Cisco Secure Firewall Threat Defense Hardening Guide Version 72 - Last Updated 30 April 2022
Cisco Secure Firewall Threat Defense Hardening Guide Version 72 - Last Updated 30 April 2022
Introduction
From Version 7.2, Firepower Management Center (FMC) is rebranded as Secure Firewall Management Center
(management center). Firepower Threat Defense (FTD) is rebranded as Secure Firewall Threat Defense (threat
defense).
Threat Defense protects your network assets and traffic from cyber threats, but you should also configure
threat defense itself so that it is hardened—further reducing its vulnerability to cyber attack. This guide
addresses hardening your threat defense. For hardening information on other components of your Secure
Firewall deployment see the following documents:
• Cisco Firepower Management Center Hardening Guide, Version 7.2
• Cisco Firepower 4100/9300 FXOS Hardening Guide
This guide refers to two different means of configuring a threat defense device, but is not intended as a detailed
manual.
• You can configure some threat defense configuration settings using the management center web interface.
For more information, see .
• You can configure some threat defense configuration settings using the threat defense Command Line
Interface (CLI). For more information about all CLI commands referenced in this document, see Cisco
Firepower Threat Defense Command Reference .
All feature descriptions within this document refer to threat defense Version 7.2. Not all configuration settings
discussed in this manual are available in all threat defense versions. For detailed information about configuring
your threat defense, see the Cisco Secure Firewall Threat Defense documentation for your version.
Note The U.S. Government has changed the name of the Unified Capabilities Approved
Products List (UCAPL) to the DODIN APL. References to UCAPL in
management center documentation and the web interface can be interpreted as
references to DoDIN APL.
• Federal Information Processing Standards (FIPS) 140: a requirements specification for encryption
modules.
Certification guidance documents are available separately once product certifications have completed;
publication of this hardening guide does not guarantee completion of any of these product certifications.
The configuration settings described in this document do not guarantee strict compliance with all current
requirements of the certifying entity. For more information on hardening procedures required, refer to the
guidelines for this product provided by the certifying entity.
This document provides guidance for increasing the security of your threat defense, but some threat defense
features do not support certification compliance even using the configuration settings described herein. For
more information see “Security Certifications Compliance Recommendations” in the Cisco Secure Firewall
Management Center Administration Guide, 7.2. We have endeavored to ensure that this hardening guide and
the Cisco Secure Firewall Management Center Administration Guide, 7.2 do not conflict with
certification-specific guidance. Should you encounter contradictions between Cisco documentation and
certification guidance, use the certification guidance or consult with the system owner.
Geolocation Database
Geolocation Database (GeoDB) is a database of geographical data (such as country and city coordinates) and
connection-related data (such as Internet service provider, domain name, connection type) associated with
routable IP addresses. When the management center detects GeoDB information that matches a detected IP
address, you can view the geolocation information associated with that IP address. To view any geolocation
details other than country or continent, you must install the GeoDB on your system.
To update the GeoDB from the management center web interface, use System > Updates > Geolocation
Updates, and choose one of the following methods:
• Update the GeoDB on an management center with no internet access.
• Update the GeoDB on an management center with internet access.
• Schedule recurring automatic updates of the GeoDB on an management center with internet access.
For more information, see "Update the Geolocation Database" in the Cisco Secure Firewall Management
Center Administration Guide, 7.2.
Intrusion Rules
As new vulnerabilities become known, the Cisco Talos Security Intelligence and Research Group (Talos)
releases intrusion rule updates (also known as Snort Rules Updates, or SRUs) that you can import onto your
management center, and then implement by deploying the changed configuration to your managed devices.
These updates affect intrusion rules, preprocessor rules, and the policies that use the rules.
The management center web interface provides three approaches to updating the intrusion rules, all under
System > Updates > Rule Updates:
• Update intrusion rules on an management center with no internet access.
• Update intrusion rules on an management center with internet access.
• Schedule recurring automatic updates of intrusion rules on an management center with internet access.
For more information, see "Update Intrusion Rules" in the Cisco Secure Firewall Management Center
Administration Guide, 7.2.
You can also import local intrusion rules using System > Updates > Rule Updates. You can create local
intrusion rules using the instructions in the Snort users manual (available at http://www.snort.org). Before
importing them to your management center, see "Best Practices for Importing Local Intrusion Rules" in the
Cisco Secure Firewall Management Center Administration Guide, 7.2 and make certain your process for
importing local intrusion rules complies with your security policies.
Vulnerabilities Database
Vulnerabilities Database (VDB) is a database of known vulnerabilities to which hosts may be susceptible, as
well as fingerprints for operating systems, clients, and applications. The system uses the VDB to help determine
whether a particular host increases your risk of compromise.
The management center web interface offers two approaches to updating the VDB:
• Manually update the VDB (System > Updates > Product Updates).
• Schedule VDB updates (System > Tools > Scheduling).
For more information, see "Update the Vulnerability Database" in the Cisco Secure Firewall Management
Center Administration Guide, 7.2.
You cannot delete the system-provided feeds, but you can change the frequency of (or disable) their
updates. The management center can now update Cisco-Intelligence-Feed data for every 5 or 15 minutes.
• Cisco-TID-Feed (under Network Lists and Feeds)
You must enable and configure Threat Intelligence Director to use this feed, which is a collection of TID
observables data.
For more information, see "Security Intelligence Lists and Feeds" in the Cisco Secure Firewall Management
Center Device Configuration Guide, 7.2.
Caution After you enable this setting, you cannot disable it. Consult “Security Certifications Compliance” in the Cisco
Secure Firewall Management Center Administration Guide, 7.2 for full information before enabling CC or
UCAPL mode. If you need to reverse this setting, contact Cisco TAC for assistance.
Note Enabling security certifications compliance does not guarantee strict compliance with all requirements of the
security mode selected. Additional settings recommended to harden your deployment above and beyond those
provided by CC or UCAPL modes are described in this document. For full information on hardening procedures
required for complete compliance, refer to the guidelines for this product provided by the certifying entity.
Caution Unintended consequences may occur when time is not synchronized between the management center and
managed devices. To ensure proper synchronization, configure the management center and all the devices it
manages to use the same NTP server.
Certain threat defense functions that use the data or diagnostic interfaces also use DNS—examples include
NTP, access control policies, VPN services provided by the threat defense, ping, or traceroute. To configure
DNS for the data or diagnostic interfaces, create a threat defense platform settings policy under Devices >
Platform Settings, and choose DNS from the table of contents. For more information, see “Configure DNS”
in the Cisco Secure Firewall Management Center Device Configuration Guide, 7.2.
DNS can be susceptible to specific types of attacks tailored to take advantage of weak points in a DNS server
that is not configured with security in mind. Ensure your local DNS server is configured with
industry-recommended best practices for security; Cisco offers guidelines in this document: DNS Best Practices,
Network Protections, and Attack Identification.
See “Add SNMPv3 Users” in the Cisco Secure Firewall Management Center Device Configuration
Guide, 7.2 for full instructions.
Important Although you can establish a secure connection to an SNMP server from management center, the authentication
module is not FIPS compliant.
For information about configuring your deployment to operate in a NAT environment, see “NAT Environments”
in the Cisco Secure Firewall Management Center Administration Guide, 7.2. Use this information at two
stages when establishing your deployment:
• When performing the initial setup for your management center as described in the Cisco Firepower
Management Center Getting Started Guide for your hardware model.
• When registering a managed device to the management center as described in Add a Device to the
Management Center in the Cisco Secure Firewall Management Center Device Configuration Guide, 7.2.
For complete instructions, see “Configure Fragment Handling” in the Cisco Secure Firewall Management
Center Device Configuration Guide, 7.2.
• For threat defense devices managed by a management center, HTTPS connections with the threat defense
can be used only to download packet capture files for troubleshooting.
Configure threat defense to allow HTTPS access only for IP addresses that should be allowed to download
packet captures. In the management center web interface create an threat defense platform settings policy
under Devices > Platform Settings, and choose HTTP from the table of contents. See “Configure HTTP”
in the Cisco Secure Firewall Management Center Device Configuration Guide, 7.2.
• By default, the threat defense can receive ICMP packets on any interface using either IPv4 or IPv6 with
two exceptions:
• The threat defense does not respond to ICMP echo requests directed to a broadcast address.
• The threat defense responds only to ICMP traffic sent to the interface that traffic comes in on; you
cannot send ICMP traffic through an threat defense interface to a far interface.
To protect a threat defense device from ICMP-based attack, you can use ICMP rules to limit ICMP access
to selected hosts, networks, or ICMP types. In the management center web interface, create an threat
defense platform settings policy under Devices > Platform Settings, and choose ICMP Access from
the table of contents. For details, see “Configure ICMP Access Rules” in the Cisco Secure Firewall
Management Center Device Configuration Guide, 7.2.
• The threat defense can be configured to provide DHCP and DDNS services (see “DHCP and DDNS
Services for Threat Defense” in the Cisco Secure Firewall Management Center Device Configuration
Guide, 7.2). By their nature these protocols are vulnerable to attack. If you choose to configure your
threat defense for DHCP or DDNS it is important to apply industry best practices for security, provide
physical protection for your network assets, and harden user access to the threat defense device.
• You can enable LLDP on Firepower 1000 Series, 2100 Series, and Secure Firewall 3100. This feature
enables the threat defense to exchange packets with its LLDP-enabled peers. By default, LLDP transmit
and receive is disabled on a port. The information sent through LLDP is vulnerable to attack. If you
choose to configure your threat defense device for LLDP, it is important to apply industry best practices
for security, and harden user access to the threat defense. We recommend that you only enable the firewall
to receive LLDP packets from its peers for enhanced security. This action ensures the firewall gets
information about peer devices without revealing its identify to other peer devices. For more information,
see "Enable the Physical Interface and Configure Ethernet Settings" in Cisco Secure Firewall Management
Center Device Configuration Guide, 7.2
• Multi-certificate Authentication: You can use this authentication method to validate the machine or
device certificate using single certificate authentication. This authentication ensures that the device is a
corporate-issued device and authenticates the user identity certificate to allow VPN access. We recommend
that use this authentication method. For more information, see "Configuring Multiple Certificate
Authentication" in Cisco Secure Firewall Management Center Device Configuration Guide, 7.2.
For more information about the above threat defense VPN IKE options, see Cisco Secure Firewall Management
Center Device Configuration Guide, 7.2.
To configure these services, see “VPN Overview” in the Cisco Secure Firewall Management Center Device
Configuration Guide, 7.2.
The management center supports a wide range of encryption and hash algorithms, and Diffie-Hellman groups
from which to choose. Choosing strong encryption can worsen system performance, so you must find the
balance between security and performance that provides sufficient protection without compromising efficiency.
For more information, see “How Secure Should a VPN Connection Be?” in the Cisco Secure Firewall
Management Center Device Configuration Guide, 7.2.
You might consider establishing user access through an external authentication mechanism such as LDAP or
RADIUS, to integrate user management with existing infrastructure in your network environment, or leverage
capabilities such as two-factor authentication. Establishing external authentication requires creating an external
authentication object within the management center web interface; external authentication objects can be
shared to authenticate external users for the management center as well as the threat defense.
Be aware that using external authentication requires that you configure a DNS for your deployment. Be sure
to follow hardening recommendations for your DNS. See Secure the Domain Name System (DNS)
This discussion of user management refers to features available in Version ; not all user account configuration
features addressed in this section apply to all threat defense versions. For information specific to your system,
see the Cisco Secure Firewall Threat Defense documentation for your version.
Threat Defenses managed by management center provide a single means of user access: a command line
interface which can be accessed using an SSH, serial, or keyboard and monitor connection for physical devices.
With certain configuration settings in place these users can also access the Linux shell.
Consider carefully when assigning Config access rights to an account, and when choosing to which users you
grant access to an account with Config access rights.
Caution On all devices, accounts with CLI Config level access or Linux shell access can obtain sudoers privileges in
the Linux shell, which can present a security risk. To increase system security, we recommend:
• When giving users access to externally-authenticated accounts on threat defense keep in mind that all
externally authenticated accounts on threat defense have CLI Config level access.
• Do not add new accounts directly in the Linux shell; on threat defense create new accounts using only
the configure user add CLI command.
• Use the threat defense CLI command configure ssh-access-list to limit the IP addresses from which an
threat defense will accept SSH connections on its management interface.
Administrators can also configure the threat defense to block all access to the Linux shell using the system
lockdown-sensor CLI command. Once the system lockdown has completed, any user who logs in to the threat
defense will have access only to the threat defense CLI commands. This can be a significant hardening action,
but use it with careful consideration, because it cannot be reversed without a hotfix from Cisco TAC.
If your deployment uses multitenancy, consider the domain to which the threat defense belongs when granting
users access to that device.
For more information, see “Domain Management” in the Cisco Secure Firewall Management Center
Administration Guide, 7.2.
Important You can set up secure connections with LDAP or RADIUS servers from management center, but the
authentication module is not FIPS compliant.
• Be aware that all threat defense external users have Config access, and unless you block access to the
Linux shell with the system lockdown-sensor command, these users can gain access to the Linux shell.
Linux shell users can gain root privileges, which presents a security risk.
• If you use LDAP for external authentication, under Advanced Options, configure TLS or SSL encryption.
To set session timeouts on the management center device, create the management center platform settings
policy under Devices > Platform Settings > Add/Edit Policy > Timeouts. See “Configure Global Timeouts”
in the Cisco Secure Firewall Management Center Device Configuration Guide, 7.2 for more instructions.
Important Although you can establish secure connections between the threat defense and a REST API client using TLS,
the authentication module is not FIPS compliant.
Protect Backups
To protect system data and its availability, perform regular backups of your threat defense. The backup function
appears under System > Tools > Backup/Restore in the management center web interface and is described
in “Backup Devices Remotely” in the Cisco Secure Firewall Management Center Administration Guide, 7.2.
To restore a saved threat defense configuration, use the threat defense CLI restore command.
The management center provides the ability to automatically store backups on a remote device. Using this
feature is not recommended for a hardened system because the connection between the management center
and the remote storage device cannot be secured.
you store the data, and use the most secure protocols available when transmitting files to TAC. In particular,
be aware of the possible risks when using the following commands:
• show asp inspect-dp snort queue-exhaustion [snapshot snapshot_id] [export location]
The export option supports TFTP only.
• file copy host_name user_id path filename_1 [filename_2 ... filename_n]
This command transfers files to remote host using unsecured FTP.
• copy [/noverify] /noconfirm {/pcap capture:/[buffer_name] | src_url | running-config | startup-config}
dest_url
The following options for src_url and dest_url provide methods of securing the data copied:
• Internal flash memory
• System memory
• Optional external flash drive
• HTTPS secured with password
• SCP secured with password, specifying target interface on SCP server
• FTP secured with password
• TFTP secured with password, specifying target interface on TFTP server
We recommend against using the following src_url and dest_url options in a hardened system:
• SMB UNIX server local file system
• Cluster trace file system. (Systems with security certifications compliance enabled do not support
clusters.)
We recommend against using cluster file systems for src_url and dest_url options in a hardened system.
• file secure-copy host_name user_id path filename_1 [filename_2 ... filename_n]
Copies file(s) to a remote host using SCP.
Secure Syslog
The threat defense can send syslog messages to an external syslog server; choose secure options when
configuring syslog functionality:
1. Create a threat defense platform settings policy under Devices > Platform Settings, and choose Syslog
from the table of contents. When adding a syslog server under the Syslog Servers tab, choose the TCP
protocol and check the Enable secure syslog check box. These options apply to syslog messages generated
by the threat defense if you do not override them elsewhere in your device configuration.
Note By default, when secure syslog is enabled, if a syslog server using TCP is down, the threat defense will not
forward traffic. To override this behavior, check the Allow user traffic to pass when TCP syslog server is
down check box.
2. Configure logging in your access control policies to inherit the logging settings from the platform settings
policy. Choose Policies > Access Control <each policy> > Logging check the Use the syslog settings
configured in the FTD Platform Settings policy deployed on the device check box.
With these two configuration settings in place the threat defense syslog behaves as follows:
• The syslog settings in the platform settings policy apply to syslog messages related to device and system
health, and network configuration.
• The syslog settings in the platform settings apply to syslogs for connection and security intelligence
events unless you override the setting for the access control policy in any of the places listed in
“Configuration Locations for Syslogs for Configuration and Security Intelligence Events (All Devices)”
in the Cisco Secure Firewall Management Center Administration Guide, 7.2. These overrides do not
provide a secure syslog option, so we recommend against using them in a secure environment.
• The syslog settings in the platform settings policy apply to syslogs for intrusion events unless you override
the setting for the access control policy in any of the places listed in “Configuration Locations for Syslogs
for Intrusion Events” in the Cisco Secure Firewall Management Center Administration Guide, 7.2. These
overrides do not provide a secure syslog option, so we recommend against using them in a secure
environment.
Important Although you can set up a secure connection to LDAP, Microsoft AD, or RADIUS servers from threat defense,
the authentication module is not FIPS compliant.
Note If you choose to use LDAP or Microsoft AD for external authentication, review the information in Harden
External User Accounts, on page 11.
Note Threat Defense uses each of these servers to support a different combination of the possible user identity
features. For full details, see “About User Identity Sources” in the Cisco Secure Firewall Management Center
Device Configuration Guide, 7.2.
• Select STARTTLS or LDAPS for the Encryption mode (do not choose None).
• Specify an SSL Certificate to use for authentication to the LDAP server. We recommend using a
certificate generated by globally known and trusted certificate authority.
Note Threat Defense connects with a RADIUS server for user identity only if a managed threat defense device in
the deployment is configured to provide Remote Access VPN, which will be used as the user identity source.
For information on configuring and securing Remote Access VPN, see Harden Network Protocol Settings.
If you don’t want threat defense to validate the EST server certificate, we recommend that you don’t check
the Ignore EST Server Certificate Validations check box. By default, threat defense validates the EST
server certificate. EST enrollment type supports only RSA and ECDSA keys, and doesn’t support EdDSA
keys. For more information, see "Certificate Enrollment Object EST Options" in Cisco Secure Firewall
Management Center Device Configuration Guide, 7.2.
On management center and threat defense Versions 7.0 and higher, you can’t enroll certificates with RSA
key sizes smaller than 2048 bits and keys using SHA-1. To override these restrictions on management center
7.0 managing threat defense running versions lesser than 7.0, the Enable Weak-Crypto option is available
(Devices > Certificates). By default, the weak-crypto option is disabled. We don’t recommend you to enable
weak-crypto keys as these keys aren’t as secure as the ones with higher key sizes. For management center
and threat defense versions 7.0 and higher, you can enable weak-crypto to allow validation of peer certificates
and so on. However, this configuration doesn’t apply to the certificate enrollment.
For more information, see "Adding Certificate Enrollment Objects" in Cisco Secure Firewall Management
Center Device Configuration Guide, 7.2
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2022 Cisco Systems, Inc. All rights reserved.