Reimage FTD
Reimage FTD
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2018–2020 Cisco Systems, Inc. All rights reserved.
CONTENTS
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
iii
Contents
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
iv
CHAPTER 1
About the Firepower 1000/2100 Security
Appliance CLI
• Overview of the Firepower 1000/2100 Security Appliance FXOS CLI, on page 1
• FXOS CLI Hierarchy, on page 1
• Online Help for the CLI, on page 4
Note The CLI on the SSH client management port defaults to Firepower Threat Defense. You can get to the FXOS
CLI using the connect fxos command.
The CLI on the Firepower 1000/2100 console port defaults to the FXOS CLI prompt. You can get to the
Firepower Threat Defense CLI using the connect ftd command.
Once logged into the FXOS CLI, you can use the commands described below to view and troubleshoot the
FXOS platform for your Firepower 1000 or Firepower 2100 series device.
If Firepower Threat Defense is installed on your Firepower 1000/2100 device,the FXOS CLI does not allow
you to modify the configuration. If you attempt to perform any configuration changes with the FXOS CLI,
the commit-buffer command returns an error.
For more information about the Firpower Threat Defense CLI, see the Command Reference for Firpower
Threat Defense (http://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_
Reference_for_Firepower_Threat_Defense.html).
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
1
About the Firepower 1000/2100 Security Appliance CLI
FXOS CLI Hierarchy
commands to move from higher-level modes to modes in the next lower level , and you use the exit command
to move up one level in the mode hierarchy. You can also use the top command to move to the top level in
the mode hierarchy.
Each mode contains a set of commands that can be entered in that mode. Most of the commands available in
each mode pertain to the associated managed object.
The CLI prompt for each mode shows the full path down the mode hierarchy to the current mode. This helps
you to determine where you are in the command mode hierarchy, and it can be an invaluable tool when you
need to navigate through the hierarchy.
The following table lists the main command modes, the commands used to access each mode, and the CLI
prompt associated with each mode.
The following diagram outlines the commands that can be executed from the FXOS CLI top level to access
the FXOS command shell, local management command shell, and Firepower Threat Defense CLI. Note that
console access is required.
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
2
About the Firepower 1000/2100 Security Appliance CLI
FXOS CLI Hierarchy
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
3
About the Firepower 1000/2100 Security Appliance CLI
Online Help for the CLI
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
4
CHAPTER 2
Global FXOS CLI Commands
• Global FXOS CLI Commands, on page 5
Command Description
terminal Terminal.
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
5
Global FXOS CLI Commands
Global FXOS CLI Commands
Command Description
backup Backup.
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
6
CHAPTER 3
FXOS CLI Troubleshooting Commands
• FXOS CLI Chassis Mode Troubleshooting Commands, on page 7
• FXOS CLI Eth-Uplink Mode Troubleshooting Commands, on page 12
• FXOS CLI Fabric Interconnect Mode Troubleshooting Commands, on page 14
• Connect Local-Mgmt Troubleshooting Commands for the Firepower 2100 in Platform Mode, on page
17
• FXOS CLI Security Services Mode Troubleshooting Commands, on page 22
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
7
FXOS CLI Troubleshooting Commands
FXOS CLI Chassis Mode Troubleshooting Commands
Operability: Operable
Power State: On
Fan 3:
Overall Status: Operable
Operability: Operable
Power State: On
Fan 4:
Overall Status: Operable
Operability: Operable
Power State: On
Server 1:
Overall Status: Ok
Memory Array 1:
Current Capacity (MB): 32768
Populated: 2
DIMMs:
ID Overall Status Capacity (MB)
--- ------------------------ -------------
1 Operable 16384
2 Operable 16384
CPU 1:
Presence: Equipped
Cores: 8
Product Name: Intel(R) Xeon(R) CPU D-1548 @ 2.00GHz
Vendor: GenuineIntel
Thermal Status: OK
Overall Status: Operable
Operability: Operable
show environmentbasic
Displays chassis and CPU temperature data.
For example:
FPR2100 /chassis # show environment basic
*************** Chassis Temps ***************
Inlet temperature is 75 degrees Celsius
scope fan
Enters the fan mode on Firepower 2110 and 2120 devices.
scope fan-module
Enters the fan mode on Firepower 2130 and 2140 devices. From this mode, you can display detailed
information about the chassis fan.
For example:
FPR2100 /chassis # show fan-module expand detail
Fan Module:
Tray: 1
Module: 1
Overall Status: Operable
Operability: Operable
Power State: On
Presence: Equipped
Product Name: Cisco Firepower 2000 Series Fan Tray
PID: FPR2K-FAN
Vendor: Cisco Systems, Inc
Fan:
ID: 1
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
8
FXOS CLI Troubleshooting Commands
FXOS CLI Chassis Mode Troubleshooting Commands
show inventory
Displays inventory information such as the chassis number, vendor, and serial number.
Note: This command only applies to Firepower 2130 and 3140 devices.
For example:
FPR2100 /chassis # show inventory
Chassis PID Vendor Serial (SN) HW Revision
---------- --------------- ----------------- ----------- -----------
1 FPR-2140 Cisco Systems, In JAD201005FC 0.1
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
9
FXOS CLI Troubleshooting Commands
FXOS CLI Chassis Mode Troubleshooting Commands
scope psu
Enters the power supply unit mode. From this mode, you can view detailed information about the power
supply unit.
For example:
FPR2100 /chassis # show psu expand detail
PSU:
PSU: 1
Overall Status: Powered Off
Operability: Unknown
Power State: Off
Presence: Equipped
Voltage Status: Unknown
Product Name: Cisco Firepower 2000 Series AC 400W Power Supply
PID: FPR2K-PWR-AC-400
VID: V01
Vendor: Cisco Systems, Inc
Serial (SN): LIT2010CAFE
Type: AC
Fan Status: Ok
PSU: 2
Overall Status: Operable
Operability: Operable
Power State: On
Presence: Equipped
Voltage Status: Ok
Product Name: Cisco Firepower 2000 Series AC 400W Power Supply
PID: FPR2K-PWR-AC-400
VID: V01
Vendor: Cisco Systems, Inc
Serial (SN): LIT2010CAFE
Type: AC
Fan Status: Ok
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
10
FXOS CLI Troubleshooting Commands
FXOS CLI Chassis Mode Troubleshooting Commands
scope stats
Enters the stats mode. From this mode, you can view detailed information about the chassis statatistics.
For example:
FPR2100 /chassis # show stats
Chassis Stats:
Time Collected: 2016-11-14T21:19:46.317
Monitored Object: sys/chassis-1/stats
Suspect: No
Outlet Temp1 (C): 43.000000
Outlet Temp2 (C): 41.000000
Inlet Temp (C): 30.000000
Internal Temp (C): 34.000000
Thresholded: 0
Fan Stats:
Time Collected: 2016-11-14T21:19:46.317
Monitored Object: sys/chassis-1/fan-module-1-1/fan-1/stats
Suspect: No
Speed (RPM): 17280
Thresholded: 0
Time Collected: 2016-11-14T21:19:46.317
Monitored Object: sys/chassis-1/fan-module-1-1/fan-2/stats
Suspect: No
Speed (RPM): 17340
Thresholded: 0
Time Collected: 2016-11-14T21:19:46.317
Monitored Object: sys/chassis-1/fan-module-1-1/fan-3/stats
Suspect: No
Speed (RPM): 17280
Thresholded: 0
Time Collected: 2016-11-14T21:19:46.317
Monitored Object: sys/chassis-1/fan-module-1-1/fan-4/stats
Suspect: No
Speed (RPM): 17280
Thresholded: 0
Psu Stats:
Time Collected: 2016-11-14T21:19:46.318
Monitored Object: sys/chassis-1/psu-1/stats
Suspect: No
Input Current (A): 0.000000
Input Power (W): 8.000000
Input Voltage (V): 0.000000
Psu Temp1 (C): 32.000000
Psu Temp2 (C): 36.000000
Psu Temp3 (C): 32.000000
Fan Speed (RPM): 0
Thresholded: 0
Time Collected: 2016-11-14T21:19:46.318
Monitored Object: sys/chassis-1/psu-2/stats
Suspect: No
Input Current (A): 0.374000
Input Power (W): 112.000000
Input Voltage (V): 238.503006
Psu Temp1 (C): 36.000000
Psu Temp2 (C): 47.000000
Psu Temp3 (C): 47.000000
Fan Speed (RPM): 2240
Thresholded: 0
CPU Env Stats:
Time Collected: 2016-11-14T21:19:46.317
Monitored Object: sys/chassis-1/blade-1/board/cpu-1/env-stats
Suspect: No
Temperature (C): 46.000000
Thresholded: 0
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
11
FXOS CLI Troubleshooting Commands
FXOS CLI Eth-Uplink Mode Troubleshooting Commands
scope fabric a
Enters the eth-uplink interface mode. From this mode, you can view port channel, statistics, and interface
information.
For example:
FPR2100 /eth-uplink/fabric # show interface
Interface:
Port Name Port Type Admin State Oper State State Reason
-------------- ------------------ ----------- ---------------- ------------
Ethernet1/1 Data Enabled Up Up
Ethernet1/2 Data Enabled Link Down Down
Ethernet1/3 Data Disabled Link Down Down
Ethernet1/4 Data Disabled Link Down Down
Ethernet1/5 Data Disabled Link Down Down
Ethernet1/6 Data Disabled Link Down Down
Ethernet1/7 Data Disabled Link Down Down
Ethernet1/8 Data Disabled Link Down Down
Ethernet1/9 Data Disabled Link Down Down
Ethernet1/10 Data Disabled Link Down Down
Ethernet1/11 Data Disabled Link Down Down
Ethernet1/12 Data Disabled Link Down Down
Ethernet1/13 Data Disabled Link Down Down
Ethernet1/14 Data Disabled Link Down Down
Ethernet1/15 Data Disabled Link Down Down
Ethernet1/16 Data Disabled Link Down Down
Ethernet2/1 Data Disabled Link Down Down
Ethernet2/2 Data Disabled Link Down Down
Ethernet2/3 Data Disabled Link Down Down
Ethernet2/4 Data Disabled Link Down Down
Ethernet2/5 Data Disabled Link Down Down
Ethernet2/6 Data Disabled Link Down Down
Ethernet2/7 Data Disabled Link Down Down
Ethernet2/8 Data Disabled Link Down Down
FPR2100 /eth-uplink/fabric # show port-channel
Port Channel:
Port Channel Id Name Port Type Admin State Oper
State State Reason
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
12
FXOS CLI Troubleshooting Commands
FXOS CLI Eth-Uplink Mode Troubleshooting Commands
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
13
FXOS CLI Troubleshooting Commands
FXOS CLI Fabric Interconnect Mode Troubleshooting Commands
FXOSCLIFabricInterconnectModeTroubleshootingCommands
Use the following fabric-interconnect mode FXOS CLI commands to troubleshoot issues with your Firepower
1000/2100 system.
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
14
FXOS CLI Troubleshooting Commands
FXOS CLI Fabric Interconnect Mode Troubleshooting Commands
show card
Displays information on a fabric card.
For example:
FPR2100 /fabric-interconnect # show card detail expand
Fabric Card:
Id: 1
Description: Cisco SSP FPR 2130 Base Module
Number of Ports: 16
State: Online
Vendor: Cisco Systems, Inc.
Model: FPR-2130
HW Revision: 0
Serial (SN): JAD2012091X
Perf: N/A
Operability: Operable
Overall Status: Operable
Power State: Online
Presence: Equipped
Thermal Status: N/A
Voltage Status: N/A
show image
Displays all available images.
firepower /firmware # show image
Name Type Version
--------------------------------------------- -------------------- -------
cisco-ftd.6.2.0.131.csp Firepower Cspapp 6.2.0.131
cisco-ftd.6.2.0.140.csp Firepower Cspapp 6.2.0.140
cisco-ftd.6.2.0.175.csp Firepower Cspapp 6.2.0.175
fxos-k8-fp2k-firmware.0.4.04.SPA Firepower Firmware 0.4.04
fxos-k8-fp2k-lfbff.82.1.1.303i.SSA Firepower System 82.1(1.303i)
fxos-k8-fp2k-npu.82.1.1.303i.SSA Firepower Npu 82.1(1.303i)
fxos-k8-fp2k-npu.82.1.1.307i.SSA Firepower Npu 82.1(1.307i)
fxos-k9-fp2k-manager.82.1.1.303i.SSA Firepower Manager 82.1(1.303i)
show package
Displays all available packages.
firepower /firmware # show package
Name Package-Vers
--------------------------------------------- ------------
cisco-ftd-fp2k.6.2.0.131-303i.SSA 6.2(0.131-303i)
cisco-ftd-fp2k.6.2.0.140-307i.SSA 6.2(0.140-307i)
cisco-ftd-fp2k.6.2.0.140-308i.SSA 6.2(0.140-308i)
cisco-ftd-fp2k.6.2.0.175-311i.SSA 6.2(0.175-311i)
cisco-ftd-fp2k.6.2.0.175-314i.SSA 6.2(0.175-314i)
cisco-ftd-fp2k.6.2.0.175-318i.SSA 6.2(0.175-318i)
cisco-ftd-fp2k.6.2.0.175-319i.SSA 6.2(0.175-319i)
scope auto-install
Enters the auto-install mode. From this mode, you can view the current FXOS upgrade state.
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
15
FXOS CLI Troubleshooting Commands
FXOS CLI Fabric Interconnect Mode Troubleshooting Commands
scope firmware
Enters the firmware mode. From this mode, you can view download task information.
For example:
FPR2100 /firmware # show download-task
Download task:
File Name Protocol Server
Port Userid State
--------- --------
--------------- ---------- --------------- -----
cisco-ftd-fp2k.6.2.0.175-314i.SSA Scp 172.29.191.78
0 danp Downloaded
cisco-ftd-fp2k.6.2.0.175-318i.SSA Scp 172.29.191.78
0 danp Downloaded
cisco-ftd-fp2k.6.2.0.175-319i.SSA Scp 172.29.191.78
0 danp Downloaded
scope download-task
Enters the download-task mode. From this mode, you can view additional details about each download
task and restart the download task.
For example:
Download task:
File Name: test.SSA
Protocol: Scp
Server: 172.29.191.78
Port: 0
Userid: user
Path: /tmp
Downloaded Image Size (KB): 0
Time stamp: 2016-11-15T19:42:29.854
State: Failed
Transfer Rate (KB/s): 0.000000
Current Task: deleting downloadable test.SSA on
local(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:DeleteLocal)
firepower /firmware/download-task # show fsm status
File Name: test.SSA
FSM 1:
Remote Result: End Point Failed
Remote Error Code: ERR MO Illegal Iterator State
Remote Error Description: End point timed out. Check for IP, port, password,
disk space or network access related issues.#
Status: Download Fail
Previous Status: Download Fail
Timestamp: 2016-11-15T19:42:29.854
Try: 2
Progress (%): 0
Current Task: deleting downloadable test.SSA on
local(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:DeleteLocal)
firepower /firmware/download-task # restart
Password:
scope psu
Enters the power supply unit mode. From this mode, you can view detailed information about the power
supply unit.
For example:
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
16
FXOS CLI Troubleshooting Commands
Connect Local-Mgmt Troubleshooting Commands for the Firepower 2100 in Platform Mode
Channel group: 11
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
17
FXOS CLI Troubleshooting Commands
Connect Local-Mgmt Troubleshooting Commands for the Firepower 2100 in Platform Mode
show portchannel
Displays detailed information about EtherChannels.
For example:
show portmanager
Displays detailed information about physical interfaces.
For example:
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
18
FXOS CLI Troubleshooting Commands
Connect Local-Mgmt Troubleshooting Commands for the Firepower 2100 in Platform Mode
Size 64 : 1334830
Size 65 to 127 : 0
Size 128 to 255 : 0
Size 256 to 511 : 41220
Size 512 to 1023 : 0
Size 1024 to Max : 0
Good Octets Sent : 0
Good Packets Sent : 0
Excessive Collision : 0
MC Packets Sent : 0
BRDC Packets Sent : 0
Unrecognized MAC Received : 0
FC Sent : 0
Good FC Received : 0
Drop Events : 0
Undersize Packets : 0
Fragments Packets : 0
Oversize Packets : 0
Jabber Packets : 0
MAC RX Error Packets Received : 0
Bad CRC : 0
Collisions : 0
Late Collision : 0
bad FC Received : 0
Good UC Packets Received : 222176
Good UC Packets Sent : 0
Multiple Packets Sent : 0
Deferred Packets Sent : 0
Size 1024 to 15180 : 0
Size 1519 to Max : 0
txqFilterDisc : 0
linkChange : 1
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
19
FXOS CLI Troubleshooting Commands
Connect Local-Mgmt Troubleshooting Commands for the Firepower 2100 in Platform Mode
Item Description
Good Octets Received Number of ethernet frames received that are not
bad ethernet frames
Bad Octets Received Sum of lengths of all bad ethernet frames received
BRDC Packets Received The number of good frames received that have a
Broadcast destination MAC address
Good Octets Sent The sum of lengths of all Ethernet frames sent
BRDC Packets Sent The number of good frames send that have a
Broadcast destination MAC address
Unrecognized MAC Received Number of received MAC Control frames that are
not Flow control frames.
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
20
FXOS CLI Troubleshooting Commands
Connect Local-Mgmt Troubleshooting Commands for the Firepower 2100 in Platform Mode
Item Description
MAC RX Error Packets Received Number of Rx Error events seen by the receive side
of the MAC
Size 1024 to 15180 The number of received and transmitted, good and
bad frames that are 1024 to 1518 bytes in size
Size 1519 to Max The number of received and transmitted, good and
bad frames that are more than 1519 bytes in size
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
21
FXOS CLI Troubleshooting Commands
FXOS CLI Security Services Mode Troubleshooting Commands
showapp-instance
Displays information about the verified app-instance status
firepower-2120 /ssa # show app-instance
Application Name Slot ID Admin State Operational State Running Version Startup
Version Cluster Oper State
-------------------- ---------- --------------- -------------------- ---------------
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
22
FXOS CLI Troubleshooting Commands
FXOS CLI Security Services Mode Troubleshooting Commands
--------------- ------------------
asa 1 Enabled Online 9.14.2 9.14.2
Not Applicable
showfault
Displays information about the fault message
firepower-2120 /ssa # show fault
Severity Code Last Transition Time ID Description
--------- -------- ------------------------ -------- -----------
Cleared F16589 2021-10-11T21:58:53.200 25140 [FSM:STAGE:RETRY:]: Waiting for chassis
object ready(FSM-STAGE:sam:dme:SmSecSvcAutoDeployCSP:WaitForChassisM
oReady)
show failsafe-params
The fail-safe mode for an FTD application on Firepower 1000/2100 is activated due to continuous boot
loop, traceback, etc. The following parameters control the activation of the fail-safe mode:
• Max Restart—maximum number of times that an application should restart in order to activate the
fail-safe mode.
• Current Reboot Count—number of times the application continuously restarted.
• Restart Time Interval (secs)—the amount of time in seconds, during which the Max Restart counter
should be reached in order to trigger the fail-safe mode. If the application restarts 'Max Restart' or
more times within this interval, the fail-safe mode is enabled.
For example:
firepower-2120-failed(local-mgmt)# show failsafe-params
Max Restart: 8
Current Reboot Count: 0
Restart Time Interval(secs): 3600
• The output of the "show failsafe-params" command in the local-mgmt command shell contains a warning
message:
firepower-2120-failed(local-mgmt)# show failsafe-params
Max Restart: 1
Current Reboot Count: 1
Restart Time Interval(secs): 3600
WARNING: System in Failsafe mode. Applications are not running!
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
23
FXOS CLI Troubleshooting Commands
FXOS CLI Security Services Mode Troubleshooting Commands
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
24
CHAPTER 4
Reimage Procedures
• About Disaster Recovery, on page 25
• Reimage the System with the Base Install Software Version, on page 26
• Perform a Factory Reset from ROMMON (Password Reset), on page 28
• Reimage the System with a New Software Version, on page 29
• Reformat the SSD File System (Firepower 2100), on page 31
• Boot from ROMMON, on page 31
• Perform a Complete Reimage, on page 36
• Change the Admin Password, on page 39
• Change the Admin Password if FTD is Offline, on page 40
• Deregister From Cloud, on page 41
• History for Firepower 1000/2100 FXOS Troubleshooting, on page 42
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
25
Reimage Procedures
Reimage the System with the Base Install Software Version
Note You cannot perform a downgrade to the previous major version using
this procedure. You must use the Perform a Complete Reimage, on
page 36 instead.
• Reformat the SSD File System—Reformats the SSD if you see disk corruption messages. All
configurations are removed. Note that after performing this procedure, you will have to reconfigure the
system, including admin password and connectivity information. See Reformat the SSD File System
(Firepower 2100), on page 31.
• Boot from ROMMON—Boots FXOS from ROMMON if you cannot boot up. You can then reformat
the eMMC and reinstall the software image. This procedure retains all configuration. See Boot from
ROMMON, on page 31.
• Erase all configuration and images—This option restores your system to its factory default settings, and
erases the images. The procedure requires you to boot the system over TFTP, download the FTD software,
and reconfigure the entire system. See Perform a Complete Reimage, on page 36.
• Change the admin password—This procedure lets you change the admin password from the FTD CLI.
See Change the Admin Password, on page 39.
• Change the admin password if FTD is offline—This procedure lets you change the admin password from
FXOS. See Change the Admin Password if FTD is Offline, on page 40. Note that if FTD is online, you
must change the admin password using the FTD CLI.
Note After performing this procedure, the admin password is reset to Admin123.
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
26
Reimage Procedures
Reimage the System with the Base Install Software Version
• Take note of your FTD base install version using the following commands. The Startup Version column
shows your base install version. The Running Version shows any upgrades you applied to the base install
version.
Procedure
Step 3 Once the system comes back up, you can check the state of the application with the show app-instance
command. Note that the password login is now set to the default admin/Admin123.
Example:
Note It may take more than 10 minutes for the application installation to complete. Once Firepower Threat
Defense is back online, the Operational State of the show app-instance command displays as
Online:
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
27
Reimage Procedures
Perform a Factory Reset from ROMMON (Password Reset)
Example:
firepower /ssa # show app-instance
Application Name Slot ID Admin State Operational State Running Version Startup
Version Cluster Oper State
-------------------- ---------- --------------- -------------------- ---------------
--------------- ------------------
ftd 1 Enabled Online 6.2.1.10140
What to do next
Complete the setup tasks in the getting started guide, and upgrade to latest version if necessary.
Procedure
Step 1 Power on the device. When you see the following prompt, hit ESC to stop the boot.
Example:
Use BREAK or ESC to interrupt boot.
Use SPACE to begin boot immediately.
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
28
Reimage Procedures
Reimage the System with a New Software Version
Are you sure you would like to continue ? yes/no [no]: yes
Please type 'ERASE' to confirm the operation or any other value to cancel: ERASE
Step 4 If the system does not prompt you to boot, enter the boot command:
rommon 3 > boot
What to do next
Complete the setup tasks in the getting started guide.
Note You cannot perform a downgrade to the previous major version using this procedure. You must use the Perform
a Complete Reimage, on page 36 instead.
Note After performing this procedure, the admin password is reset to Admin123.
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
29
Reimage Procedures
Reimage the System with a New Software Version
• Deregister your devices from the cloud tenant (if applicable). See Deregister From Cloud, on page 41.
Procedure
Step 1 Download the software bundle to your local computer, or to a USB flash drive.
Step 2 If using a USB drive, insert the USB drive into the USB port on the appliance.
Step 3 In FXOS, enter the system scope and verify the current version running on your system:
firepower # scope system
firepower /system # show version detail
Step 5 Download the new software package. If you are using a USB drive to download the software package, use
the following syntax:
firepower # scope firmware
firepower /firmware # download image usbA:image_name
Note that the image_name is the output from the show version detail command in step 3, above.
For example:
firepower /firmware # download image usbA:cisco-ftd-fp2k.6.2.1-36.SPA
You can also use FTP, SCP, SFTP, or TFTP to copy the Firepower Threat Defense software package to the
device:
firepower /firmware # download image tftp/ftp/scp/sftp://path to the image, including the server root /image
name
For example:
Note When performing a file transfer via FTP/TFTP/SCP/SFTP, you must provide an absolute path to
the image, including the server root, as the system prepends a forward slash to the filename provided
in the download image request.
You can optionally use a FQDN in place of the IP address.
Step 7 Once the download is complete, display the software packages installed on your system and copy the displayed
bundle image version from the output:
firepower /firmware # show package
Example:
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
30
Reimage Procedures
Reformat the SSD File System (Firepower 2100)
Step 9 Install the new application software package (where the version is the output from show package, above):
firepower /firmware/auto-install # install security-pack version version
What to do next
Complete the setup tasks in the getting started guide.
Procedure
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
31
Reimage Procedures
Boot from ROMMON
software images). After you reformat, then you need to re-download the images to the eMMC. This procedure
retains all configuration, which is stored on the separate ssd1.
The eMMC file system might get corrupted because of a power failure or other rare condition.
Procedure
Step 1 If you cannot boot up, the system will boot into ROMMON. If it does not automatically boot into ROMMON,
press Esc during the bootup when prompted to reach the ROMMON prompt. Pay close attention to the monitor.
Example:
*******************************************************************************
Cisco System ROMMON, Version 1.0.06, RELEASE SOFTWARE
Copyright (c) 1994-2018 by Cisco Systems, Inc.
Compiled Thu 04/06/2018 12:16:16.21 by builder
*******************************************************************************
Step 2 Boot from an image on a USB drive, or boot over the network using TFTP.
Note For 6.4 and earlier, if you boot FXOS from ROMMON, and the currently-installed image is also
bootable, make sure you boot the same version as the currently-installed image. Otherwise, an
FXOS/FTD version mismatch will cause the FTD to crash. In 6.5 and later, booting FXOS from
ROMMON prevents FTD from loading automatically.
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
32
Reimage Procedures
Boot from ROMMON
Set the network settings for Management 1/1, and load the FTD package using the following ROMMON
commands.
address management_ip_address
netmask subnet_mask
server tftp_ip_address
gateway gateway_ip_address
filepath/filename
set
sync
tftp -b
The FXOS image downloads and boots up to the CLI.
See the following information:
• set—Shows the network settings. You can also use the ping command to verify connectivity to the server.
• sync—Saves the network settings.
• tftp -b—Loads FXOS.
Example:
ADDRESS: 10.86.118.4
NETMASK: 255.255.252.0
GATEWAY: 10.86.118.21
SERVER: 10.86.118.1
IMAGE: cisco-ftd-fp2k.6.4.0.SPA
MACADDR: d4:2c:44:0c:26:00
VERBOSITY: Progress
RETRY: 40
PKTTIMEOUT: 7200
BLKSIZE: 1460
CHECKSUM: Yes
PORT: GbE/1
PHYMODE: Auto Detect
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
33
Reimage Procedures
Boot from ROMMON
link up
Receiving cisco-ftd-fp2k.6.4.0.SPA from 10.86.118.21!!!!!!!!
[…]
a) Download the package. Because you booted temporarily from USB or TFTP, you must still download
the image to the local disk.
scope firmware
download image url
show download-task
Specify the URL for the file being imported using one of the following:
• ftp://username@server/[path/]image_name
• scp://username@server/[path/]image_name
• sftp://username@server/[path/]image_name
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
34
Reimage Procedures
Boot from ROMMON
• tftp://server[:port]/[path/]image_name
• usbA:/path/filename
Example:
b) When the package finishes downloading (Downloaded state), boot the package.
show package
scope auto-install
install security-pack version version
In the show package output, copy the Package-Vers value for the security-pack version number. The
chassis installs the ASA image and reboots.
Example:
Attention:
If you proceed the system will be re-imaged. All existing configuration will be lost,
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
35
Reimage Procedures
Perform a Complete Reimage
firepower-2110#
Cisco ASA: CMD=-install, CSP-ID=cisco-asa.9.8.2.2__asa_001_JAD20280BW90MEZR11, FLAG=''
Verifying signature for cisco-asa.9.8.2.2 ...
Verifying signature for cisco-asa.9.8.2.2 ... success
Note After performing this procedure, the admin password is reset to Admin123.
Procedure
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
36
Reimage Procedures
Perform a Complete Reimage
Step 3 When you see the following prompt, hit ESC to stop the boot.
Example:
Use BREAK or ESC to interrupt boot.
Use SPACE to begin boot immediately.
Step 7 Test ICMP connectivity from the ROMMON to the TFTP/FTP/SCP server IP.
rommon 9 > ping server IP
Note Pings from the TFTP/FTP/SCP server IP to the management IP will fail. This is expected behavior.
This error condition clears as soon as you install the new Firepower Threat Defense software package
version (step 14 of this procedure).
Step 9 Once the system comes up, log in as admin/Admin123 and reconfigure the management IP address:
a) Enter the fabric-interconnect scope:
firepower#/ scope fabric-interconnect a
b) Set the new management IP information:
firepower /fabric-interconnect # set out-of-band static ip ip netmask netmask gw gateway
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
37
Reimage Procedures
Perform a Complete Reimage
Note If you encounter the following error, you must disable DHCP before committing the change. Follow
the steps below to disable DHCP.
Note When performing a file transfer via FTP/TFTP/SCP/SFTP, you must provide an absolute path to
the image, including the server root, as the system prepends a forward slash to the filename provided
in the download image request.
You can optionally use a FQDN in place of the IP address.
Step 11 Once the download task is complete, the download-task command output displays the State as Downloaded:
firepower /firmware # show download-task image_path
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
38
Reimage Procedures
Change the Admin Password
Step 14 Install the new software application package (where version is the version output in step 12, above:
firepower /firmware/auto-install # install security-pack version version force
After the software package installation is complete, the system reboots while installing Firepower Threat
Defense.
What to do next
Complete the setup tasks in the getting started guide.
Procedure
Step 2 Verify that the admin user account is present in the users table:
> show user
Example:
> show user
Login UID Auth Access Enabled Reset Exp Warn Str Lock Max
admin 100 Local Config Enabled No Never N/A Dis No 0
Step 3 Set the new password for the admin user account:
firepower-chassis # configure user password admin
Example:
> configure user password admin
Enter current password:
Enter new password for user admin:
Confirm new password for user admin:
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
39
Reimage Procedures
Change the Admin Password if FTD is Offline
Note The procedure to change the admin password via the FXOS CLI depends on the version of Firepower you
are currently running.
Procedure
Step 2 (Firepower Version 6.4 and later) You must reauthenticate the old admin password in order to set a new
password:
firepower /security* # set password
Example:
FPR-2120# scope security
FPR-2120# /security # set password
Enter old password:
Enter new password:
Confirm new password:
firepower-2120 /security* # commit-buffer
(Firepower Version 6.3 and earlier) View the current list of local users. If you have just reimaged your device,
admin will be the only user in this list:
firepower /security # show local-user
Example:
FPR-2120# scope security
FPR-2120 /security # show local-user
User Name First Name Last name
--------------- --------------- ---------
admin
a) (Firepower Version 6.3 and earlier) Enter the admin local user scope:
firepower /security # enter local-user admin
b) (Firepower Version 6.3 and earlier) Set the new password for user admin:
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
40
Reimage Procedures
Deregister From Cloud
If no management IP address displays in the show detail output, you must first configure a management
IP for your device:
1. Enter the fabric interconnect scope:
firepower # scope fabric-interconnect
2. Set the new management IP information:
firepower /fabric-interconnect # set out-of-band static ip ip netmask netmask gateway gateway
3. Commit the configuration:
firepower /fabric-interconnect # commit buffer
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
41
Reimage Procedures
History for Firepower 1000/2100 FXOS Troubleshooting
Procedure
Example
firepower # connect local
firepower(local-mgmt) # cloud deregister
Cloud deregister Firepower 6.7 You can now deregister your Firepower
1000/2100 device from your cloud tenant
using the cloud deregister FXOS CLI
command
Changing the admin password Firepower 6.4 In Firepower versions 6.4 and later on
Firepower 1000/2100 devices, you must
reauthenticate the old admin password
before setting a new admin password.
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 with Firepower Threat Defense
42