Install Guide FirePower Module On Cisco ASA v1.1
Install Guide FirePower Module On Cisco ASA v1.1
1
Contents
I. Introduction .................................................................................................... 3
1) Traffic Flow: ............................................................................................. 3
2) Licensing Options:........................................................................................ 4
3) Management Options: .................................................................................. 4
4) Compatibility with ASA Features: ................................................................... 5
5) Prerequisites: .............................................................................................. 5
II. Wiring.............................................................................................................. 6
1) Transparent Mode ........................................................................................ 6
2) Sample Network Configuration....................................................................... 7
III. Install and Set Up the ASA FirePower (SFR) Services Module ................................. 7
Step 1: Reset .................................................................................................. 7
Step 2: Download the ASA SFR Module on the ASA. ............................................. 8
Step 3: Configure the ASA SFR Boot image location. ............................................ 9
Step 4: Load the ASA SFR boot image. ............................................................... 9
Step 5: Set up the ASA SFR for basic network connectivity. .................................10
Step 6: Install the ASA SFR system package file from the FTP server. ...................11
Step 7: Final configuration of the FirePower module (SFR) ...................................12
Step 8: Configure and Manage ASA FrePOWER Module Using ASDM ......................13
Step 8: Configure and Manage ASA FirePOWER Module Using Management Center..17
Step 9: Send Traffic to FirePOWER Module to be inspected ...................................19
Step 10: FirePOWER Code Update and Rule Update .............................................20
V. Bibliography .....................................................................................................22
2
I. Introduction
The ASA FirePOWER module supplies next-generation firewall services, including Next-Generation Intrusion
Prevention System (NGIPS), Application Visibility and Control (AVC), URL filtering, and Advanced Malware
Protection (AMP).
The ASA FirePOWER module runs a separate application from the ASA. The module can be a hardware module
(on the ASA 5585-X only) or a software module (all other models). The SFR is the name of the
FirePOWER module on the ASA, its came from the SourceFire Technology bought by Cisco few years
ago.
For ASA model software and hardware compatibility with the ASA FirePOWER module, see Cisco ASA
Compatibility (http://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html).
1) Traffic Flow:
Similar to deploying a standalone IPS solution, the integrated FirePOWER module supports inline mode and
passive monitoring mode. Inline mode provides additional benefits than monitoring mode. FirePOWER
deployed in inline mode provides best case deep inspection analysis before packets are returned to the ASA
main plane. It proactively takes action when malicious traffic is detected.
1. The ASA decrypts the traffic if it was part of an established VPN tunnel.
2. Packets are checked against firewall policies such as ACL, NAT and Inspection.
3. Optionally, traffic is sent to the FirePOWER Module for deeper level inspection. You may configure to
send all traffic or only high risk traffic to the FirePOWER module to conserve system resources.
4. Traffic passed FirePOWER inspection is returned to the ASA main engine for next step routing
decision.
5. Traffic is then passed to the ASAs egress interface to be forwarded to the rest of the network.
3
2) Licensing Options:
Intrusion detection and prevention (IPS license) contains also Application Visibility with Control
(AVC) and Geolocation
File control and advanced malware protection (AMP)
Application, user, and URL control (URL Filtering)
IPS license is required for the AVC, AMP and URL Filtering license.
3) Management Options:
ASDM: Used when youre running the ASA + Firepower (SFR) O.S. For standalone single site deployment:
Suitable for SOHO customers who do not have more than 3 devices and do not want to manage a separate sever
infrastructure.
FirePOWER Device Manager (FDM): Used when youre running the FTD O.S. Manages Firepower
Threat Defense on Low-End & Mid-Range Platforms (Workflows, Diagrams and Default configuration options)
FirePOWER Management Center (FMC): The Management Console is a hardware or virtual appliance
installed centrally to manage multiple FirePOWER deployments at same time. Suitable for enterprise who have
more than 5 devices deployed with FirePOWER.
FirePOWER Threat Defense (FTD): Unified image of the ASA and Firepower. Same purpose than
ASDM. Feature Highlights: Unified Objects, Migration tool, Unified GUI for identity, NAT, Access, IPS, and
File Policies, Graphical Representation of Policy Deployment, System Health Monitoring Dashboard, Dynamic
Theme, Routed Mode Support.
4
4) Compatibility with ASA Features:
The ASA includes many advanced application inspection features, including HTTP inspection. However, the
ASA FirePOWER module provides more advanced HTTP inspection than the ASA provides, as well as
additional features for other applications, including monitoring and controlling application usage.
Do not configure ASA inspection on HTTP traffic that you send to the ASA FirePOWER module.
Do not configure Cloud Web Security (ScanSafe) inspection on traffic that you send to the ASA
FirePOWER module. If traffic matches both your Cloud Web Security and ASA FirePOWER service policies,
the traffic is forwarded to the ASA FirePOWER module only. If you want to implement both services, ensure
there is no overlap between the traffic matching criteria for each service.
Do not enable the Mobile User Security (MUS) server; it is not compatible with the ASA FirePOWER
module.
5) Prerequisites:
a) Requirements:
Cisco recommends that your system meet these requirements before you attempt the procedures that are
described in this document:
- Ensure that you have at least 3GB of free space on the flash drive (disk0), in addition to the size of the
boot software.
- Ensure that you have access to the privileged EXEC mode. In order to access the privileged EXEC
mode, enter the enable command into the CLI. If a password was not set, then press Enter:
ciscoasa> enable
Password:
ciscoasa#
b) Components Used
In order to install the FirePOWER Services on a Cisco ASA, these components are required:
5
II. Wiring
1) Transparent Mode
These models run the ASA FirePOWER module as a software module, and the ASA FirePOWER module shares
the Management 0/0 or Management 1/1 interface (depending on your model) with the ASA. The default IP
address for the management physical interface is 192.168.45.45. If you are connected to the inside interface:
192.168.1.1
Keep in mind that FirePOWER management interface must have internet access for signature updates and
communication to the Management Center. If there is a FireSIGHT Management Center (FMC) you dont need
to deploy internet access for your managed devices. The following figure shows the recommended network
deployment for the ASA 5500-X or ISA 3000 with the ASA FirePOWER module when you have an inside
router:
If you do not use an inside router, you can manage the ASA over the inside interface (using the BVI IP address)
and not use the Management interface for ASA management:
Note : You can avoid using an external switch if you have extra interfaces that you can assign to the inside
bridge group. Be sure to set all bridge group interfaces to the same security level, allow same security
communication, and configure NAT for each bridge group member. See the ASA interfaces configuration guide
chapter for more information.
6
2) Sample Network Configuration
III. Install and Set Up the ASA FirePower (SFR) Services Module
Step 1: Reset
Shutdown and uninstall the CX or IPS software module on the ASA then reload the ASA if required.
Use the show module command to verify the ASA software modules status. Before you can install the
ASA FirePOWER services module, if the ASA is currently running the CX or the IPS software module already,
shutdown then uninstall the CX or IPS module using the sw-module module vxsc | ips uninstall command. The
ASA can only run one ASA software module at a time.
When you reimage a module, use the same shutdown and uninstall commands that are used in
order to remove an old SFR image. Here is an example:
7
Step 2: Download the ASA SFR Module on the ASA.
1. Download the ASA SFR system software from Cisco.com to an HTTP, HTTPS or FTP server that
is accessible from the ASA SFR management interface.
2. Download the boot image to the device. You can use either the Cisco Adaptive Security Device
Manager (ASDM) or the ASA CLI in order to download the boot image to the device.
Complete these steps in order to download the boot image via the ASA CLI:
a. Download the boot image on an FTP, TFTP, HTTP or HTTPS server.
b. Enter a copy command into CLI in order to download the boot immage to the flash drive.
Here is an example that uses HTTP protocol (replace the <HTTP_Server> with your server IP
address or host name):
ciscoasa# copy http://<HTTP_Server>/asasfr-5500x-boot-6.1.0-330.img
disk0:/asasfr-5500x-boot-6.1.0-330.img
If you are using a CoreFTP Server to setup FTP server on your laptop. Connected to the management interface
on ASA
https://software.cisco.com/download/release.html?mdfid=286271171&softwareid=286277393&release=6.1.0&relind=AVAI
LABLE&rellifecycle=&reltype=latest
8
Step 3: Configure the ASA SFR Boot image location.
Enter this command in order to configure the ASA SFR boot image location in the ASA flash drive.
Module sfr will be recovered. This may erase all configuration and all data on that
device and attempt to download/install a new image for it. This may take several
minutes.
Confirm the prompt to recover the SFR module. The ASA SFR boot image will take about 10 minutes
to load after you confirm the prompt.
Use the show module SFR command from the ASA CLI to check the status. The status should be
Recover, and the status will stay at the Recover state even after the ASA SFR boot image has been successfully
loaded.
Optionally, the show module SFR log console command can be used to check the ASA SFR logs.
Optionally, the debug module-boot CLI command can be used to debug the module boot process.
Wait few minutes then continue to the next step to console into ASA SFR console. Once you can
console into the ASA SFR, it means the ASA SFR boot image has been successfully loaded.
9
Step 5: Set up the ASA SFR for basic network connectivity.
From the ASA CLI, establish a session into the ASA SFR console. Log in using the default admin
username with the default Admin123 password.
Use the setup command to run the setup dialog to configure the basic network settings as follows, you can
configure both IPv4 and IPv6 management addresses. Here is an example:
Asasfr-boot> setup
Use the ASA SFR CLI to ping the FTP Server to test connectivity. Use the key sequence Ctrl-C to stop the
pings.
asasfr-boot>ping 10.11.11.250
PING 10.82.60.193 (10.82.60.193): 56 data bytes
64 bytes from 10.18.84.1: seq=0 ttl=255 time=0.583 ms
64 bytes from 10.18.84.1: seq=1 ttl=255 time=0.225 ms
64 bytes from 10.18.84.1: seq=2 ttl=255 time=0.245 ms
10
Step 6: Install the ASA SFR system package file from the FTP server.
The ASA SFR package filename is asasfr-sys-6.1.0-330.pkg. From the ASA SFR CLI, use the system
install FTP://10.11.11.250/asasfr-sys-6.1.0-330.pkg command, as demonstrated below to install the ASA SFR
v6.1.0 system package from the FTP server.
Wait about 15 to 20 minutes for the package to download and extract, then type Y when prompted to
continue with the upgrade.
When the installation is done, press Enter at the prompt to reboot the ASA SFR.
When the ASA SFR reboots, you will be returned to the ASA CLI. Allow for about 40 minutes for the
system package to install and about 40 minutes for the ASA SFR module to reboot (the time depends on the
ASA model)
11
Step 7: Final configuration of the FirePower module (SFR)
FWI-FIREPOWER-VDM03#session sfr
Login : admin
Password : Admin123
License ....
You can register the sensor to an Defense Center and use the Defense Center to manage
it. Note that registering the sensor to a Defense Center desables on-sensor FirePOWER
Services management capabilities.
When registering the sensor to a Defense Center a unique alphanumeric registration key
is always required. In most cases, to register a sensor to a Defense Center, you must
provide the hostname or the IP ardress along with the registration key.
configure manager add [hostname | ip address ] [registration key ]
However, if the sensor and the Defense Center are separated by a NAT device, you must
enter a unique NAT ID, along witth the unique registration key.
configure manager add DONTRESOLVE [registration key ] [ NAT ID ]
Later, using the web interface on the Defense Center, you must use the same
registration key and, if necessary, the same NAT ID when you add this sensor to the
Defense Center.
12
Step 8: Configure and Manage ASA FrePOWER Module Using ASDM
Preparation:
By default, HTTP service is not enabled on the ASA. You need first enable HTTP service and specify the
network and interface where access is allowed.
You may choose to install the ASDM client on your local computer or use Run ASDM directly from a Java-
enabled browser. I recommend download a local copy of the ASDM client and use without going through the
web browser every time.
Licensing:
Launch and Log in ASDM using the ASAs username and password. (Not the FirePOWER)
To configure the FirePOWER module, you must login ASDM with an ASA username that has privilege level 15.
If you could not find the FirePOWER Configuration option and see the warning message under ASA
FirePOWER Status tab, thats because you logged in using an account without privilege level 15.
In ASDM, choose Configuration ASA FirePOWER Configuration tab on the lower left corner and click
Licenses.
If you have not added any licenses, you will see a blank panel with the only option Add New License option.
Click on Add New License.
13
The licensing procedure goes in the following order:
You should have the Output_claim_xxxxxxxx.pdf file : Software License Claim Certificate
Copy the License Key from ASDM ASA FirePOWER Configuration Licenses and paste to Cisco web portal.
14
Enter your information and click on Finish.
Your license file is generated and emailed to you. You can also download it directly. You will receive a .lic file
in plain text format.
Open the .lic file using a text editor like Notepad. Copy and paste the content between BEGIN and END into
the blank field of License on FirePOWER License in ASDM.
15
Tip 1: Do not include anything outside the BEGIN and END lines. Sometimes the license comes with Device
and Feature descriptions. You must exclude them.
Tip 2: If you purchased multiple licenses such as Malware and URL Filtering, the licenses will come in one .lic
file.
Tip 3: Protection and Control licenses should come with the product when you purchased the ASA 5506-X with
FirePOWER. Sometime I have seen customers did not receive the base Protection and Control license PAKs.
You will need to open a TAC Service Request and they will generate a license file for you free of charge.
Once all the licenses have been activated, youll see a summary like below.
For more information on the licensing for Firepower system please look at the below link:
http://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-config-
guide-v601/Licensing_the_Firepower_System.pdf
16
Step 8: Configure and Manage ASA FirePOWER Module Using Management Center
For centralized management model, enterprise customers may manage multiple FirePOWER installs through a
single management console. Before Ciscos acquisition, SourceFire called it Defense Center. Cisco also called it
FireSignt Management Console I will cover configure and manage ASA FirePOWER Module using
Management Center. Follow the following steps to register a FirePOWER install with the Management Center.
Mgmt_Centr_IP is the Management Centers IP address. Make sure it is reachable from the FirePOWERs
management IP.
reg_key is a secret key that is shared between the Management Center and the FirePOWER install. For example,
We can see that is not registered to our FireSIGHT Management Center (Pending). You have to Add
the Device to your Management Device Center.
If the registration went successfully, you should see the newly registered FirePOWER sensor in the device list. If
it fails, make sure from the Management Center you can reach the FirePOWER management IP and vice versa.
17
Add FirePOWER feature licenses in Management Center
In the Management Center, go to System Licenses and click on Add New License. Follow the same procedure
activating licenses outlined earlier.
The Management Center acts as a license repository that manages all the licenses in an organization. A license
can be applied to one compatible FirePOWER module at a time. Once the license is used on a FirePOWER
module, you may not reuse it on a different module. It is better to apply license through the FirePOWER
Management Center (FMC).
To apply the installed licenses to a FirePOWER module, go to Devices Device Management and click on
License. If you have unused and compatible licenses available, you can check the boxes to activate the feature.
>Show managers
Host : 10.11.10.15
Registration Key : Cisco
Registration : Completed
RPC Status :
18
Step 9: Send Traffic to FirePOWER Module to be inspected
In order to redirect traffic to the ASA SFR module, you must create a service policy that identifies specific
traffic. Complete these steps in order to redirect traffic to an ASA SFR module:
1. Select the traffic that should be identified with the access-list command. In this example, all of the traffic
from all of the interfaces is redirected. You can do this for specific traffic as well.
3. Specify the deployment mode. You can configure your device in either a passive (monitor-only) or inline
(normal) deployment mode.
You cannot configure both a passive mode and inline mode at the same time on the ASA. Only one type
of security policy is allowed.
In an inline deployment, after the undesired traffic is dropped and any other actions that are applied by
policy are performed, the traffic is returned to the ASA for further processing and ultimate transmission.
This example shows how to create a policy-map and configure the ASA SFR module in the inline mode:
In a passive deployment, a copy of the traffic is sent to the SFR service module, but it is not returned to the
ASA. Passive mode allows you to view the actions that the SFR module would have completed in regards
to the traffic. It also allows you to evaluate the content of the traffic, without an impact to the network.
If you want to configure the SFR module in passive mode, use the monitor-only keyword (as shown in the
next example). If you do not include the keyword, the traffic is sent in inline mode.
19
Warning: The monitor-only mode does not allow the SFR service module to deny or block malicious traffic.
Caution: It might be possible to configure an ASA in monitor-only mode with the use of the interface-level traffic-
forward sfr monitor-only command; however, this configuration is purely for demonstration functionality and should not
be used on a production ASA. Any issues that are found in this demonstration feature are not supported by the Cisco
Technical Assistance Center (TAC). If you desire to deploy the ASA SFR service in passive mode, configure it with the
use of a policy-map.
4. Specify a location and apply the policy. You can apply a policy globally or on an interface. In order to
override the global policy on an interface, you can apply a service policy to that interface.
The global keyword applies the policy map to all of the interfaces, and the interface keyword applies the
policy to one interface. Only one global policy is allowed. In this example, the policy is applied globally:
It is a good practice to periodically check and run software code updates, security patches. Similar to anti-virus
signature updates, FirePOWERs rule database also need to be updated as soon as the new ones are released.
One of the benefits of centralized management model is that you only need to download the updates once and
push to all compatible FirePOWER modules in the field. To download updates, go to System Updates. Click
on the Download updates button on the lower right corner to make the Management Center to go out to Cisco
update center and pull all applicable updates. And you can choose which one you want to install.
To install an update, click the install icon and select the FirePOWER modules you want to push this update to.
20
For major software updates, it requires the reboot of the FirePOWER module. It is mandatory to perform the
update during a maintenance window.
Product Updates
Rule Updates
Geolocation Updates
21
V. Bibliography
http://www.cisco.com/c/en/us/support/security/firepower-ngfw/products-installation-guides-list.html
http://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118644-configure-firepower-00.html
http://www.cisco.com/c/en/us/support/security/asa-5500-series-next-generation-firewalls/products-licensing-information-
listing.html
http://www.cisco.com/c/en/us/products/security/asa-firepower-services/index.html
https://www.speaknetworks.com/cisco-asa-5506-x-firepower-configuration-example-part-1/
https://www.speaknetworks.com/cisco-asa-5506-x-firepower-configuration-example-part-2/
https://www.speaknetworks.com/configure-and-manage-asa-firepower-module-using-asdm-part-3/
https://www.speaknetworks.com/configure-and-manage-asa-firepower-module-using-management-center-part-4/
https://www.youtube.com/playlist?list=PL4bfAs_xrokF5mPKIJUCTmd2nGxr5ujSt
22