Firepower Data Path Troubleshooting Phas
Firepower Data Path Troubleshooting Phas
1: Packet Ingress
Contents
Introduction
Platform Guide
Troubleshooting the Packet Ingress Phase
Identify the Traffic in Question
Check for Connection Events
Capturing Packets on the Ingress and Egress Interfaces
SFR - Capture on the ASA Interfaces
FTD (non-SSP and FPR-2100) - Capture on the Ingress and Egress Interfaces
FTD (SSP) - Capture on the Logical FTD Interfaces
Check for Interface Errors
SFR - Check ASA Interfaces
FTD (non-SSP and FPR-2100) - Check for Interface Errors
FTD (SSP) - Navigating the Data Path to Look for Interface Errors
Data to Provide to Cisco Technical Assistance Center (TAC)
Next Step: Troubleshoot the Firepower DAQ Layer
Introduction
This article is part of a series of articles which explain how to systematically troubleshoot the data
path on Firepower systems to determine whether components of Firepower may be affecting
traffic. Please refer to the Overview article for information about the architecture of Firepower
platforms and links to the other Data Path Troubleshooting articles.
In this article, we will look at the first stage of the Firepower data path troubleshooting, the Packet
Ingress stage.
Platform Guide
The following table describes the platforms covered by this article.
Platform Applicable
Code Description Hardware Notes
Name Platforms
ASA with FirePOWER Services (SFR) ASA-5500-X
SFR N/A
module installed. series
FTD (non- Firepower Threat Defense (FTD) image ASA-5500-X
N/A
SSP and installed on an Adaptive Security Appliance series, virtual
FPR-2100) (ASA) or a Virtual Platform NGFW platforms
FTD installed as a logical device on a The 2100 series does
FPR-9300, FPR-
FTD (SSP) Firepower eXtensible Operative System not use the FXOS
4100, FPR-2100
(FXOS) based chassis Chassis Manager
For example:
Tip: You may not be able to identify the exact source port since it is often different in each
flow, but the destination (server) port should suffice.
Note: Prior to checking Connection Events, ensure that logging is enabled in your Access
Control Policy rules. Logging is configured in the "Logging" tab within each Access Control
Policy rule as well as the Security Intelligence tab. Make sure the suspect rules are
configured to send the logs to the "Event Viewer".
In the example above, "Edit Search" is clicked and a unique source (Initiator) IP is added as a filter
to see the flows which were being detected by Firepower. The Action column shows "Allow" for
this host traffic.
If Firepower is intentionally blocking traffic, the Action contains the word "Block". Clicking on
"Table View of Connection Events" provides more data. The following fields in the Connection
Events can be noted if the action is "Block":
- Reason
This, combined with the other fields in the event in question, can help to narrow down which
component is blocking the traffic.
For more information about troubleshooting Access Control Rules, you can click here.
Here are instructions on how to run an ingress and egress packet capture on the various platforms
mentioned above:
Since the SFR module is simply a module running on the ASA Firewall, it is best to first capture on
the ingress and egress interfaces of the ASA to make sure that the same packets which ingress
are also egressing.
This article contains instructions on how to perform the captures on the ASA.
If it has been determined that the packets which are ingressing the ASA are not egressing,
continue to the next phase in troubleshooting (the DAQ phase).
Note: If packets are seen on the ASA ingress interface, it may be worth checking the
connected devices.
FTD (non-SSP and FPR-2100) - Capture on the Ingress and Egress Interfaces
Capturing on a non-SSP FTD device is similar to capturing on the ASA. However, you can run the
capture commands directly from the CLI initial prompt. When troubleshooting dropped packets it is
advised to add the "trace" option to the capture.
Here is an example of configuring an ingress capture for TCP traffic on port 22:
If you add the "trace" option, you can then select an individual packet to trace through the system
to see how it came to the final verdict. It also helps to make sure that the proper modifications are
done to the packet such as Network Address Translation (NAT) IP modification and that the proper
egress interface has been chosen.
In the example above, we see that the traffic make it to Snort inspection and that it finally reached
an allow verdict and overall was passed through the device. Since the traffic can be seen in both
directions you can be sure traffic is flowing through the device for this session, so an egress
capture may not be needed, but you can take one there as well to make sure the traffic is
egressing properly as shown in the trace output.
Note: If the device is unable to create the egress packet, the trace action is still "allow" but
the packet is not created or seen on the egress interface capture. This is a very common
scenario where the FTD doesn't have an ARP entry for the next hop or destination IP (if this
last one is directly connected).
The same steps to generate a packet capture on FTD as mentioned above can be followed on an
SSP platform. You can connect using SSH into the IP address of the FTD logical interface and
enter the following command:
If multi-instances are being used, the instance ID must be included on the "connect" command.
Telnet command can be used to connect to different instances at the same time.
Since the FirePOWER (SFR) module is basically a virtual machine running on an ASA, the actual
ASA interfaces are checked for errors. For detailed information on checking the interface statistics
on the ASA, see this ASA Series Command Reference guide section.
FTD (SSP) - Navigating the Data Path to Look for Interface Errors
The 9300 and 4100 SSP platforms have an internal fabric interconnect which first handles the
packets.
It is worth to check if there are any interface issues at the initial packet ingress. These are the
commands to run on the FXOS system CLI in order to get this information.
In order to check for any interface level issues, enter the following commands:
# connect module 1 telnet
Firepower-module1>connect ftd ftd1
Connecting to container ftd(ftd1) console... enter "exit" to return to Boot CLI
>
This is an output example (possible issues highlighted in red):
If any errors are seen, the actual FTD software can be checked for interface errors as well.
In order to get to the FTD prompt, it is first necessary to navigate to the FTD CLI prompt.
To proceed, please review the next phase of Firepower data path troubleshooting; The Firepower
DAQ. Click here to continue.