation Guide.
You can stack devices in the following configurations:
One device is designated as the primary device and is connected to the network segments. All other devices are designated secondary devices, and are used to provide additional resources to the primary device.
Connect the primary device to the network segments you want to analyze in the same way that you would connect a single Firepower 8140, Firepower 8250, or Firepower 8350/AMP8350. Connect the secondary devices to the primary device as indicated in the stack cabling diagram. If a secondary device contains sensing interfaces, those interfaces are not used.
After the devices are physically connected to the network segments and to each other, use a Firepower Management Center to establish and manage the stack. See the Firepower 8000 Series Hardware Installation Guide for complete information about using devices in stacked configurations.
Install the devices within reach of the three-foot (one-meter) 8000 Series stacking cable to create the physical connection between the primary and secondary devices. Stacking two Firepower 8140s requires one cable. Stacking the Firepower 8250/8260/8270/8290, Firepower 8350/8360/8370/8390, or AMP8350/8360/8370/8390 requires two cables per connection. Devices do not need to be powered down to insert or remove the stacking cable.
You can cable your device to configure passive or inline interfaces, depending on your deployment needs.
Use passive cabling if you want to:
Use inline cabling if you want to use the same features as a passive deployment, plus:
Use the appropriate cables (as indicated by your interface) and cabling diagram for the interface you want to configure, then use the web interface on the Firepower Management Center to configure the interfaces. See Connecting the Sensing Interfaces.
This section describes the physical connection of the sensing interfaces. After you cable the interfaces, use the web interface on the Firepower Management Center that manages the device to confi gure the device’s sensing interfaces as passive, inline, inline with fail-open, switched, routed, or hybrid. Use only the interfaces on the front of the device as sensing interfaces.
See the Firepower 8000 Series Hardware Installation Guide for detailed information on planning your deployment. After you have selected a deployment model, cable the sensing interfaces as needed for your configuration.
When you install an appliance, make sure that you can access the appliance’s console for initial setup. You can access the console for initial setup using a keyboard and monitor with KVM, a serial connection, or using an Ethernet connection to the management interface.
Note: The management interface is pre-configured with a default IPv4 address. However, you can reconfigure the management interface with an IPv6 address as part of the setup process.
You can connect a USB keyboard and VGA monitor to the appliance, which is useful for rack-mounted appliances connected to a keyboard, video, and mouse (KVM) switch.
You can connect a computer to any 8000 Series appliance using the physical serial port. Connect the appropriate rollover serial cable (also known as a NULL modem cable or Cisco console cable) at any time, then configure the remote management console to redirect the default VGA output to the serial port. To interact with the appliance, use terminal emulation software such as HyperTerminal or XModem. The settings for this software are 9600 baud, 8 data bits, no parity checking, 1 stop bit, and no flow control. Firepower 8000 Series and AMP8000 Series devices use an RJ-45 connection.
Configure a local computer, which must not be connected to the internet, with the following network settings:
Using an Ethernet cable, connect the network interface on the local computer to the management interface on the appliance. Note that the management interface is preconfigured with a default IPv4 address. However, you can reconfigure the management interface with an IPv6 address as part of the setup process.
1. Mount the appliance in your rack using the mounting kit and its supplied instructions.
2. Connect to the appliance using either a keyboard and monitor or an Ethernet connection.
–If you are using a keyboard and monitor to set up the appliance, use an Ethernet cable now to connect the management interface to a protected network segment.
–If you plan to perform the initial setup process by connecting a computer directly to the appliance’s physical management interface, you will connect the management interface to the protected network when you finish setup.
3. Connect the sensing interfaces to the network segments you want to analyze using the appropriate cables for your interfaces:
–Copper Sensing Interfaces: If your device includes copper sensing interfaces, make sure you use the appropriate cables to connect them to your network; see Cabling Inline Deployments on Copper Interfaces in the Firepower 8000 Series Hardware Installation Guide.
–Fiber Adapter Card: For devices with a fiber adapter card, connect the LC connectors on the optional multimode fiber cable to two ports on the adapter card in any order. Connect the SC plug to the network segment you want to analyze.
–Fiber Tap: If you are deploying the device with an optional fiber optic tap, connect the SC plug on the optional multimode fiber cable to the “analyzer” port on the tap. Connect the tap to the network segment you want to analyze.
–Copper Tap: If you are deploying the device with an optional copper tap, connect the A and B ports on the left of the tap to the network segment you want to analyze. Connect the A and B ports on the right of the tap (the “analyzer” ports) to two copper ports on the adapter card.
For more information about options for deploying the managed device, see Deploying Managed Devices in the Firepower 8000 Series Hardware Installation Guide.
Note that if you are deploying a device with bypass interfaces, you are taking advantage of your device’s ability to maintain network connectivity even if the device fails. See Testing an Inline Bypass Interface Installation in the Firepower 8000 Series Hardware Installation Guide for information on installation and latency testing.
4. Attach the power cord to the appliance and plug into a power source.
If your appliance has redundant power supplies, attach power cords to both power supplies and plug them into separate power sources.
6. If you are using a direct Ethernet connection to set up the appliance, confirm that the link LED is on for both the network interface on the local computer and the management interface on the appliance.
If the management interface and network interface LEDs are not lit, try using a crossover cable. For more information, see Cabling Inline Deployments on Copper Interfaces in the Firepower 8000 Series Hardware Installation Guide.
After you deploy and install a new Firepower device, you must complete a setup process. The setup process also allows you to perform many initial administrative-level tasks, such as setting the time, registering and licensing devices, and scheduling updates. The options you choose during setup and registration determine the default interfaces, inline sets, zones, and policies that the system creates and applies.
Before you begin the setup, make sure that you can meet the following conditions:
To set up a new appliance, you must connect using either keyboard and monitor/KVM or a direct Ethernet connection to the appliance’s management interface. After initial setup, you can configure the appliance for serial access. For more information, see “Rack-Mounting a Firepower Device” in the Firepower 8000 Series Hardware Installation Guide.
Note: Do not use a KVM console with USB mass storage to access the appliance for the initial setup because the appliance may attempt to use the mass storage device as a boot device.
Network and Deployment Information
You have, at minimum, the information needed to allow the appliance to communicate on your management network: an IPv4 or IPv6 management IP address, a netmask or prefix length, and a default gateway.
If you know how the appliance is deployed, the setup process is also a good time to perform many initial administrative-level tasks, including registration and licensing.
Note: If you are deploying multiple appliances, set up your devices first, then their managing Firepower Management Center. The initial setup process for a device allows you to preregister it to a Firepower Management Center; the setup process for a Firepower Management Center allows you to add and license preregistered managed devices.
After you complete setup, you will use the Firepower Management Center‘s web interface to perform most management and analysis tasks for your deployment. Firepower devices have a restricted web interface that you can use only to perform basic administration. For more information, see Next Steps.
Note: If you are setting up an appliance after restoring it to factory defaults (see Restoring a Device to Factory Defaults) and you did not delete the appliance’s license and network settings, you can use a computer on your management network to browse directly to the appliance’s web interface to perform the setup. Skip to Initial Setup Using the Web Interface.
The following diagram illustrates the choices you can make when setting up Firepower devices:
Your access to a Firepower device determines how you set it up. You have the following options:
If you are setting up a reimaged device and you kept your network settings as part of the restore process, you can access the CLI via SSH or a Lights-Out Management (LOM) connection. You can also browse to the device’s web interface from a computer on your management network.
system shutdown
command from the CLI on a Firepower device, or the
shutdown -h now
command from an appliance’s shell (sometimes called expert mode).
In most cases, complete the setup process by logging into the device’s web interface and specifying initial configuration options on a setup page.
1. Direct your browser to https://
mgmt_ip /
, where mgmt_ip is the IP address of the device’s management interface.
–For a device connected to a computer with an Ethernet cable, direct the browser on that computer to the default management interface IPv4 address: https://192.168.45.45/
.
–For a device where network settings are already configured, use a computer on your management network to browse to the IP address of the device’s management interface.
2. Log in using admin
as the username and Admin123
as the password.
See the following sections for information on initial setup options:
–Firepower Device LCD Panel Configuration
3. When you are finished, click Apply.
The device is configured according to your selections. You are logged into the web interface as the admin
user, which has the Administrator role.
The device is ready to be added to its Firepower Management Center.
Note: If you connected directly to the device using an Ethernet cable, disconnect the computer and connect the device’s management interface to the management network. If you need to access the device’s web interface at any time, direct a browser on a computer on the management network to the IP address or host name that you configured during setup.
You must change the password for the admin
account. This account has Administrator privileges and cannot be deleted.
This password allows the admin
user to log into the device’s web interface and its CLI; the admin
user has Configuration CLI access. Changing any user’s password for the web interface also changes the password for the CLI, and vice versa.
A device’s network settings allow it to communicate on your management network. If you already configured the device’s network settings, this section of the page may be prepopulated.
The Firepower System provides a dual stack implementation for both IPv4 and IPv6 management environments. You must specify the management network protocol ( IPv4, IPv6, or Both). Depending on your choice, the setup page displays various fields where you must set the IPv4 or IPv6 management IP address, netmask or prefix length, and default gateway:
–For IPv4, you must set the address and netmask in dotted decimal form (for example: a netmask of 255.255.0.0).
–For IPv6 networks, you can select the Assign the IPv6 address using router autoconfiguration check box to automatically assign IPv6 network settings. Otherwise, you must set the address in colon-separated hexadecimal form and the number of bits in the prefix (for example: a prefix length of 112).
You can also specify up to three DNS servers, as well as the host name and domain for the device.
Firepower Device LCD Panel Configuration
Select whether you want to allow changing of a Firepower device’s network settings using the LCD panel.
Note: Enabling this option can represent a security risk. You need only physical access, not authentication, to configure network settings using the LCD panel. For more information, see “Using the LCD Panel on a Firepower Device” in the Firepower 8000 Series Hardware Installation Guide.
You must manage a Cisco device with a Firepower Management Center. In this two-step process, you first configure remote management on the device, then add the device to a Firepower Management Center. For your convenience, the setup page allows you to preregister the device to the Firepower Management Center that will manage it.
Leave the Register This Device Now check box enabled, then specify the IP address or fully qualified domain name of the managing Firepower Management Center as the Management Host. Also, type the alphanumeric Registration Key you will later use to register the device to the Firepower Management Center. Note that this is a simple key that you specify, up to 37 characters in length, and is not the same as the license key.
If the device and Firepower Management Center are separated by a network address translation (NAT) device, defer device registration until after you complete the initial setup. See the Managing Devices chapter in the Firepower Management Center Configuration Guide for more information.
You can set the time for a device either manually or via network time protocol (NTP) from an NTP server, including the Firepower Management Center. Cisco recommends that you use the Firepower Management Center as the NTP server for its managed devices.
You can also specify the time zone used on the local web interface for the admin
account. Click the current time zone to change it using a pop-up window.
The detection mode you choose for a device determines how the system initially configures the device’s interfaces, and whether those interfaces belong to an inline set or security zone.
The detection mode is not a setting you can change later; it is simply an option you choose during setup that helps the system tailor the device’s initial configurations. In general, you should choose a detection mode based on how your device is deployed:
–Passive - choose this mode if your device is deployed passively, as an intrusion detection system (IDS). In a passive deployment, you can perform file and malware detection, Security Intelligence monitoring, as well as network discovery.
–Inline - choose this mode if your device is deployed inline, as an intrusion prevention system. An intrusion prevention system usually fails open and allows non-matching traffic.
In an inline deployment, you can also use AMP for Networks, file control, Security Intelligence filtering, and network discovery.
Although you can select the inline mode for any device, keep in mind that inline sets using non-bypass NetMods on 8000 Series devices lack bypass capability.
Note: Reimaging resets devices in inline deployments to a non-bypass configuration; this disrupts traffic on your network until you reconfigure bypass mode. For more information, see Traffic Flow During the Restore Process.
–Access Control - choose this mode if your device is deployed inline as part of an access control deployment, that is, if you want to perform application, user, and URL control. A device configured to perform access control usually fails closed and blocks non-matching traffic. Rules explicitly specify the traffic to pass.
You should also choose this mode if you want to take advantage of your device’s specific hardware-based capabilities, which include (depending on model): high availability, strict TCP enforcement, fast-path rules, switching, routing, DHCP, NAT, and VPN.
In an access control deployment, you can also perform AMP for Networks, file control, Security Intelligence filtering, and network discovery.
–Network Discovery - choose this mode if your device is deployed passively, to perform host, application, and user discovery only.
The following table lists the interfaces, inline sets, and zones that the system creates depending on the detection mode you choose.
Note: Security zones are a Firepower Management Center-level configuration which the system does not create until you actually register the device to the Firepower Management Center. Upon registration, if the appropriate zone (Internal, External, or Passive) already exists on the Firepower Management Center, the registration process adds the listed interfaces to the existing zone. If the zone does not exist, the system creates it and adds the interfaces. For detailed information on interfaces, inline sets, and security zones, see the Firepower Management Center Configuration Guide.
The device provides a mechanism for archiving data so that configuration and event data can be restored in case of failure. As part of the initial setup, you can Enable Automatic Backups.
Enabling this setting creates a scheduled task that creates a weekly backup of the configurations on the device.
Read the EULA carefully and, if you agree to abide by its provisions, select the check box. Make sure that all the information you provided is correct, and click Apply. The device is configured according to your selections and is ready to be added to its managing Firepower Management Center.
Optionally, you can use the CLI to configure Firepower devices instead of using the device’s web interface.
Note that the CLI prompts you for much of the same setup information that a device’s setup web page does. For detailed information on these options, see Initial Setup Using the Web Interface.
1. Log into the device. Use admin
as the username and Admin123
as the password.
–For a device attached to a monitor and keyboard, log in at the console.
–If you connected a computer to the management interface of the device using an Ethernet cable, SSH to the interface’s default IPv4 address: 192.168.45.45.
The device immediately prompts you to read the EULA.
3. Change the password for the admin
account. This account has Administrator privileges and cannot be deleted.
This password allows the admin
user to log into the device’s web interface and its CLI; the admin
user has Configuration CLI access. Changing any user’s password for the web interface also changes the password for the CLI, and vice versa.
Cisco recommends that you use strong password that is at least eight alphanumeric characters of mixed case and includes at least one numeric character. Avoid using words that appear in a dictionary. For more information, see Change Password.
4. Configure network settings for the device.
First configure (or disable) IPv4 management settings, then IPv6. If you manually specify network settings, you must:
–enter IPv4 addresses, including the netmask, in dotted decimal form. For example, you could specify a netmask of 255.255.0.0.
–enter IPv6 addresses in colon-separated hexadecimal form. For an IPv6 prefix, specify the number of bits; for example, a prefix length of 112.
For more information, see Network Settings. The console may display messages as your settings are implemented.
5. Select whether you want to allow changing of the device’s network settings using the LCD panel.
6. Specify the detection mode based on how you deployed the device.
For more information, see Detection Mode. The console may display messages as your settings are implemented. When finished, the device reminds you to register this device to a Firepower Management Center, and displays the CLI prompt.
7. To use the CLI to register the device to the Firepower Management Center that will manage it, continue with the next section, Register a Firepower Device to a Management Center Using the CLI.
You must manage devices with a Firepower Management Center. If you do not register the device now, you must log in later and register it before you can add it to a Firepower Management Center.
If you configured a Firepower device using the CLI, Cisco recommends that you use the CLI to register the device to a Firepower Management Center at the conclusion of the setup script. It is easiest to register a device to its Firepower Management Center during the initial setup process, because you are already logged into the device’s CLI.
To register a device, use the configure manager add
command. A unique alphanumeric registration key is always required to register a device to a Firepower Management Center. This is a simple key that you specify, up to 37 characters in length, and is not the same as a license key.
In most cases, you must provide the Firepower Management Center’s hostname or the IP address along with the registration key, for example:
However, if the device and the Firepower Management Center are separated by a NAT device, enter a unique NAT ID along with the registration key, and specify DONTRESOLVE
instead of the hostname, for example:
1. Log in to the device as a user with Configuration CLI access level:
–If you are performing the initial setup from the console, you are already logged in as the admin
user, which has the required access level.
–Otherwise, SSH to the device’s management IP address or host name.
2. At the prompt, register the device to a Firepower Management Center using the configure manager add
command, which has the following syntax:
{
hostname |
IPv4_address |
IPv6_address | DONTRESOLVE}
specifies either the fully qualified host name or IP address of the Firepower Management Center. If the Firepower Management Center is not directly addressable, use DONTRESOLVE.
reg_key is the unique alphanumeric registration key, up to 37 characters in length, required to register a device to the Firepower Management Center.
nat_id is an optional alphanumeric string used during the registration process between the Firepower Management Center and the device. It is required if the hostname is set to DONTRESOLVE.
The device is ready to be added to a Firepower Management Center.
After you complete the initial setup process for an appliance and verify its success, Cisco recommends that you complete various administrative tasks that make your deployment easier to manage. You should also complete any tasks you skipped during the initial setup, such as device registration and licensing. For detailed information on any the tasks described in the following sections, as well as information on how you can begin to configure your deployment, see the Firepower Management Center Configuration Guide.
Note: If you want to use a serial or LOM/SOL connection to access your appliance’s console, you should redirect console output; see “Testing an Inline Bypass Interface Installation” in the Firepower 7000 Series Hardware Installation Guide. If you want to use LOM specifically, you must enable the feature as well as enable at least one LOM user; see Enabling LOM and LOM Users.
After you complete the initial setup, the only user on the system is the admin
user, which has the Administrator role and access. Users with that role have full menu and configuration access to the system, including via the shell or CLI. Cisco recommends that you limit the use of the admin
account (and the Administrator role) for security and auditing reasons.
Creating a separate account for each person who will use the system allows your organization not only to audit actions and changes made by each user, but also to limit each person’s associated user access role or roles. This is especially important on the Firepower Management Center, where you perform most of your configuration and analysis tasks. For example, an analyst needs access to event data to analyze the security of your network, but may not require access to administrative functions for the deployment.
The system includes ten predefined user roles designed for a variety of administrators and analysts. You can also create custom user roles with specialized access privileges.
By default, all appliances have an initial system policy applied. The system policy governs settings that are likely to be similar for multiple appliances in a deployment, such as mail relay host preferences and time synchronization settings. Cisco recommends that you use the Firepower Management Center to apply the same system policy to itself and all the devices it manages.
By default, the Firepower Management Center also has a health policy applied. A health policy, as part of the health monitoring feature, provides the criteria for the system continuously monitoring the performance of the appliances in your deployment. Cisco recommends that you use the Firepower Management Center to apply a health policy to all the devices it manages.
You should update the system software on your appliances before you begin any deployment. Cisco recommends that all the appliances in your deployment run the most recent version of the Firepower System. If you are using them in your deployment, you should also install the latest intrusion rule updates, VDB, and GeoDB.
By default, Firepower devices direct initialization status, or init, messages to the VGA port. If you want to use the physical serial port or SOL to access the console, Cisco recommends you redirect console output to the serial port after you complete the initial setup.
To redirect console output using the shell, you run a script from the appliance’s shell.
1. Using your keyboard/monitor or serial connection, log into the appliance’s shell using an account with Administrator privileges. The password is the same as the password for the appliance’s web interface.
2. Type expert
to display the shell prompt.
The prompt for the appliance appears.
3. At the prompt, set the console output by typing one of the following commands:
–To access the appliance using the VGA port:
–To access the appliance using the physical serial port:
–To access the appliance using LOM via SOL:
4. To implement your changes, reboot the appliance by typing sudo
reboot
.
1. Select System > Configuration.
2. Select Console Configuration.
3. Select a remote console access option:
–Select VGA to use the appliance's VGA port. This is the default option.
–Select Physical Serial Port to use the appliance's serial port, or to use LOM/SOL on a 8000 Series device.
4. To configure LOM via SOL, enter the appropriate settings:
– DHCP Configuration for the appliance ( DHCP or Static).
– IP Address to be used for LOM. The LOM IP address must be different from the management interface IP address of the appliance.
– Default Gateway for the appliance.
Remote console configuration for the appliance is saved. If you configured Lights-Out Management, you must enable it for at least one user; see Enabling LOM and LOM Users.
Cisco provides ISO images on its Support Site for restoring, or reimaging, Firepower managed devices to their original factory settings.
For more information, see the following sections:
Before you begin restoring your appliances to factory defaults, you should familiarize yourself with the expected behavior of the system during the restore process.
Before you begin the restore process, Cisco recommends that you delete or move any backup files that reside on your appliance, then back up current event and configuration data to an external location.
Restoring your appliance to factory defaults results in the loss of almost all configuration and event data on the appliance. Although the restore utility can retain the appliance’s license, network, console, and Lights-Out Management (LOM) settings, you must perform all other setup tasks after the restore process completes.
To avoid disruptions in traffic flow on your network, Cisco recommends restoring your appliances during a maintenance window or at a time when the interruption will have the least impact on your deployment.
Restoring a Firepower device that is deployed inline resets the device to a non-bypass (fail closed) configuration, disrupting traffic on your network. Traffic is blocked until you configure bypass-enabled inline sets on the device. For more information about editing your device configuration to configure bypass, see the Managing Devices chapter of the Firepower Management Center Configuration Guide.
To restore a Firepower device, you boot from the appliance’s internal flash drive and use an interactive menu to download and install the ISO image on the appliance. For your convenience, you can install system software and intrusion rule updates as part of the restore process.
Only reimage your appliances during a maintenance window. Reimaging resets appliances in bypass mode to a non-bypass configuration and disrupts traffic on your network until you reconfigure bypass mode. For more information, see Traffic Flow During the Restore Process.
Note that you cannot restore an appliance using its web interface. To restore an appliance, you must connect to it in one of the following ways:
You can connect a USB keyboard and VGA monitor to the appliance, which is useful for rack-mounted appliances connected to a KVM (keyboard, video, and mouse) switch. If you have a KVM that is remote-accessible, you can restore appliances without having physical access.
You can use a rollover serial cable (also known as a NULL modem cable or a Cisco console cable) to connect a computer to the appliance. See the hardware specifications for your appliance to locate the serial port. To interact with the appliance, use terminal emulation software such as HyperTerminal or XModem.
Lights-Out Management Using Serial over LAN
You can perform a limited set of actions on Management Centers and Firepower devices using Lights-Out Management (LOM) with a Serial over LAN (SOL) connection. If you do not have physical access to an appliance, you can use LOM to perform the restore process. After you connect to an appliance using LOM, you issue commands to the restore utility as if you were using a physical serial connection. Note that you can use Lights-Out Management on the default ( eth0
) management interface only. For more information, see Setting Up Lights-Out Management.
To restore a Firepower device:
1. Copy the image to an appropriate storage medium.
3. Reboot the appliance and invoke the restore utility.
Cisco provides ISO images for restoring appliances to their original factory settings. Before you restore an appliance, obtain the correct ISO image from the Support Site.
The ISO image you should use to restore an appliance depends on when Cisco introduced support for that appliance model. Unless the ISO image was released with a minor version to accommodate a new appliance model, ISO images are usually associated with major versions of the system software (for example, 5.2 or 5.3). To avoid installing an incompatible version of the system, Cisco recommends that you always use the most recent ISO image available for your appliance.
Firepower devices use an internal flash drive to boot the appliance so you can run the restore utility.
Cisco also recommends that you always run the latest version of the system software supported by your appliance. After you restore an appliance to the latest supported major version, you should update its system software, intrusion rules, and Vulnerability Database (VDB). For more information, see the release notes for the update you want to apply, as well as the Firepower Management Center Configuration Guide.
For your convenience, you can install system software and intrusion rule updates as part of the restore process. For example, you could restore a device to Version 6.0, and also update the device to Version 6.0.0.1 as part of that process. Keep in mind that only Management Centers require rule updates.
To obtain the restore ISO and other update files:
1. Using the user name and password for your support account, log into the Support Site ( https://sso.cisco.com/autho/forms/CDClogin.html).
2. Browse to the software download section ( https://software.cisco.com/download/navigator.html).
3. Enter a search string in the Find area on the page that appears for the system software you want to download and install.
For example, to find software downloads for Firepower, you would enter Firepower.
4. Find the image (ISO image) that you want to download.
You can click one of the links on the left side of the page to view the appropriate section of the page. For example, you would click 6.0 Images to view the images and release notes for Version 6.0 of the Firepower System.
5. Click the ISO image you want to download.
6. Copy the files to an HTTP (web) server, FTP server, or SCP-enabled host that the appliance can access on its management network.
If using FTP, the user name and password must be associated with an account on the FTP server. If you are writing to the server, the FTP server must be properly configured to accept the FTP write request from the user. Refer to the documentation for your FTP server for more information.
Begin the restore process by booting the appliance from an internal flash drive.
After you make sure that you have the appropriate level of access and connection to an appliance, as well the correct ISO image, use one of the following procedures to restore your appliance:
system shutdown
command from the CLI on a Firepower device, or the
shutdown -h now
command from an appliance’s shell (sometimes called expert mode).
For Firepower devices, Cisco provides a restore utility on an internal flash drive.
Note: Do not use a KVM console with USB mass storage to access the appliance for the initial setup because the appliance may attempt to use the mass storage device as a boot device.
If you need to restore an appliance to factory defaults and do not have physical access, you can use LOM to perform the restore process; see Starting the Restore Utility Using Lights-Out Management.
1. Using your keyboard/monitor or serial connection, log into the appliance using an account with Administrator privileges. The password is the same as the password for the appliance’s web interface.
2. Reboot the appliance. On a Firepower device, type:
–If the system is performing a database check, you may see the following message:
The system is not operational yet. Checking and repairing database are in progress. This may take a long time to finish.
–For a keyboard and monitor connection, quickly press one of the arrow keys to prevent the appliance from booting the currently installed version of the system.
–For a serial connection, when you see the BIOS boot options, press Tab slowly and repeatedly (to prevent the appliance from booting the currently installed version of the system). The LILO boot prompt appears. For example:
4. Indicate that you want to restore the system:
–For a keyboard and monitor connection, use the arrow keys to select System_Restore and press Enter.
–For a serial connection, type Restore_Serial at the prompt and press Enter.
The boot prompt appears after the following choices:
5. Select a display mode for the restore utility’s interactive menu:
–For a keyboard and monitor connection, type 0
and press Enter.
–For a serial connection, type 1
and press Enter.
If you do not select a display mode, the restore utility defaults to the standard console after 30 seconds.
Unless this is the first time you have restored the appliance to this major version, the utility automatically loads the last restore configuration you used. To continue, confirm the settings in a series of pages.
6. Press Enter to confirm the copyright notice.
If you need to restore an appliance to factory defaults and do not have physical access to the appliance, you can use LOM to perform the restore process. Note that if you want to use LOM to configure the initial setup, you must preserve the network settings during the initial setup. Note also that you can use Lights-Out Management on the default ( eth0
) management interface only.
Note: Before you can restore an appliance using LOM, you must enable the feature; see Setting Up Lights-Out Management.
To start the restore utility using Lights-Out Management:
1. At your computer’s command prompt, enter the IPMI command to start the SOL session:
Where IP_address is the IP address of the management interface on the appliance, username is user name of an authorized LOM account, and password is the password for that account. Note that IPMItool prompts you for the password after you issue the sol activate command.
If you are using a Firepower device, type expert to display the shell prompt.
2. Reboot the appliance as root user. For a Firepower device, type:
If the system is performing a database check, you may see the following message:
The system is not operational yet. Checking and repairing database are in progress. This may take a long time to finish.
When you see the BIOS boot options, press Tab slowly and repeatedly (to prevent the appliance from booting the currently installed version of the system) until the LILO boot prompt appears. For example:
4. At the boot prompt, start the restore utility by typing Restore_Serial.
The boot prompt appears after the following choices:
5. Type 1
and press Enter to load the interactive restore menu via the appliance’s serial connection.
Note: If you do not select a display mode, the restore utility defaults to the standard console after 30 seconds.
Unless this is the first time you have restored the appliance to this major version, the utility automatically loads the last restore configuration you used. To continue, confirm the settings in a series of pages.
6. Press Enter to confirm the copyright notice.
The restore utility for Firepower devices uses an interactive menu to guide you through the restoration.
Note: Only reimage your appliances during a maintenance window. Reimaging resets appliances in bypass mode to a non-bypass configuration and disrupts traffic on your network until you reconfigure bypass mode. For more information, see Traffic Flow During the Restore Process.
The menu displays the options listed in the following table.
Navigate the menu using your arrow keys. To select a menu option, use the up and down arrows. Use the right and left arrow keys to toggle between the OK and Cancel buttons at the bottom of the page.
The menu presents two different kinds of options:
X
. To accept your selection, press Enter while the OK button is highlighted.In most cases, complete menu options 1, 2, 4, and 5, in order. Optionally, add menu option 3 to install system software and intrusion rule updates during the restore process.
If you are restoring an appliance to a different major version from the version currently installed on the appliance, a two-pass restore process is required. The first pass updates the operating system, and the second pass installs the new version of the system software.
If this is your second pass, or if the restore utility automatically loaded the restore configuration you want to use, you can start with menu option 4 : Downloading the ISO and Update Files and Mounting the Image. However, Cisco recommends you double-check the settings in the restore configuration before proceeding.
Note: To use a previously saved configuration, start with menu option 6: Saving and Loading Restore Configurations. After you load the configuration, skip to menu option 4: Downloading the ISO and Update Files and Mounting the Image.
To restore an appliance using the interactive menu, use the following steps:
1. 1 IP Configuration — see Identifying the Appliance’s Management Interface.
2. 2 Choose the transport protocol — see Specifying ISO Image Location and Transport Method.
3. 3 Select Patches/Rule Updates (optional) — Updating System Software and Intrusion Rules During Restore.
4. 4 Download and Mount ISO — see Downloading the ISO and Update Files and Mounting the Image.
5. 5 Run the Install — see Invoking the Restore Process.
The first step in running the restore utility is to identify the management interface on the appliance you want to restore, so that the appliance can communicate with the server where you copied the ISO and any update files. If you are using LOM, remember that the management IP address for the appliance is not the LOM IP address.
To identify the appliance’s management interface:
1. From the main menu, select 1 IP Configuration.
2. Select the appliance’s management interface (generally eth0).
3. Select the protocol you are using for your management network: IPv4 or IPv6.
Options for assigning an IP address to the management interface appear.
4. Select a method to assign an IP address to the management interface: Static or DHCP :
–If you select Static, a series of pages prompts you to manually enter the IP address, network mask or prefix length, and default gateway for the management interface.
–If you select DHCP, the appliance automatically detects the IP address, network mask or prefix length, and default gateway for the management interface, then displays the IP address.
5. When prompted, confirm your settings.
If prompted, confirm the IP address assigned to the appliance’s management interface.
After you configure the management IP address that the restore process will use to download files it needs, you must identify which ISO image you will use to restore the appliance. This is the ISO image that you downloaded from the Support Site (see Obtaining the Restore ISO and Update Files), and stored on a web server, FTP server, or SCP-enabled host.
The interactive menu prompts you to enter any necessary information to complete the download, as listed in the following table.
Note that the restore utility will also look for update files in the ISO image directory.
To specify the restore files’ location and transport method:
1. From the main menu, select 2 Choose the transport protocol.
2. On the page that appears, select either HTTP, FTP, or SCP.
If using FTP, the user name and password must be associated with an account on the FTP server. If you are writing to the server, the FTP server must be properly configured to accept the FTP write request from the user. Refer to the documentation for your FTP server for more information.
3. Use the series of pages presented by the restore utility to provide the necessary information for the protocol you chose, as described in Table 3 .
If your information was correct, the appliance connects to the server and displays a list of the Cisco ISO images in the location you specified.
4. Select the ISO image you want to use.
5. When prompted, confirm your settings.
6. Do you want to install a system software or intrusion rule update as a part of the restore process?
–If yes, continue with the next section, Updating System Software and Intrusion Rules During Restore.
–If no, continue with Downloading the ISO and Update Files and Mounting the Image. Note that you can use the system’s web interface to manually install updates after the restore process completes.
Optionally, you can use the restore utility to update the system software and intrusion rules after the appliance is restored to the base version in the ISO image. Note that only Management Centers require rule updates.
The restore utility can only use one system software update and one rule update. However, system updates are cumulative back to the last major version; rule updates are also cumulative. Cisco recommends that you obtain the latest updates available for your appliance; see Obtaining the Restore ISO and Update Files.
If you choose not to update the appliance during the restore process, you can update later using the system’s web interface. For more information, see the release notes for the update you want to install, as well as the Updating System Software chapter in the Firepower Management Center Configuration Guide.
To install updates as part of the restore process:
1. From the main menu, select 3 Select Patches/Rule Updates.
The restore utility uses the protocol and location you specified in the previous procedure (see Specifying ISO Image Location and Transport Method) to retrieve and display a list of any system software update files in that location. If you are using SCP, enter your password when prompted to display the list of update files.
2. Select the system software update, if any, you want to use.
You do not have to select an update; press Enter without selecting an update to continue. If there are no system software updates in the appropriate location, the system prompts you to press Enter to continue.
The restore utility retrieves and displays a list of rule update files. If you are using SCP, enter your password when prompted to display the list.
3. Select the rule update, if any, you want to use.
You do not have to select an update; press Enter without selecting an update to continue. If there are no rule updates in the appropriate location, the system prompts you to press Enter to continue.
The final step before you invoke the restore process is to download the necessary files and mount the ISO image.
To download and mount the ISO image:
1. From the main menu, select 4 Download and Mount ISO.
2. When prompted, confirm your choice. If you are downloading from an SCP server, enter your password when prompted.
The appropriate files are downloaded and mounted.
After you download and mount the ISO image, you are ready to invoke the restore process. If you are restoring an appliance to a different major version from the version currently installed on the appliance, a two-pass restore process is required. The first pass updates the operating system, and the second pass installs the new version of the system software.
First Pass of Two (Changing Major Versions Only)
When restoring an appliance to a different major version, a first pass by the restore utility updates the appliance’s operating system, and, if necessary, the restore utility itself.
Note: If you are restoring an appliance to the same major version, or if this is your second pass through the process, skip to the next procedure: Second or Only Pass.
To perform the first pass of a two-pass restore process:
1. From the main menu, select 5 Run the Install.
2. When prompted (twice), confirm that you want to reboot the appliance.
3. Monitor the reboot and invoke the restore process again:
If the system is performing a database check, you may see the following message:
The system is not operational yet. Checking and repairing database are in progress. This may take a long time to finish.
For a keyboard and monitor connection, quickly press one of the arrow keys to prevent the appliance from booting the currently installed version of the system.
For a serial or SOL/LOM connection, when you see the BIOS boot options, press Tab slowly and repeatedly until the LILO boot prompt appears. For example:
4. Indicate that you want to restore the system:
–For a keyboard and monitor connection, use the arrow keys to select System_Restore and press Enter.
–For a serial connection, type Restore_Serial at the prompt and press Enter.
5. Select a display mode for the restore utility’s interactive menu:
–For a keyboard and monitor connection, type 0
and press Enter.
–For a serial or SOL/LOM connection, type 1
and press Enter.
If you do not select a display mode, the restore utility defaults to the standard console after 30 seconds.
Unless this is the first time you have restored the appliance to this major version, the utility automatically loads the last restore configuration you used. To continue, confirm the settings in a series of pages.
6. Press Enter to confirm the copyright notice.
Use the following procedure to perform the second or only pass through the restore process.
To perform the second or only pass through the restore process:
1. From the main menu, select 5 Run the Install.
2. Confirm that you want to restore the appliance and continue with the next step.
3. Choose whether you want to delete the appliance’s license and network settings. Deleting these settings also resets display (console) and LOM settings.
In most cases, you do not want to delete these settings, because it can make the initial setup process shorter. Changing settings after the restore and subsequent initial setup is often less time consuming than trying to reset them now. For more information, see Next Steps.
4. Type your final confirmation that you want to restore the appliance.
The final stage of the restore process begins. When it completes, if prompted, confirm that you want to reboot the appliance.
Note: Reimaging resets appliances in bypass mode to a non-bypass configuration and disrupts traffic on your network until you reconfigure bypass mode. For more information, see Traffic Flow During the Restore Process.
You can use the restore utility to save a restore configuration to use if you need to restore a Firepower device again. Although the restore utility automatically saves the last configuration used, you can save multiple configurations, which include:
SCP passwords are not saved. If the configuration specifies that the utility must use SCP to transfer ISO and other files to the appliance, you will have to re-authenticate to the server to complete the restore process.
The best time to save a restore configuration is after you provide the information listed above, but before you download and mount the ISO image.
To save a restore configuration:
1. From the restore utility’s main menu, select 6 Save Configuration.
The utility displays the settings in the configuration you are saving.
2. When prompted, confirm that you want to save the configuration.
3. When prompted, enter a name for the configuration.
To load a saved restore configuration:
1. From the main menu, select 7 Load Configuration.
The utility presents a list of saved restore configurations. The first option, default_config, is the configuration you last used to restore the appliance. The other options are restore configurations that you have saved.
2. Select the configuration you want to use.
The utility displays the settings in the configuration you are loading.
3. When prompted, confirm that you want to load the configuration.
The configuration is loaded. If prompted, confirm the IP address assigned to the appliance’s management interface.
Restoring your appliance to factory default settings results in the loss of almost all configuration and event data on the appliance, including bypass configurations for devices deployed inline. For more information, see Traffic Flow During the Restore Process.
After you restore an appliance, you must complete an initial setup process:
Note that deleting license and network settings also resets display (console) and LOM settings. After you complete the initial setup process:
If you need to restore a Firepower device to factory defaults and do not have physical access to the appliance, you can use Lights-Out Management (LOM) to perform the restore process. Note that you can use Lights-Out Management on the default ( eth0
) management interface only.
Note: The baseboard management controller (BMC) for a Firepower 71xx, Firepower 82xx, or a Firepower or AMP 83xx device is only accessible via 1Gbps link speeds when the host is powered on. When the device is powered down the BMC can only establish Ethernet link at 10 and 100Mbps. Therefore if LOM is being used to remotely power the device, connect the device to the network using 10 and 100Mbps link speeds only.
The LOM feature allows you to perform a limited set of actions on a Firepower device, using a Serial over LAN (SOL) connection. With LOM, you use a command line interface on an out-of-band management connection to perform tasks such as viewing the chassis serial number, or monitoring conditions such as fan speed and temperature.
The syntax of LOM commands depends on the utility you are using, but LOM commands generally contain the elements listed in the following table.
Note that the chassis power off
and chassis power cycle
commands are not valid on 70xx Family appliances. For a full list of LOM commands supported by the Firepower System, see the Configuring Appliance Settings chapter in the Firepower Management Center Configuration Guide.
Note: In some power cycle scenarios, the baseboard management controller (BMC) of a Firepower 7050 connected to the network via the management interface could lose the IP address assigned to it by the DHCP server. Because of this, Cisco recommends you configure the Firepower 7050 BMC with a static IP address. Alternately, you can disconnect the network cable and reconnect it, or remove and restore power to the device to force renegotiation of the link.
Before you can restore an appliance using LOM, you must enable LOM for both the appliance and the user who will perform the restore. Then, use a third-party Intelligent Platform Management Interface (IPMI) utility to access the appliance. You must also make sure you redirect the appliance’s console output to the serial port.
Before you can use LOM to restore an appliance, you must enable and configure the feature. You must also explicitly grant LOM permissions to users who will use the feature.
You configure LOM and LOM users on a per-appliance basis using each appliance’s local web interface. That is, you cannot use the Management Center to configure LOM on a Firepower device. Similarly, because users are managed independently per appliance, enabling or creating a LOM-enabled user on the Management Center does not transfer that capability to users on Firepower devices.
LOM users also have the following restrictions:
Note: For detailed instructions on the following tasks, see the Configuring Appliance Settings chapter in the Firepower Management Center Configuration Guide.
1. Select System > Configuration, then click Console Configuration.
2. Enable remote access using the Physical Serial Port, then specify the LOM IP address, netmask, and default gateway (or use DHCP to have these values automatically assigned).
Note: The LOM IP address must be different from the management interface IP address of the appliance.
To enable LOM capabilities for a Firepower System user:
1. Select System > User Management, then either edit an existing user to add LOM permissions, or create a new user that you will use for LOM access to the appliance.
2. On the User Configuration page, enable the Administrator role if it is not already enabled.
3. Enable the Allow Lights-Out Management Access check box and save your changes.
You use a third-party IPMI utility on your computer to create an SOL connection to the appliance.
If your computer is running Linux or Mac OS, use IPMItool. Although IPMItool is standard with many Linux distributions, you must install IPMItool on a Mac. First, confirm that your Mac has Apple's xCode developer tools package installed. Also, make sure the optional components for command line development are installed ("UNIX Development” and "System Tools" in newer versions, or "Command Line Support" in older versions). Finally, install MacPorts and IPMItool. For more information, use your favorite search engine or see these sites:
For Windows environments, use ipmiutil, which you must compile yourself. If you do not have access to a compiler, you can use ipmiutil itself to compile. For more information, use your favorite search engine or see this site:
You can securely scrub the hard drive on Management Centers and Firepower devices to ensure that its contents can no longer be accessed. For example, if you need to return a defective appliance that contains sensitive data, you can use this feature to overwrite the data.
This mode of scrubbing the disk meets the following military standard:
The DoD scrub sequence is compliant with the DoD 5220.22-M procedure for sanitizing removable and non-removable rigid disks which requires overwriting all addressable locations with a character, its complement, then a random character, and verify. Please refer to the DoD document for additional constraints.
You scrub the hard drive using an option in the interactive menu described in Using the Interactive Menu to Restore an Appliance.
1. Follow the instructions in one of the following sections to display the restore utility’s interactive menu, depending on how you are accessing the appliance:
–Starting the Restore Utility Using KVM or Physical Serial Port
–Starting the Restore Utility Using Lights-Out Management
2. From the main menu, select 8 Wipe Contents of Disk.
3. When prompted, confirm that you want to scrub the hard drive.
The hard drive is scrubbed. The scrub process may take several hours to complete; larger drives take longer.