Asafps Local MGMT Config Guide v67
Asafps Local MGMT Config Guide v67
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2020 Cisco Systems, Inc. All rights reserved.
CHAPTER 1
Get Started Using ASA with FirePOWER Services
The Cisco ASA FirePOWER module can be deployed on select Cisco ASA 5500-X series appliances. For
detailed information, see the Cisco Firepower Compatibility Guide. The module is designed to help you handle
network traffic in a way that complies with your organization’s security policy.
This guide provides information about configuration of the features and functionality of the ASA FirePOWER
module, accessible using the Adaptive Security Device Manager (ASDM).
Alternatively, to manage an ASA with FirePOWER Services device using the Firepower Management Center,
see the Cisco Firepower Management Center Configuration Guide.
• Quick Start: Basic Setup, on page 1
• ASA With FirePOWER Services Devices, on page 4
• ASA With FirePOWER Services Features, on page 4
• Firepower Online Help, How To, and Documentation, on page 6
• Firepower System IP Address Conventions, on page 7
• Additional Resources, on page 7
Note Skip the section on registering ASA with FirePOWER Services with Firepower Management Center to manage
ASA with FirePOWER Services using ASDM.
Caution You can manage any particular appliance using either the Firepower Management Center or using ADSM
but not both. Switching management methods erases the existing appliance configuration.
2. Start ASDM.
3. Configure ASA with FirePOWER Services.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
1
Get Started Using ASA with FirePOWER Services
Set Up Policy and Basic Configuration
Step 1 Start ASDM and log in to the ASA with FirePOWER Services module as discussed in its Quick Start Guide.
Step 2 In the top navigation bar, click Configuration.
Step 3 On the side navigation bar, click ASA FirePOWER Configuration.
The configuration page is displayed as follows.
Step 4 Create the access control policy as discussed in Creating a Basic Access Control Policy, on page 65.
a) Expand Policies.
b) Click Access Control Policy.
c) Click ASA with FirePOWER.
The policy page is displayed as follows.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
2
Get Started Using ASA with FirePOWER Services
Set Up Policy and Basic Configuration
d) In most cases, for Default Action, we recommend choosing Intrusion Prevention: Balanced Security and
Connectivity.
Step 5 Customize other common settings:
a) Managing ASA FirePOWER Module Interfaces
b) Configuring the Access List for Your Appliance
c) Viewing and Modifying the Appliance Information
d) To use Advanced Malware Protection, Enabling Cloud Communications
e) Stream logs to a Creating a Syslog Alert Response or Creating an SNMP Alert Response using external alerts
f) Automating Backup Jobs
g) Automating Software Downloads
h) Automating Software Installs
i) Using Recurring Rule Updates
j) Automating URL Filtering Updates
k) Automating Geolocation Database Updates
What to do next
Configure ASA options as discussed in the Cisco Adaptive Security Device Manager Configuration Guides.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
3
Get Started Using ASA with FirePOWER Services
ASA With FirePOWER Services Devices
Back up data on your appliance Backup and restore Using Backup and Restore, on page
505
Baseline your appliance Restore to factory defaults • Cisco ASA and Firepower
(reimage) Threat Defense Reimage
Guide
• Section on reimaging the
FirePOWER module in the
Cisco Adaptive Security
Device Manager
Configuration Guides
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
4
Get Started Using ASA with FirePOWER Services
Features for Detecting, Preventing, and Processing Potential Threats
Update the VDB, intrusion rule Vulnerability Database (VDB) Understanding Update Types, on
updates, or GeoDB on your updates, intrusion rule updates, or page 477
appliance Geolocation Database (GeoDB)
updates
Translate private addresses into Network Address Translation Cisco Adaptive Security Device
public addresses for internet (NAT) Manager Configuration Guides
connections
Inspect, log, and take action on Access control policy, the parent Getting Started with Access Control
network traffic of several other policies Policies, on page 63
Blacklist connections to or from IP Security Intelligence in your access Choosing a Security Intelligence
addresses, URLs, and/or domain control policy Strategy, on page 84
names
Monitor malicious traffic and Intrusion policy About Intrusion Policies, on page
intrusions on your network 279
Allow or block files on your File policy Controlling Traffic Using Intrusion
network and File Policies, on page 137
Configure passive or active user User awareness, user identity, Introduction to Identity Data, on
authentication to perform user identity policies page 329
awareness and user control
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
5
Get Started Using ASA with FirePOWER Services
Firepower Online Help, How To, and Documentation
You can find additional documentation related to the Firepower system using the documentation roadmap:
http://www.cisco.com/c/en/us/td/docs/security/firepower/roadmap/firepower-roadmap.html.
Related Documentation
The documents listed in this section might be helpful when configuring your ASA with FirePOWER Services
appliance.
For more information about... See the FMC Configuration Guide part > chapter
Realms for user control Discovery and Identity > Create and Manage
Realms
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
6
Get Started Using ASA with FirePOWER Services
Supported Devices Statements in the Documentation
For more information about... See the FMC Configuration Guide part > chapter
Additional Resources
The Firewalls Community is an exhaustive repository of reference material that complements our extensive
documentation. This includes links to 3D models of our hardware, hardware configuration selector, product
collateral, configuration examples, troubleshooting tech notes, training videos, lab and Cisco Live sessions,
social media channels, Cisco Blogs and all the documentation published by the Technical Publications team.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
7
Get Started Using ASA with FirePOWER Services
Additional Resources
Some of the individuals posting to community sites or video sharing sites, including the moderators, work
for Cisco Systems. Opinions expressed on those sites and in any corresponding comments are the personal
opinions of the original authors, not of Cisco. The content is provided for informational purposes only and is
not meant to be an endorsement or representation by Cisco or any other party.
Note Some of the videos, technical notes, and reference material in the Firewalls Community points to older versions
of the Firepower Management Center. Your version of the Firepower Management Center and the version
referenced in the videos or technical notes might have differences in the user interface that cause the procedures
not to be identical.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
8
CHAPTER 2
Managing Device Configuration
The Device Management page allows you to manage the device and interface configurations for the ASA
FirePOWER module.
Caution If you configure the ASA in a failover pair, the ASA FirePOWER configuration does not automatically
synchronize with the ASA FirePOWER module on the secondary device. You must manually export the ASA
FirePOWER configuration from the primary and import it into the secondary every time you make a change.
Step 1 Click Configuration > ASA FirePOWER Configuration > Device Management > Device.
The Device page is displayed.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
9
Managing Device Configuration
Viewing Device System Settings
The changes are saved. Note that your changes do not take effect until you apply the device configuration; see Applying
Changes to Device Configuration, on page 12 for more information.
Field Description
Version The version of the software currently installed on the ASA FirePOWER module.
Policy A link to the system policy currently applied to the ASA FirePOWER module.
Field Description
You can use the Advanced section to edit any of these settings. See the following sections for more information:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
10
Managing Device Configuration
Editing Advanced Device Settings
You can change the bypass threshold if the option is selected. The default setting is 3000 milliseconds (ms).
The valid range is from 250 ms to 60,000 ms.
Note AAB is activated only when an excessive amount of time is spent processing a single packet. If AAB engages,
the system kills all Snort processes.
For more information about enabling Automatic Application Bypass and setting the bypass threshold, see
Editing Advanced Device Settings, on page 11.
Step 1 Select Configuration > ASA FirePOWER Configuration > Device Management > Device.
The Device page appears.
Step 3 Optionally, select Automatic Application Bypass if your network is sensitive to latency. Automatic Application Bypass
is most useful in inline deployments. For more information, see Automatic Application Bypass, on page 10.
Step 4 When you select the Automatic Application Bypass option, you can type a Bypass Threshold in milliseconds (ms).
The default setting is 3000 ms and the valid range is from 250 ms to 60,000 ms.
Step 5 Click Save.
Your changes are saved. Note that your changes do not take effect until you apply the device configuration; see Applying
Changes to Device Configuration, on page 12 for more information.
Step 1 Select Configuration > ASA FirePOWER Configuration > Device Management > Interfaces .
The Interfaces page appears.
Step 2 Next to the interface you want to edit, click the edit icon ( ).
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
11
Managing Device Configuration
Applying Changes to Device Configuration
Step 3 From the Security Zone drop-down list, select an existing security zone or select New to add a new security zone.
Step 4 Click Store ASA FirePOWER Changes.
The security zone is configured. Note that your changes do not take effect until you apply the device configuration; see
Applying Changes to Device Configuration, on page 12 for more information.
Step 1 Select Configuration > ASA FirePOWER Configuration > Device Management > Device or Configuration > ASA
FirePOWER Configuration > Device Management > Interfaces.
The Device Management page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
12
Managing Device Configuration
Configuring Remote Management
Step 1 Select Configuration> ASA FirePOWER Configuration > Device Management > Device or Configuration > ASA
FirePOWER Configuration > Device Management > Interfaces .
The Device Management page appears.
Step 4 Click Previous and Next to scroll through the differences between the current appliance configuration and the proposed
appliance configuration.
Step 5 Optionally, click Comparison Report to produce a PDF version of the report.
Note After you establish remote management and register the Cisco ASA with FirePOWER Services with a
Firepower Management Center, you must manage the ASA FirePOWER module from the Firepower
Management Center instead of from ASDM. You cannot remotely manage the Cisco ASA with FirePOWER
Services with the ASDM console after the appliance is registered to a Firepower Management Center.
To enable communications between two appliances, you must provide a way for the appliances to recognize
each other. There are three criteria the Firepower system uses when allowing communications:
• the hostname or IP address of the appliance with which you are trying to establish communication
In NAT environments, even if the other appliance does not have a routable address, you must provide a
hostname or an IP address either when you are configuring remote management, or when you are adding the
managed appliance.
• a self-generated alphanumeric registration key up to 37 characters in length that identifies the connection
• an optional unique alphanumeric NAT ID that can help the Firepower system establish communications
in a NAT environment
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
13
Managing Device Configuration
Editing Remote Management
The NAT ID must be unique among all NAT IDs used to register managed appliances.
When you register a managed device to a Firepower Management Center, the access control policy you select
applies to the device. However, if you do not enable licenses for the device required by features used in the
access control policy you select, the access control policy apply fails.
To configure remote management of the local appliance:
Access: Admin
Step 1 Select Configuration > ASA FirePOWER Configuration > Integration > Remote Management.
The Remote Management page appears.
Step 3 In the Management Host field, type the IP address or the hostname of the appliance that you want to use to manage this
appliance.
The hostname is the fully qualified domain name or the name that resolves through the local DNS to a valid IP address.
In a NAT environment, you do not need to specify an IP address or hostname here if you plan to specify it when you add
the managed appliance. In this case, the Firepower system uses the NAT ID you will provide later to identify the remote
manager on the managed ASA FirePOWER module interface.
Caution Use a hostname rather than an IP address if your network uses DHCP to assign IP addresses.
Step 4 In the Registration Key field, type the registration key that you want to use to set up communications between appliances.
Step 5 For NAT environments, in the Unique NAT ID field, type a unique alphanumeric NAT ID that you want to use to set
up communications between appliances.
Step 6 Click Save.
After the appliances confirm that they can communicate with each other, the Pending Registration status appears.
Step 7 Use the managing appliance’s web user interface to add this appliance to your deployment.
Note When enabling remote management of a device, in some high availability deployments that use NAT, you may
also need to add the secondary Firepower Management Center as a manager. For more information, contact
Support.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
14
Managing Device Configuration
Configuring eStreamer on the eStreamer Server
Step 1 Select Configuration > ASA FirePOWER Configuration > Integration > Remote Management.
The Remote Management page appears.
Step 2 Click the edit icon ( ) next to the manager for which you want to edit remote management settings.
The Edit Remote Management page appears.
Step 3 In the Name field, change the display name of the managing appliance.
Step 4 In the Host field, change the IP address or the hostname of the managing appliance.
The hostname is the fully qualified domain name or the name that resolves through the local DNS to a valid IP address.
Step 1 Select Configuration > ASA FirePOWER Configuration > Integration > eStreamer.
The eStreamer Event Configuration page appears.
Step 2 Under eStreamer Event Configuration, select the check boxes next to the types of events you want eStreamer to forward
to requesting clients.
You can select any or all of the following on a managed device or Firepower Management Center:
• Intrusion Events to transmit intrusion events.
• Intrusion Event Packet Data to transmit packets associated with intrusion events.
• Intrusion Event Extra Data to transmit additional data associated with an intrusion event such as the originating
IP addresses of a client connecting to a web server through an HTTP proxy or load balancer.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
15
Managing Device Configuration
Adding Authentication for eStreamer Clients
Note Note that this controls which events the eStreamer server can transmit. Your client must still specifically request
the types of events you want it to receive in the request message it sends to the eStreamer server. For more
information, see the Firepower system eStreamer Integration Guide .
Step 1 Select Configuration > ASA FirePOWER Configuration > Integration > Remote Management.
The Registration page appears.
Step 4 In the Hostname field, enter the host name or IP address of the host running the eStreamer client.
Note If you use a host name, the eStreamer server must be able to resolve the host to an IP address. If you have not
configured DNS resolution, you should configure it first or use an IP address.
Step 5 If you want to encrypt the certificate file, enter a password in the Password field.
Step 6 Click Save.
The eStreamer server now allows the host to access port 8302 on the eStreamer server and creates an authentication
certificate to use during client-server authentication. The eStreamer page reappears, with the new client listed under
Hostname.
Step 7 Click the download icon ( ) next to the client hostname to download the certificate file.
Step 8 Save the certificate file to the appropriate directory used by your client for SSL authentication.
The client can now connect to the eStreamer server. You do not need to restart the eStreamer service.
Tip To revoke access for a client, click the delete icon ( ) next to the host you want to remove. Note that you do
not need to restart the eStreamer service; access is revoked immediately.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
16
CHAPTER 3
Managing Reusable Objects
For increased flexibility and ease of use, the ASA FirePOWER module allows you to create named objects,
which are reusable configurations that associate a name with a value so that when you want to use that value,
you can use the named object instead.
You can create the following types of objects:
• Network based objects that represent IP addresses and networks, port/protocol pairs, security zones, and
origin/destination country (geolocation)
• Objects that help you handle unencrypted and decrypted traffic, including Security Intelligence feeds
and lists, application filters, URLs, file lists, and intrusion policy variable sets
You can use these objects in various places in the ASA FirePOWER module, including access control policies,
network analysis policies, intrusion policies, reports, dashboards, and so on.
Grouping objects allows you to reference multiple objects with a single configuration. You can group network,
port, and URL, and public key infrastructure (PKI) objects.
Note In most cases, editing an object used in a policy requires redeploying your configuration for your changes to
take effect.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
17
Managing Reusable Objects
Using the Object Manager
Grouping Objects
License: Any
You can group network, port, PKI, and URL objects. The system allows you to use objects and object groups
interchangeably. For example, anywhere you would use a port object, you can also use a port object group.
Objects and object groups of the same type cannot have the same name.
When you edit an object group used in a policy (for example, a network object group used in an access control
policy), you must redeploy the configuration for your changes to take effect; see Deploying Configuration
Changes, on page 73.
Deleting a group does not delete the objects in the group, just their association with each other. Additionally,
you cannot delete a group that is in use. For example, you cannot delete a URL group that you are using in a
URL condition in a saved access control policy.
To group reusable objects:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Under the type of Network, Port, URL, PKI, or Distinguished Name object you want to group, choose Object Groups.
Step 3 Click the Add button that corresponds with the object you want to group.
Step 4 Enter a Name for the group. You can use any printable standard ASCII characters except curly braces ({}).
Step 5 Choose one or more objects and click Add.
• Use Shift and Ctrl to choose multiple objects, or right click and Select All.
• Use the filter field ( ) to search for existing objects to include, which updates as you type to display matching
items. Click the reload icon ( ) above the search field or click the clear icon ( ) in the search field to clear the
search string.
• Click the add icon ( ) to create objects on the fly if no existing objects meet your needs.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
18
Managing Reusable Objects
Browsing, Sorting, and Filtering Objects
Click a column heading. To sort in the opposite direction, click the heading again.
To filter objects or groups:
a) Enter your filter criteria in the Filter field.
The page updates as you type to display matching items. The field accepts one or more asterisks (*) as wild cards.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
19
Managing Reusable Objects
Working with Security Intelligence Lists and Feeds
You also cannot delete a network object that is in use. Additionally, after you edit a network object used in
an access control or intrusion policy, you must redeploy policies for your changes to take effect.
To create a network object:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Under Network, choose Individual Objects.
Step 3 Click Add Network.
Step 4 Enter a Name for the network object. You can use any printable standard ASCII characters except curly braces ({}).
Step 5 For each IP address or address block you want to add to the network object, enter its value and click Add.
Step 6 Click Store ASA FirePOWER Changes.
If an active policy references your object, deploy configuration changes; see Deploying Configuration Changes, on page
73.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
20
Managing Reusable Objects
Working with Security Intelligence Lists and Feeds
Note If you want strict control over when the system downloads a feed from the Internet, you can disable automatic
updates for that feed. However, Cisco recommends that you allow automatic updates. Although you can
manually perform on demand updates, allowing the system to download feeds on a regular basis provides you
with the most up to date, relevant data.
In contrast with a feed, a Security Intelligence list is a simple static list of IP addresses that you manually
upload to the system. Use custom lists to augment and fine tune feeds and the global whitelist and blacklist.
Note that editing custom lists (as well as editing network objects and removing IP addresses from the global
whitelist or blacklist) require you to redeploy the configuration for your changes to take effect.
Capability Global Whitelist Intelligence Custom Feed Custom List Network Object
or Blacklist Feed
method of use in access control in any access control policy as either a whitelist or blacklist object
policies by
default
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
21
Managing Reusable Objects
Working with the Global Whitelist and Blacklist
Capability Global Whitelist Intelligence Custom Feed Custom List Network Object
or Blacklist Feed
Step 1 On the object manager's Security Intelligence page, next to the global whitelist or blacklist, click the edit icon ( ).
Step 2 Next to the IP addresses you ant to remove from the list, click the delete icon ( ).
To delete multiple IP addresses at once, use the Shift and Ctrl keys to choose them, then right click and choose Delete.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
22
Managing Reusable Objects
Working with the Intelligence Feed
Step 1 On the object manager's Security Intelligence page, next to the Intelligence Feed, click the edit icon ( ).
Step 2 Edit the Update Frequency.
You can choose various intervals from two hours to one week. You can also disable feed updates.
Step 1 On the object manager's Security Intelligence page, click Add Security Intelligence.
Step 2 Enter a Name for the feed. You can use any printable standard ASCII characters except curly braces ({}).
Step 3 From the Type drop down list, specify that you want to configure a Feed.
Step 4 Specify a Feed URL and optionally, an MD5 URL.
Step 5 Specify an Update Frequency.
You can choose various intervals from two hours to one week. You can also disable feed updates.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
23
Managing Reusable Objects
Manually Updating Security Intelligence Feeds
Step 1 On the object manager's Security Intelligence page, click Update Feeds.
Step 2 Confirm that you want to update all feeds.
The system warns that it can take several minutes for the update to take effect.
Step 1 On the object manager's Security Intelligence page, click Add Security Intelligence.
Step 2 Enter a Name for the list. You can use any printable standard ASCII characters except curly braces ({}).
Step 3 From the Type drop down list, specify that you want to upload a List.
Step 4 Click Browse to browse to the list.txt file, then click Upload.
The list is uploaded. The pop up window displays the total number of IP addresses and address blocks that the system
found in the list.
If the number is not what you expected, check the formatting of the file and try again.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
24
Managing Reusable Objects
Updating a Security Intelligence List
Step 1 On the object manager's Security Intelligence page, next to the list you want to update, click the edit icon ( ).
Step 2 If you need a copy of the list to edit, click Download, then follow the prompts to save the list as a text file.
Make changes to the list as necessary.
Step 3 On the Security Intelligence pop up window, click Browse to browse to the modified list, then click Upload.
Step 4 Click Store ASA FirePOWER Changes.
If an active policy references your object, deploy configuration changes; see Deploying Configuration Changes, on page
73.
Note that the system provides default port objects for well-known ports. You can modify or delete these
objects, but Cisco recommends that you create custom port objects instead.
You can use port objects and groups (see Grouping Objects, on page 18) in various places in the ASA
FirePOWER module, including access control policies and port variables.
You cannot delete a port object that is in use. Additionally, after you edit or delete a port object, if an active
policy references the object, you must redeploy your configuration for the changes to take effect; see Deploying
Configuration Changes, on page 73.
Note that you cannot add any protocol other than TCP or UDP for source port conditions in access control
rules. Also, you cannot mix transport protocols when setting both source and destination port conditions in a
rule.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
25
Managing Reusable Objects
Working with URL Objects
If you add an unsupported protocol to a port object group used in a source port condition, the rule where it is
used does not apply on policy deploy. Additionally, if you create a port object containing both TCP and UDP
ports, then add it as a source port condition in a rule, you cannot add a destination port, and vice versa.
To create a port object:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Under Port, choose Individual Objects.
Step 3 Click Add Port.
Step 4 Enter a Name for the port object. You can use any printable standard ASCII characters except curly braces ({}).
Step 5 Choose a Protocol.
You can quickly choose TCP, UDP, IP, ICMP, or IPv6 ICMP, or you can use the Other drop down list to choose either
a different protocol or All protocols.
Step 6 Optionally, restrict a TCP or UDP port object using a Port or port range.
You can specify any port from 1 to 65535 or any to match all ports. Use a hyphen to specify a range of ports.
Step 7 Optionally, restrict an ICMP or IPV6 ICMP port object using a Type and, if appropriate, a related Code.
When you create an ICMP or IPv6 ICMP object, you can specify the type and, if applicable, the code. For more information
on ICMP types and codes, see http://www.iana.org/assignments/icmp-parameters/icmp-parameters.xml and
http://www.iana.org/assignments/icmpv6-parameters/icmpv6-parameters.xml. You can set the type to any to match any
type or set the code to any to match any code for the specified type.
Step 8 Optionally, choose Other and a protocol from the drop-down list. If you choose All protocols, enter a port number in the
Port field.
Step 9 Click Store ASA FirePOWER Changes.
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
26
Managing Reusable Objects
Working with Application Filters
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
27
Managing Reusable Objects
Working with Application Filters
The system links different types of filters with an AND operation. For example, if you choose the medium
and high risk filters and the medium and high business relevance filters, the system displays the applications
that have medium or high risk, and also have medium or high business relevance.
Tip Click an information icon ( ) for more information about the associated application. To display additional
information, click any of the Internet search links in the information pop up.
After you determine the applications you want to add to the filter, you can add them either individually, or,
if you chose an application filter, All apps matching the filter. You can add multiple filters and multiple
applications, in any combination, as long as the total number of items in the Selected Applications and Filters
list does not exceed 50.
After you create the application filter, it is listed on the Application Filters page of the object manager. The
page displays the total number of conditions that comprise each filter.
For information on sorting and filtering the application filters that appear, see Using the Object Manager, on
page 18. Note that you cannot delete an application filter that is in use. Additionally, after you edit or delete
an application filter object, if an active policy references the object, you must redeploy your configuration for
the changes to take effect; see Deploying Configuration Changes, on page 73.
To create an application filter:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Click Application Filters.
Step 3 Click Add Application Filter.
Step 4 Enter a Name. You can use any printable standard ASCII characters except curly braces ({}).
Step 5 Optionally, use system provided filters in the Application Filters list to narrow the list of applications you want to add to
the filter:
• Click the arrow next to each filter type to expand and collapse the list.
• Right click a filter type and click Check All or Uncheck All. Note that the list indicates how many filters you have
selected of each type.
• To narrow the filters that appear, enter a search string in the Search by name field; this is especially useful for
categories and tags. To clear the search, click the clear icon ( ) .
• To refresh the filters list and clear any selected filters, click the reload icon ( ).
• To clear all filters and search fields, click Clear All Filters.
The applications that match the filters you select appear in the Available Applications list. The list displays 100 applications
at a time.
Step 6 Choose the applications that you want to add to the filter from the Available Applications list:
• Choose All apps matching the filter to add all the applications that meet the constraints you specified in the previous
step.
• To narrow the individual applications that appear, enter a search string in the Search by name field. To clear the
search, click the clear icon ( ).
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
28
Managing Reusable Objects
Working with Variable Sets
• Use the paging icons at the bottom of the list to browse the list of individual available applications.
• Use Shift and Ctrl keys to choose multiple individual applications. Right click to Select All currently displayed
individual applications.
• To refresh the applications list and clear any selected applications, click the reload icon ( ).
You cannot choose individual applications and All apps matching the filter at the same time.
Step 7 Add the selected applications to the filter. You can click and drag, or you can click Add to Rule.
The result is the combination of:
• the selected Application Filters
• either the selected individual Available Applications, or All apps matching the filter
You can add up to 50 applications and filters to the filter. To delete an application or filter from the selected applications,
click the appropriate delete icon ( ). You can also select one or more applications and filters, or right click to Select
All, then right click to Delete Selected.
Tip Preprocessor rules can trigger events regardless of the hosts defined by network variables used in intrusion
rules.
You use variable sets to manage, customize, and group your variables. You can use the default variable set
provided by the ASA FirePOWER module or create your own custom sets. Within any set you can modify
predefined default variables and add and modify user defined variables.
Most of the shared object rules and standard text rules that the ASA FirePOWER module provides use
predefined default variables to define networks and port numbers. For example, the majority of the rules use
the variable $HOME_NET to specify the protected network and the variable $EXTERNAL_NET to specify
the unprotected (or outside) network. In addition, specialized rules often use other predefined variables. For
example, rules that detect exploits against web servers use the $HTTP_SERVERS and $HTTP_PORTS
variables.
Rules are more effective when variables more accurately reflect your network environment. At a minimum,
you should modify default variables in the default set as described in Optimizing Predefined Default Variables,
on page 30. By ensuring that a variable such as $HOME_NET correctly defines your network and
$HTTP_SERVERS includes all web servers on your network, processing is optimized and all relevant systems
are monitored for suspicious activity.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
29
Managing Reusable Objects
Optimizing Predefined Default Variables
To use your variables, you link variable sets to intrusion policies associated with access control rules or with
the default action of an access control policy. By default, the default variable set is linked to all intrusion
policies used by access control policies.
$DNS_SERVERS Defines Domain Name Service Not required in current rule set.
(DNS) servers. If you create a rule
that affects DNS servers
specifically, you can use the
$DNS_SERVERS variable as a
destination or source IP address.
$EXTERNAL_NET Defines the network that the ASA Yes, you should adequately define
FirePOWER module views as the $HOME_NET and then exclude
unprotected network, and is used $HOME_NET as the value for
in many rules to define the external $EXTERNAL_NET.
network.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
30
Managing Reusable Objects
Optimizing Predefined Default Variables
$FTP_PORTS Defines the ports of FTP servers on Yes, if your FTP servers use ports
your network, and is used for FTP other than the default ports (you can
server exploit rules. view the default ports in the module
interface).
$HOME_NET Defines the network that the Yes, to include the IP addresses for
associated intrusion policy your internal network.
monitors, and is used in many rules
to define the internal network.
$HTTP_PORTS Defines the ports of web servers on Yes, if your web servers use ports
your network, and is used for web other than the default ports (you can
server exploit rules. view the default ports in the module
interface).
$HTTP_SERVERS Defines the web servers on your Yes, if you run HTTP servers.
network. Used in web server
exploit rules.
$ORACLE_PORTS Defines Oracle database server Yes, if you run Oracle servers.
ports on your network, and is used
in rules that scan for attacks on
Oracle databases.
$SIP_SERVERS Defines SIP servers on your Yes, if you run SIP servers, you
network, and is used in rules that should adequately define
address SIP-targeted exploits. $HOME_NET and then include
$HOME_NET as the value for
$SIP_SERVERS.
$SMTP_SERVERS Defines SMTP servers on your Yes, if you run SMTP servers.
network, and is used in rules that
address exploits that target mail
servers.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
31
Managing Reusable Objects
Optimizing Predefined Default Variables
$SNMP_SERVERS Defines SNMP servers on your Yes, if you run SNMP servers.
network, and is used in rules that
scan for attacks on SNMP servers.
$SNORT_BPF Identifies a legacy advanced No, you can only view or delete this
variable that appears only when it variable. You cannot edit it or
existed on your system in a ASA recover it after deleting it.
FirePOWER module software
release before Version 5.3.0 that
you subsequently upgraded to
Version 5.3.0 or greater. See
Understanding Advanced
Variables, on page 44.
$SQL_SERVERS Defines database servers on your Yes, if you run SQL servers.
network, and is used in rules that
address database-targeted exploits.
$SSH_PORTS Defines the ports of SSH servers Yes, if your SSH servers use ports
on your network, and is used for other than the default port (you can
SSH server exploit rules. view the default ports in the module
interface).
$SSH_SERVERS Defines SSH servers on your Yes, if you run SSH servers, you
network, and is used in rules that should adequately define
address SSH-targeted exploits. $HOME_NET and then include
$HOME_NET as the value for
$SSH_SERVERS.
$TELNET_SERVERS Defines known Telnet servers on Yes, if you run Telnet servers.
your network, and is used in rules
that address Telnet server-targeted
exploits.
$USER_CONF Provides a general tool that allows No, only as instructed in a feature
you to configure one or more description or with the guidance of
features not otherwise available via Support.
the module interface. See
Understanding Advanced
Variables, on page 44.
Caution Conflicting or duplicate
$USER_CONF
configurations will halt
the system. See
Understanding
Advanced Variables, on
page 44.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
32
Managing Reusable Objects
Understanding Variable Sets
Optionally, you can customize the value of Var1 in any set. In Custom Set 2 where Var1 has not been
customized, its value is 192.168.1.0/24. In Custom Set 1 the customized value 192.168.2.0/24 of Var1 overrides
the default value. Resetting a user defined variable in the default set resets its default value to any in all sets.
It is important to note in this example that, if you do not update Var1 in Custom Set 2, further customizing
or resetting Var1 in the default set consequently updates the current, default value of Var1 in Custom Set 2,
thereby affecting any intrusion policy linked to the variable set.
Although not shown in the example, note that interactions between sets are the same for user defined variables
and default variables except that resetting a default variable in the default set resets it to the value configured
by the system in the current rule update.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
33
Managing Reusable Objects
Managing Variable Sets
Note that, except for the origin of Var1 from Custom Set 1, this example is identical to the example above
where you added Var1 to the default set. Adding the customized value 192.168.1.0/24 for Var1 to Custom
Set 1 copies the value to the default set as a customized value with a default value of any. Thereafter, Var1
values and interactions are the same as if you had added Var1 to the default set. As with the previous example,
keep in mind that further customizing or resetting Var1 in the default set consequently updates the current,
default value of Var1 in Custom Set 2, thereby affecting any intrusion policy linked to the variable set.
In the next example, you add Var1 with the value 192.168.1.0/24 to Custom Set 1 as in the previous example,
but you elect not to use the configured value of Var1 as the default value in other sets.
This approach adds Var1 to all sets with a default value of any. After adding Var1, you can customize its
value in any set. An advantage of this approach is that, by not initially customizing Var1 in the default set,
you decrease your risk of customizing the value in the default set and thus inadvertently changing the current
value in a set such as Custom Set 2 where you have not customized Var1.
display your variable sets choose Configuration > ASA FirePOWER Configuration > Object Management, then choose Variable
Set.
filter variable sets by name begin entering a name; as you type, the page refreshes to display matching names.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
34
Managing Reusable Objects
Managing Variables
clear name filtering click the clear icon ( ) in the filter field.
edit a variable set click the edit icon ( ) next to the variable set you want to edit.
You can also right-click within the row for a variable set, then choose Edit.
delete a custom variable set click the delete icon ( ) next to the variable set, then click Yes. You cannot delete the default variable
set. Note that variables created in a variable set you delete are not deleted or otherwise affected in other
sets.
You can also right-click within the row for a variable set, choose Delete, then click Yes. Use the Ctrl
and Shift keys to choose multiple sets.
After you configure variable sets, you can link them to intrusion policies.
To create or edit a variable set:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Choose Variable Set.
Step 3 Create a variable set or edit an existing set:
• To create a variable set, click Add Variable Set.
• To create a variable set, click the edit icon ( ) next to the variable set.
See Adding and Editing Variables, on page 37 for information on adding and editing variables within a variable set.
If an active policy references your object, deploy configuration changes; see Deploying Configuration Changes, on page
73.
Managing Variables
License: Protection
You manage variables on the new or edit variables page within a variable set. The variables page for all
variable sets separates variables into Customized Variables and Default Variables page areas.
A default variable is a variable provided by the ASA FirePOWER module. You can customize the value of
a default variable. You cannot rename or delete a default variable, and you cannot change its default value.
A customized variable is one of the following:
• customized default variables
When you edit the value for a default variable, the system moves the variable from the Default Variables
area to the Customized Variables area. Because variable values in the default set determine the default values
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
35
Managing Reusable Objects
Managing Variables
of variables in custom sets, customizing a default variable in the default set modifies the default value of the
variable in all other sets.
• user defined variables
You can add and delete your own variables, customize their values within different variable sets, and reset
customized variables to their default values. When you reset a user defined variable, it remains in the
Customized Variables area.
The following table summarizes the actions you can take to create or edit variables.
display the variables page on the variable sets page, click Add Variable Set to create a new variable set, or click the
edit icon ( ) next to the variable set you want to edit.
name and, optionally, describe your enter an alphanumeric string including spaces and special characters in the Name and
variable set Description fields.
edit a variable click the edit icon ( ) next to the variable you want to edit.
See Adding and Editing Variables, on page 37 for more information.
reset a modified variable to its default click the reset icon ( ) next to a modified variable. A shaded reset icon indicates that the
value current value is already the default value.
delete a user-defined customized click the delete icon ( ) next to the variable set; if you have saved the variable set since
variable adding the variable, then click Yes to confirm that you want to delete the variable.
You cannot delete default variables, and you cannot delete user-defined variables that are
used by intrusion rules or other variables.
save changes to a variable set click Store ASA FirePOWER Changes, then click Yes if the variable set is in use by an
access control policy to confirm that you want to save your changes.
Because the current value in the default set determines the default value in all other sets,
modifying or resetting a variable in the default set changes the current value in other sets
where you have not customized the default value.
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Choose Variable Set.
Step 3 Create a variable set or edit an existing set:
• To create a variable set, click Add Variable Set.
• To create a variable set, click the edit icon ( ) next to the variable set.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
36
Managing Reusable Objects
Adding and Editing Variables
See Adding and Editing Variables, on page 37 for information on adding and editing variables within a variable set.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
37
Managing Reusable Objects
Adding and Editing Variables
When you specify whether you want to add a network or port variable type, the page refreshes to list available
items. A search field above the list allows you to constrain the list, which updates as you type.
You can select and drag available items the list of items to include or exclude. You can also select items and
click the Include or Exclude button. Use the Ctrl and Shift keys to choose multiple items. You can use the
configuration field below the list of included or excluded items to specify literal IP addresses and address
blocks for network variables, and ports and port ranges for port variables.
A list of items to include or exclude can be comprised of any combination of literal strings and existing
variables, objects, and network object groups in the case of network variables.
The following table summarizes the actions you can take to create or edit your variables.
display the variables page on the variable sets page, click Add to add a new variable, or click the edit icon ( )
next to an existing variable.
name your variable in the Name field, enter a unique, case-sensitive alphanumeric string that includes no
special characters other than the underscore character (_).
Note that variable names are case-sensitive; for example, var and Var are each unique.
specify a network or port variable choose Network or Port from the Type drop-down list.
See Working with Network Variables, on page 40and Working with Port Variables,
on page 42 for detailed information on how you can use and configure network and
port variables.
add an individual network object so you can choose Network from the Type drop-down list, then click the add icon . See
then choose it from the list of available Working with Network Objects, on page 19 for information on adding network objects
networks using the object manager.
add an individual port object so you can then choose Port from the Type drop-down list, then click the add icon .
choose it from the list of available ports
Although you can add any port type, only TCP and UDP ports, including the value
any for either type, are valid variable values, and the list of available ports only displays
variables that use these value types. See Working with Port Objects, on page 25 for
information on adding port objects using the object manager.
search for available port or network items by begin entering a name in the search field above the list of available items; as you
name type, the page refreshes to display matching names.
clear name searching click the reload icon ( ) above the search field or the clear icon ( ) in the search
field.
choose objects to include or exclude in the click the object in the list of available networks or ports; use the Ctrl and Shift keys
variable definition to choose multiple objects.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
38
Managing Reusable Objects
Adding and Editing Variables
add selected items to the list of included or drag and drop selected items. Alternately, click Include or Exclude.
excluded networks or ports
You can add network and port variables and objects from the list of available items.
You can also add network object groups.
add a literal network or port to the list of click to remove the prompt from the literal Network or Port field, enter the literal
networks or ports to include or exclude IP address or address block for network variables, or the literal port or port range for
port variables, then click Add.
Note that you cannot enter domain names or lists; to add multiple items, add each
individually.
add a variable with the value any name the variable and specify the variable type, then click Store ASA FirePOWER
Changes without configuring a value.
delete a variable or object from the included click the delete icon ( ) next to the variable.
or excluded list
save a new or modified variable click Store ASA FirePOWER Changes; if you are adding a variable from custom
set, then click Yes to use the configured value as the default value in other sets, or
No to use a default value of any.
After you edit a variable, if an active policy references the object, you must redeploy your configuration for
the changes to take effect; see Deploying Configuration Changes, on page 73.
To create or edit a variable:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Choose Variable Set.
Step 3 Create a variable set or edit an existing set:
• To create a variable set, click Add Variable Set.
• To edit an existing variable set, click the edit icon ( ) next to the variable set.
• To edit an existing variable, click the edit icon ( ) next to the variable.
You can use alphanumeric characters and the underscore (_) character.
• Choose the Network or Port variable Type from the drop down list.
Step 6 Optionally, move items from the list of available networks or ports to the list of included or excluded items.
You can choose one or more items and then drag and drop, or click Include or Exclude. Use the Ctrl and Shift keys to
choose multiple items.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
39
Managing Reusable Objects
Working with Network Variables
Tip Tip If addresses or ports in the included and excluded lists for a network or port variable overlap, excluded
addresses or ports take precedence.
Step 8 Click Store ASA FirePOWER Changes to save the variable. If you are adding a new variable from a custom set, you
have the following options:
• Click Yes to add the variable using the configured value as the customized value in the default set and, consequently,
the default value in other custom sets.
• Click No to add the variable as the default value of any in the default set and, consequently, in other custom sets.
Step 9 When you have finished making changes, click Store ASA FirePOWER Changes to save the variable set, then click
Yes.
If an active policy references your object, deploy configuration changes; see Deploying Configuration Changes, on page
73.
License: Protection
Network variables represent IP addresses you can use in intrusion rules that you enable in an intrusion policy
and in intrusion policy rule suppressions, dynamic rule states, and adaptive profiles. Network variables differ
from network objects and network object groups in that network variables are specific to intrusion policies
and intrusion rules, whereas you can use network objects and groups to represent IP addresses in various
places in the ASA FirePOWER module, including access control policies, network variables, reports, and so
on. See Working with Network Objects, on page 19 for more information.
You can use network variables in the following configurations to specify the IP addresses of hosts on your
network:
• intrusion rules
Intrusion rule Source IPs and Destination IPs header fields allow you to restrict packet inspection to the packets
originating from or destined to specific IP addresses.
• suppressions
The Network field in source or destination intrusion rule suppressions allows you to suppress intrusion event
notifications when a specific IP address or range of IP addresses triggers an intrusion rule or preprocessor.
See Configuring Suppression Per Intrusion Policy, on page 314.
• dynamic rule states
The Network field in source or destination dynamic rule states allows you to detect when too many matches
for an intrusion rule or preprocessor rule occur in a given time period. See Adding Dynamic Rule States, on
page 317.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
40
Managing Reusable Objects
Working with Network Variables
• adaptive profiles
The adaptive profiles Networks field identifies hosts in the network where you want to improve reassembly
of packet fragments and TCP streams in passive deployments. See Tuning Intrusion Policies Using Rules, on
page 291.
When you use variables in the fields identified in this section, the variable set you link to an intrusion policy
determines the variable values in the network traffic handled by an access control policy that uses the intrusion
policy.
You can add any combination of the following network configurations to a variable:
• any combination of network variables, network objects, and network object groups that you select from
the list of available networks
See Working with Network Objects, on page 19 for information on creating individual and group network
objects using the object manager.
• individual network objects that you add from the New Variable or Edit Variable page, and can then
add to your variable and to other existing and future variables
• literal, single IP addresses or address blocks
You can list multiple literal IP addresses and address blocks by adding each individually. You can list IPv4
and IPv6 addresses and address blocks alone or in any combination. When specifying IPv6 addresses, you
can use any addressing convention defined in RFC 4291.
The default value for included networks in any variable you add is the word any, which indicates any IPv4
or IPv6 address. The default value for excluded networks is none, which indicates no network. You can also
specify the address :: in a literal value to indicate any IPv6 address in the list of included networks, or no IPv6
addresses in the list of exclusions.
Adding networks to the excluded list negates the specified addresses and address blocks. That is, you can
match any IP address with the exception of the excluded IP address or address blocks.
For example, excluding the literal address 192.168.1.1 specifies any IP address other than 192.168.1.1, and
excluding 2001:db8:ca2e::fa4c specifies any IP address other than 2001:db8:ca2e::fa4c.
You can exclude any combination of networks using literal or available networks. For example, excluding
the literal values 192.168.1.1 and 192.168.1.5 includes any IP address other than 192.168.1.1 or 192.168.1.5.
That is, the system interprets this as "not 192.168.1.1 and not 192.168.1.5," which matches any IP address
other than those listed between brackets.
Note the following points when adding or editing network variables:
• You cannot logically exclude the value any which, if excluded, would indicate no address. For example,
you cannot add a variable with the value any to the list of excluded networks.
• Network variables identify traffic for the specified intrusion rule and intrusion policy features. Note that
preprocessor rules can trigger events regardless of the hosts defined by network variables used in intrusion
rules.
• Excluded values must resolve to a subset of included values. For example, you cannot include the address
block 192.168.5.0/24 and exclude 192.168.6.0/24. An error message warns you and identifies the offending
variable, and you cannot save your variable set when you exclude a value outside the range of included
values.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
41
Managing Reusable Objects
Working with Port Variables
For information on adding and editing network variables, see Adding and Editing Variables, on page 37.
License: Protection
Port variables represent TCP and UDP ports you can use in the Source Port and Destination Port header fields
in intrusion rules that you enable in an intrusion policy. Port variables differ from port objects and port object
groups in that port variables are specific to intrusion rules. You can create port objects for protocols other
than TCP and UDP, and you can use port objects in port variables and access control policies. See Working
with Port Objects, on page 25 for more information.
You can use port variables in the intrusion rule Source Port and Destination Port header fields to restrict packet
inspection to packets originating from or destined to specific TCP or UDP ports.
When you use variables in these fields, the variable set you link to the intrusion policy associated with an
access control rule or policy determines the values for these variables in the network traffic where the system
applies the access control policy.
You can add any combination of the following port configurations to a variable:
• any combination of port variables and port objects that you cboose from the list of available ports
Note that the list of available ports does not display port object groups, and you cannot add these to variables.
See Working with Port Objects, on page 25 for information on creating port objects using the object manager.
• individual port objects that you add from the New Variable or Edit Variable page, and can then add to
your variable and to other existing and future variables
Only TCP and UDP ports, including the value any for either type, are valid variable values. If you use the
new or edit variables page to add a valid port object that is not a valid variable value, the object is added to
the system but is not displayed in the list of available objects. When you use the object manager to edit a port
object that is used in a variable, you can only change its value to a valid variable value.
• single, literal port values and port ranges
You must separate port ranges with a dash (-). Port ranges indicated with a colon (:) are supported for backward
compatibility, but you cannot use a colon in port variables that you create.
You can list multiple literal port values and ranges by adding each individually in any combination.
Note the following points when adding or editing port variables:
• The default value for included ports in any variable you add is the word any, which indicates any port
or port range. The default value for excluded ports is none, which indicates no ports.
Tip To create a variable with the value any, name and save the variable without adding a specific value.
• You cannot logically exclude the value any which, if excluded, would indicate no ports. For example,
you cannot save a variable set when you add a variable with the value any to the list of excluded ports.
• Adding ports to the excluded list negates the specified ports and port ranges. That is, you can match any
port with the exception of the excluded ports or port ranges.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
42
Managing Reusable Objects
Resetting Variables
• Excluded values must resolve to a subset of included values. For example, you cannot include the port
range 10-50 and exclude port 60. An error message warns you and identifies the offending variable, and
you cannot save your variable set when you exclude a value outside the range of included values
.
For information on adding and editing port variables, see Adding and Editing Variables, on page 37.
Resetting Variables
License: Protection
You can reset a variable to its default value on the variable set new or edit variables page. The following table
summarizes the basic principles of resetting variables.
Resetting a variable in a custom set simply resets it to the current value for that variable in the default set.
Conversely, resetting or modifying the value of a variable in the default set always updates the default value
of that variable in all custom sets. When the reset icon is grayed out, indicating that you cannot reset the
variable, this means that the variable has no customized value in that set. Unless you have customized the
value for a variable in a custom set, a change to the variable in the default set updates the value used in any
intrusion policy where you have linked the variable set.
Note It is good practice when you modify a variable in the default set to assess how the change affects any intrusion
policy that uses the variable in a linked custom set, especially when you have not customized the variable
value in the custom set.
When the customized value and the reset value are the same, this indicates one of the following:
• you are in the custom or default set where you added the variable with the value any
• you are in the custom set where you added the variable with an explicit value and elected to use the
configured value as the default value
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
43
Managing Reusable Objects
Linking Variable Sets to Intrusion Policies
USER_CONF
USER_CONF provides a general tool that allows you to configure one or more features not otherwise available
via the module interface.
Caution Do not use the advanced variable USER_CONF to configure an intrusion policy feature unless you are
instructed to do so in the feature description or by Support. Conflicting or duplicate configurations will halt
the system.
When editing USER_CONF, you can type up to 4096 total characters on a single line; the line wraps
automatically. You can include any number of valid instructions or lines until you reach the 8192 maximum
character length for a variable or a physical limit such as disk space. Use the backslash (\) line continuation
character after any complete argument in a command directive.
Resetting USER_CONF empties it.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
44
Managing Reusable Objects
Working with Sinkhole Objects
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Choose Sinkhole from the list of object types.
Step 3 Click Add Sinkhole.
Step 4 Enter a Name.
Step 5 Enter the IPv4 Address and IPv6 Address of your sinkhole.
Step 6 You have the following options:
• If you want to redirect traffic to a sinkhole server, choose Log Connections to Sinkhole.
• If you want to redirect traffic to a non-resolving IP address, choose Block and Log Connections to Sinkhole.
Step 7 If you want to assign an Indication of Compromise (IoC) type to your sinkhole, choose one from the Type drop-down.
Step 8 Click Store ASA FirePOWER Changes.
Because you manually specify the blocking behavior for these files, the system does not perform malware
cloud lookups, even if the files are otherwise identified as malware by the cloud. Note that you must configure
a rule in the file policy with either a Malware Cloud Lookup or Block Malware action and a matching file
type to calculate a file's SHA value. For more information, see Working with File Rules, on page 378.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
45
Managing Reusable Objects
Uploading Multiple SHA-256 Values to a File List
The system's clean list and custom detection list are included by default in every file policy. You can opt not
to use either or both lists on a per policy basis.
Caution Do not include files on this list that are actually malware. The system does not block them, even if the cloud
assigned the file's a Malware disposition, or if you added the file to the custom detection list.
Each file list can contain up to 10000 unique SHA-256 values. To add files to the file list, you can:
• upload a file so the system calculates and adds the file's SHA 256 value.
• enter a file's SHA-256 value directly.
• create and upload a comma-separated value (CSV) source file containing multiple SHA-256 values. All
non-duplicate SHA-256 values are added to the file list.
When you add a file to a file list, edit a SHA-256 value in the file list, or delete SHA-256 values from the file
list, you must redeploy the configuration for your changes to take effect; see Deploying Configuration Changes,
on page 73.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
46
Managing Reusable Objects
Uploading an Individual File to a File List
• You cannot directly edit a source file within the object manager. To make changes, you must first modify
your source file directly, delete the copy on the system, then upload the modified source file. See
Downloading a Source File from a File List, on page 49 for more information.
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Click File List.
Step 3 Click the edit icon ( ) next to the file list where you want to add values from a source file.
Step 4 Choose List of SHAs from the Add by field.
Step 5 Optionally, enter a description of the source file in the Description field.
If you do not enter a description, the system uses the file name.
Step 6 Click Browse to browse to the source file, then click Upload and Add List to add the list.
The source file is added to the file list. The SHA-256 column lists how many SHA-256 values the file contains.
Step 1 On the object manager's File List page, click the edit icon ( ) next to the clean list or custom detection list where you
want to add a file.
Step 2 Choose Calculate SHA from the Add by field.
Step 3 Optionally, enter a description of the file in the Description field.
If you do not enter a description, the file name is used for the description on upload.
Step 4 Click Browse to browse to the source file, then click Calculate and Add SHA to add the list.
Step 5 Click Store ASA FirePOWER Changes.
If an active policy references your object, deploy configuration changes; see Deploying Configuration Changes, on page
73.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
47
Managing Reusable Objects
Adding a SHA-256 Value to the File List
After configuration deployment, the system no longer performs malware cloud lookups on files in the file list.
Step 1 On the object manager's File List page, click the edit icon ( ) next to the clean list or custom detection list where you
want to add a file.
Step 2 Choose Enter SHA Value from the Add by field.
Step 3 Enter a description of the source file in the Description field.
Step 4 Enter or paste the file's entire SHA-256 value. The system does not support matching partial values.
Step 5 Click Add to add the file.
Step 6 Click Store ASA FirePOWER Changes.
If an active policy references your object, deploy configuration changes; see Deploying Configuration Changes, on page
73.
After configuration deployment, the system no longer performs malware cloud lookups on files in the file list.
Step 1 On the object manager's File List page, click the edit icon ( ) next to the clean list or custom detection list where you
want to modify a file.
Step 2 Next to the SHA 256 value you want to edit, click the edit icon ( ).
Tip You can also delete files from the list. Next to the file you want to remove, click the delete icon ( ) .
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
48
Managing Reusable Objects
Downloading a Source File from a File List
After configuration deployment, the system no longer performs malware cloud lookups on files in the file list.
Step 1 On the object manager's File List page, click the edit icon ( ) next to the clean list or custom detection list where you
want to download a source file.
Step 2 Next to the source file you want to download, click the view icon ( ).
Step 3 Click Download SHA List and follow the prompts to save the source file.
Step 4 Click Close.
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
49
Managing Reusable Objects
Working with Cipher Suite Lists
Note Although you can use cipher suites in the ASDM interface in the same places as cipher suite lists, you cannot
add, modify, or delete cipher suites.
You cannot delete a cipher suite list that is in use. Additionally, after you edit a cipher suite list, if an active
policy references your object, you must redeploy the configuration for your changes to take effect; see
Deploying Configuration Changes, on page 73.
To create a cipher suite list:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Choose Cipher Suite List.
Step 3 Click Add Cipher Suites.
Step 4 Enter a Name for the cipher suite list. You can use any printable standard ASCII characters except a pipe (|) or curly
braces ({}).
Step 5 Choose one or more cipher suites and click Add.
• Use Shift and Ctrl to choose multiple cipher suites, or right click and Select All.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
50
Managing Reusable Objects
Working with Distinguished Name Objects
• Use the filter field ( ) to search for existing cipher suites to include, which updates as you type to display matching
items. Click the reload icon ( ) above the search field or click the clear icon ( ) in the search field to clear the
search string.
O Organization
OU Organizational Unit
You can define one or more asterisks (*) as wild cards in an attribute. In a common name attribute, you can
define one or more asterisks per domain name label. Wild cards match only within that label, though you can
define multiple labels with wild cards. See the following table for examples.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
51
Managing Reusable Objects
Working with Distinguished Name Objects
You cannot delete a distinguished name object that is in use. Additionally, after you edit a distinguished name
object, if an active policy references your object, you must deploy the configuration for your changes to take
effect; see Deploying Configuration Changes, on page 73.
To create a distinguished name object:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Under Distinguished Name, choose Individual Objects.
Step 3 Click Add Distinguished Name.
Step 4 Enter a Name for the distinguished name object. You can use any printable standard ASCII characters except a pipe (|)
or curly braces ({}).
Step 5 In the DN field, enter a value for the distinguished name or common name. You have the following options:
• If you add a distinguished name, you can include one of each attribute listed in Distinguished Name Attributes
table separated by commas.
• If you add a common name, you can include multiple labels and wild cards.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
52
Managing Reusable Objects
Working with PKI Objects
You can also create SSL rules and match traffic encrypted with:
• the certificate in an external certificate object
• a certificate either signed by the CA in a trusted CA object, or within the CA's chain of trust
You can manually input certificate and key information, upload a file containing that information, or in some
cases, generate a new CA certificate and private key.
When you view a list of PKI objects in the object manager, the system displays the certificate's Subject
distinguished name as the object value. Hover your pointer over the value to view the full certificate Subject
distinguished name. To view other certificate details, edit the PKI object.
Note The ASA FirePOWER module encrypts all private keys stored in internal CA objects and internal certificate
objects with a randomly generated key before saving them. If you upload private keys that are password
protected, the appliance decrypts the key using the user supplied password, then reencrypts it with the randomly
generated key before saving it.
Note If you reference an internal CA object in a Decrypt - Resign SSL rule and the rule matches an encrypted
session, the user's browser may warn that the certificate is not trusted while negotiating the SSL handshake.
To avoid this, add the internal CA object certificate to either the client or domain list of trusted root certificates.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
53
Managing Reusable Objects
Importing a CA Certificate and Private Key
• import an existing RSA based or elliptic curve based CA certificate and private key
• generate a new self-signed RSA based CA certificate and private key
• generate an unsigned RSA based CA certificate and private key. You must submit a certificate signing
request (CSR) to another CA to sign the certificate before using the internal CA object.
After you create an internal CA object containing a signed certificate, you can download the CA certificate
and private key. The system encrypts downloaded certificates and private keys with a user provided password.
Whether system generated or user created, you can modify the internal CA object name, but cannot modify
other object properties.
You cannot delete an internal CA object that is in use. Additionally, after you edit an internal CA object, if
an active policy references your object, you must deploy the configuration for your changes to take effect;
see Deploying Configuration Changes, on page 73.
If the private key file is password protected, you can supply the decryption password. If the certificate and
key are encoded in the PEM format, you can also copy and paste the information.
You can upload only files that contain proper certificate or key information, and that are paired with each
other. The system validates the pair before saving the object.
Note If you configure a rule with the Decrypt - Resign action, the rule matches traffic based on the referenced
internal CA certificate's encryption algorithm type, in addition to any configured rule conditions. You must
upload an elliptic curve based CA certificate to decrypt outgoing traffic encrypted with an elliptic curve based
algorithm, for example. For more information, see Decrypt Actions: Decrypting Traffic for Further Inspection,
on page 208.
Step 1 Select Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Under PKI, choose Internal CAs.
Step 3 Click Import CA.
Step 4 Enter a Name for the internal CA object. You can use any printable standard ASCII characters except a ipe (|) or curly
braces ({}).
Step 5 Above the Certificate Data field, click Browse to upload a DER or PEM-encoded X.509 v3 CA certificate file.
Step 6 Above the Key field, click Browse to upload a DER or PEM-encoded paired private key file.
Step 7 If the uploaded file is password protected, check the Encrypted, and the password is: check box and enter the password.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
54
Managing Reusable Objects
Generating a New CA Certificate and Private Key
Country Name (two-letter code) two alphabetic characters two alphabetic characters
Organizational Unit
Common Name
The generated CA certificate is valid for ten years. The Valid From date is a week before generation.
To generate a self signed CA certificate:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Under PKI, choose Internal CAs.
Step 3 Click Generate CA.
Step 4 Enter a Name for the internal CA object. You can use any printable standard ASCII characters except a pipe (|) or curly
braces ({}).
Step 5 Enter the identification attributes, as described in Generated Internal CA Attributes table.
Step 6 Click Generate self signed CA.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
55
Managing Reusable Objects
Downloading a CA Certificate and Private Key
• After the CA issues the signed certificate, upload it to the internal CA object, replacing the unsigned
certificate.
You can only reference an internal CA object in an SSL rule if it contains a signed certificate.
To create an unsigned CA certificate and CSR:
The system encrypts the private key stored in an internal CA object with a randomly generated key before
saving it to disk. If you download a certificate and private key from an internal CA object, the system first
decrypts the information before creating a file containing the certificate and private key information. You
must then provide a password the system uses to encrypt the downloaded file.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
56
Managing Reusable Objects
Working with Trusted Certificate Authority Objects
Caution Private keys downloaded as part of a system backup are decrypted, then stored in the unencrypted backup
file. For more information, see Creating Backup Files, on page 506.
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Under PKI, choose Internal CAs.
Step 3 Click the edit icon ( ) next to the internal CA object whose certificate and private key you want to download.
Step 4 Click Download.
Step 5 Enter an encryption password in the Password and Confirm Password fields.
Step 6 Click Store ASA FirePOWER Changes.
The system prompts you to save the file.
If the file is password protected, you must supply the decryption password. If the certificate is encoded in the
PEM format, you can also copy and paste the information.
You can upload a CA certificate only if the file contains proper certificate information; the system validates
the certificate before saving the object.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
57
Managing Reusable Objects
Adding a Certificate Revocation List to a Trusted CA Object
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Under PKI, choose Trusted CAs.
Step 3 Click Add Trusted CAs.
Step 4 Enter a Name for the trusted CA object. You can use any printable standard ASCII characters except a pipe (|) or curly
braces ({}).
Step 5 Above the Certificate Data field, click Browse to upload a DER or PEM encoded X.509 v3 CA certificate file.
Step 6 If the file is password protected, check the Encrypted, and the password is: check box and enter the password.
Step 7 Click Store ASA FirePOWER Changes.
After you add the CRL, you can view the list of revoked certificates. If you want to modify a CRL you have
uploaded to an object, you must delete the object and recreate it.
You can upload only files that contain a proper CRL. There is no limit to the number of CRLs you can add
to a trusted CA object. However, you must save the object each time you upload a CRL, before adding another
CRL.
To upload a CRL:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Under PKI, choose Trusted CAs.
Step 3 Click the edit icon ( ) next to a trusted CA object.
Step 4 Click Add CRL to upload a DER or PEM encoded CRL file.
Step 5 Click Store ASA FirePOWER Changes.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
58
Managing Reusable Objects
Working with Internal Certificate Objects
server certificate. For example, you can upload a self signed server certificate that you trust, but cannot verify
with a trusted CA certificate.
You can configure an external certificate object by uploading an X.509 v3 server certificate. You can upload
a file in one of the following supported formats:
• Distinguished Encoding Rules (DER)
• Privacy-enhanced Electronic Mail (PEM)
You can upload only files that contains proper server certificate information; the system validates the file
before saving the object. If the certificate is encoded in the PEM format, you can also copy and paste the
information.
After you create the external certificate object, you can modify the name, but cannot modify other object
properties.
You cannot delete an external certificate object that is in use. Additionally, after you edit an external certificate
object, if an active policy references your object, you must deploy the configuration for your changes to take
effect; see Deploying Configuration Changes, on page 73.
To create an external certificate object:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Under PKI, choose External Certs.
Step 3 Click Add External Cert.
Step 4 Enter a Name for the external certificate object. You can use any printable standard ASCII characters except a pipe (|)
or curly braces ({}).
Step 5 Above the Certificate Data field, click Browse to upload a DER or PEM encoded X.509 v3 server certificate file.
Step 6 Click Store ASA FirePOWER Changes.
If the file is password protected, you must supply the decryption password. If the certificate and key are
encoded in the PEM format, you can also copy and paste the information.
You can upload only files that contain proper certificate or key information, and that are paired with each
other. The system validates the pair before saving the object.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
59
Managing Reusable Objects
Working with Geolocation Objects
After you create the internal certificate object, you can modify the name, but cannot modify other object
properties.
You cannot delete an internal certificate object that is in use. Additionally, after you edit an internal certificate
object, if an active policy references your object, you must deploy the configuration for your changes to take
effect; see Deploying Configuration Changes, on page 73.
To create an internal certificate object:
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Under PKI, choose Internal Certs.
Step 3 Click Add Internal Cert.
Step 4 Enter a Name for the internal certificate object. You can use any printable standard ASCII characters except a pipe (|) or
curly braces ({}).
Step 5 Above the Certificate Data field, click Browse to upload a DER or PEM encoded X.509 v3 server certificate file.
Step 6 Above the Key field, or click Browse to upload a DER or PEM-encoded paired private key file.
Step 7 If the uploaded private key file is password protected, check the Encrypted, and the password is: check box and enter the
password.
Step 8 Click Store ASA FirePOWER Changes.
What to do next
• Importing a CA Certificate and Private Key, on page 54
Generating a New CA Certificate and Private Key, on page 55
Obtaining and Uploading a New Signed Certificate, on page 55
Downloading a CA Certificate and Private Key, on page 56
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
60
Managing Reusable Objects
Working with Security Group Tag Objects
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Choose Geolocation.
Step 3 Click Add Geolocation.
Step 4 Enter a Name for the geolocation object. You can use any printable standard ASCII characters except curly braces ({}).
Step 5 Check the check boxes for the countries and continents you want to include in your geolocation object.
Selecting a continent selects all countries within that continent, as well as any countries that GeoDB updates may add
under that continent in the future. Deselecting any country under a continent deselects the continent. You can select any
combination of countries and continents.
Step 1 Choose Configuration > ASA FirePOWER Configuration > Object Management.
Step 2 Choose Security Group Tag.
Step 3 Click Add Security Group Tag.
Step 4 Enter a Name.
Step 5 Optionally, enter a Description.
Step 6 In the Tag field, enter a single SGT.
Step 7 Click Store ASA FirePOWER Changes.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
61
Managing Reusable Objects
Working with Security Group Tag Objects
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
62
CHAPTER 4
Getting Started with Access Control Policies
An access control policy determines how the system handles traffic on your network. Each ASA FirePOWER
module can have one currently applied policy.
This chapter explains how to create and apply a simple access control policy. It also contains basic information
on managing access control policies: editing, updating, comparing, and so on.
• About Access Control Policies, on page 63
• Access Control License and Role Requirements, on page 64
• Creating a Basic Access Control Policy, on page 65
• Managing Access Control Policies, on page 68
• Editing Access Control Policies, on page 69
• Associating Other Policies with Access Control, on page 71
• Understanding Out-of-Date Policy Warnings, on page 72
• Deploying Configuration Changes, on page 73
• Troubleshooting Access Control Policies and Rules, on page 74
• Generating a Report of Current Access Control Settings, on page 77
• Comparing Access Control Policies, on page 78
• Using Advanced Settings in an Access Control Policy, on page 81
Note that only ASA FirePOWER modules deployed inline can affect the flow of traffic. Applying an access
control policy configured to block or alter traffic to passively deployed devices can have unexpected results.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
63
Getting Started with Access Control Policies
Access Control License and Role Requirements
In some cases, the system prevents you from applying inline configurations to passively deployed ASA
FirePOWER modules.
A more complex access control policy can blacklist traffic based on Security Intelligence data, as well as use
access control rules to exert granular control over network traffic logging and handling. These rules can be
simple or complex, matching and inspecting traffic using multiple criteria. Advanced access control policy
options control decryption, preprocessing, performance, and other general preferences.
After you create a basic access control policy, see the following chapters for more information on tailoring it
to your deployment:
• Blacklisting Using Security Intelligence IP Address Reputation, on page 83 explains how to immediately
blacklist (block) connections based on the latest reputation intelligence.
• About Network Analysis and Intrusion Policies, on page 243 explains how network analysis and intrusion
policies preprocess and examine packets, as part of the system’s intrusion detection and prevention
feature.
• Tuning Traffic Flow Using Access Control Rules, on page 89 explains how access control rules provide
a granular method of handling network traffic across multiple ASA FirePOWER modules.
• Controlling Traffic Using Intrusion and File Policies, on page 137 explains how intrusion and file policies
provide the last line of defense before traffic is allowed to its destination, by detecting and optionally
blocking intrusions, prohibited files, and malware.
performs access control using geolocation data (source or destination country or continent) Any
performs intrusion detection and prevention, file control, or Security Intelligence filtering Protection
performs advanced malware protection, that is, network-based malware detection and blocking Malware
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
64
Getting Started with Access Control Policies
Creating a Basic Access Control Policy
Tip When you first create an access control policy, you cannot choose to trust traffic as the default action. If you
want to trust all traffic by default, change the default action after you create the policy.
Use the Access Control Policy page (Policies > Access Control) to create new and manage existing access
control policies.
Optionally, you can use and modify the initial system-provided policy named Default Trust All Traffic.
To create an access control policy:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Tip You can also copy an existing policy from this ASA FirePOWER module or import a policy from another ASA
FirePOWER module. To copy a policy, click the copy icon. To import a policy, see Importing and Exporting
Configurations, on page 513.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
65
Getting Started with Access Control Policies
Setting Default Handling and Inspection for Network Traffic
• Intrusion Prevention creates a policy with the Intrusion Prevention: Balanced Security and Connectivity default
action.
For guidance on choosing an initial default action, as well as how to change it later, see Setting Default Handling and
Inspection for Network Traffic, on page 66.
Therefore, when you apply an access control policy that does not contain any access control rules or Security
Intelligence configurations, and that does not invoke an SSL policy to handle encrypted traffic, the default
action determines how all traffic on your network is handled. You can block or trust all traffic without further
inspection, or inspect traffic for intrusions. Your options are shown in the following diagram.
The following table describes how the different default actions handle traffic, and lists the types of inspection
you can perform on traffic handled by each default action. Note that you cannot perform file or malware
inspection on traffic handled by the default action. For more information, see Controlling Traffic Using
Intrusion and File Policies, on page 137.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
66
Getting Started with Access Control Policies
Setting Default Handling and Inspection for Network Traffic
Access Control: Trust All trust (allow to its final destination without none
Traffic further inspection)
Intrusion Prevention allow, as long as it is passed by the intrusion, using the specified
intrusion policy you specify (requires a intrusion policy and associated
Protection license) variable set
The diagram below illustrates the Block All Traffic and Trust All Traffic default actions.
When you first create an access control policy, logging connections that are handled by the default action is
disabled by default. If you select a default action that performs intrusion inspection, the system automatically
associates the default intrusion variable set with the intrusion policy you select. You can change either of
these options, as well as the default action itself, after you create the policy.
To change an access control policy’s default action and related options:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy .
The Access Control Policy page appears.
Step 2 Click the edit icon next to the access control policy you want to configure.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
67
Getting Started with Access Control Policies
Managing Access Control Policies
Step 4 If you selected an Intrusion Prevention default action, click the variables icon to change the variable set associated
with the intrusion policy you selected.
In the pop-up window that appears, select a new variable set and click OK. You can also edit the selected variable set in
a new window by clicking the edit icon. If you do not change the variable set, the system uses a default set. For more
information, see Working with Variable Sets, on page 29.
Step 5 Click the logging icon to change logging options for connections handled by the default action.
You can log a matching connection at its beginning and end. Note that the system cannot log the end of blocked traffic.
You can log connections to the ASA FirePOWER module event viewer, external system log (syslog) or SNMP trap
server. For more information, see Logging Connections Based on Access Control Handling, on page 391.
create a new access control policy click New Policy. Creating a Basic Access Control
Policy, on page 65
edit an existing access control policy click the edit icon. Editing Access Control Policies, on
page 69
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
68
Getting Started with Access Control Policies
Editing Access Control Policies
reapply an access control policy click the apply icon. Deploying Configuration Changes,
on page 73
export an access control policy to click the export icon. Importing and Exporting
import on another ASA FirePOWER Configurations, on page 513
module
view a PDF report that lists the click the report icon. Generating a Report of Current
current configuration settings in an Access Control Settings, on page
access control policy 77
compare access control policies click Compare Policies. Comparing Access Control Policies,
on page 78
delete an access control policy click the delete icon, then confirm
that you want to delete the policy.
You cannot delete an applied
access control policy or one that
is currently applying.
Use the access control policy editor to add and organize rules, and so on. The following list provides information
on the policy configurations you can change.
Name and Description
To change the policy’s name and description, click the appropriate field and type the new name or description.
Security Intelligence
Security Intelligence is a first line of defense against malicious Internet content. This feature allows you to
immediately blacklist (block) connections based on the latest reputation intelligence. To ensure continual
access to vital resources, you can override blacklists with custom whitelists. This traffic filtering takes place
before any other policy-based inspection, analysis, or traffic handling, including rules and the default action.
For more information, see Controlling Traffic With Reputation-Based Rules, on page 113
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
69
Getting Started with Access Control Policies
Editing Access Control Policies
Rules
Rules provide a granular method of handling network traffic. Rules in an access control policy are numbered,
starting at 1. The system matches traffic to access control rules in top-down order by ascending rule number.
In most cases, the system handles network traffic according to the first access control rule where all the rule’s
conditions match the traffic. These conditions include security zone, network or geographical location, port,
application, requested URL, or user. Conditions can be simple or complex; their use often depends on certain
licenses.
Use the Rules tab to add, categorize, enable, disable, filter, and otherwise manage rules. For more information,
see Tuning Traffic Flow Using Access Control Rules, on page 89.
Default Action
The default action determines how the system handles traffic that is not blacklisted by Security Intelligence
and does not match any access control rules. Using the default action, you can block or trust all traffic without
further inspection, or inspect traffic for intrusions. You can also enable or disable logging of connections
handled by the default action.
For more information, see Setting Default Handling and Inspection for Network Traffic, on page 66 and
Logging Connections Based on Access Control Handling, on page 391.
HTTP Responses
You can specify what the user sees in a browser when the system blocks that user’s website request—either
display a generic system-provided response page, or enter custom HTML. You can also display a page that
warns users, but also allows them to click a button to continue or refresh the page to load the originally
requested site. For more information, see Displaying a Custom Web Page for Blocked URLs, on page 127.
Advanced Access Control Options
Advanced access control policy settings typically require little or no modification. The default settings are
appropriate for most deployments. Advanced settings you can modify include:
• the number of characters you store in the ASA FirePOWER module database for each URL requested
by your users; see Logging URLs Detected in Connections, on page 394
• the length of time before you re-block a website after a user bypasses an initial block; see Setting the
User Bypass Timeout for a Blocked Website, on page 127
• network analysis and intrusion policy settings that allow you to tailor many preprocessing options to
networks and zones, as well as set default intrusion inspection behavior
• advanced transport and network preprocessor settings that apply globally to all networks and zones where
you apply the access control policy
• adaptive profiles to improve reassembly of packet fragments and TCP streams in passive deployments,
based on your network’s host operating systems; see Tuning Intrusion Policies Using Rules, on page 291
• performance options for intrusion inspection, file control, and advanced malware protection; see Tuning
Intrusion Prevention Performance, on page 142 and Tuning File and Malware Inspection Performance
and Storage, on page 152
When you edit an access control policy, a message indicates that you have unsaved changes. To retain your
changes, you must save the policy before exiting the policy editor. If you attempt to exit the policy editor
without saving your changes, you are cautioned that you have unsaved changes; you can then discard your
changes and exit the policy, or return to the policy editor.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
70
Getting Started with Access Control Policies
Associating Other Policies with Access Control
To protect the privacy of your session, after sixty minutes of inactivity on the policy editor, changes to your
policy are discarded and you are returned to the Access Control Policy page. After the first thirty minutes of
inactivity, a message appears and updates periodically to provide the number of minutes remaining before
changes are discarded. Any activity on the page cancels the timer.
To edit an access control policy:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon next to the access control policy you want to configure.
The access control policy editor appears.
Step 3 Edit your policy. Take any of the actions summarized above.
Step 4 Save or discard your configuration:
• To save your changes and continue editing, click Store ASA FirePOWER Changes.
• To save your changes and apply your policy, click Apply ASA FirePOWER Changes. See Deploying Configuration
Changes, on page 73
• To discard your changes, click Cancel and, if prompted, click OK.
Caution Associating an SSL or identity policy, or subsequently dissociating the policy by choosing None, restarts the
Snort process when you deploy configuration changes, temporarily interrupting traffic inspection. Whether
traffic drops during this interruption or passes without further inspection depends on the model of the managed
device and how it handles traffic.
Step 1 Choose Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
Step 2 Click the edit icon next to the access control policy you want to configure.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
71
Getting Started with Access Control Policies
Understanding Out-of-Date Policy Warnings
Keep in mind that you can change some of these configurations from multiple places in the ASA FirePOWER
module interface. For example, you can modify security zones using the object manager (Configuration >
ASA FirePOWER Configuration > Object Management).
Note that the following updates do not require policy reapply:
• automatic updates to URL filtering data
• scheduled geolocation database (GeoDB) updates
To determine why an access control or intrusion policy is out of date, use the comparison viewer.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
72
Getting Started with Access Control Policies
Deploying Configuration Changes
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears. Policies that are out of date are marked with red status text that indicates that
the ASA FirePOWER module needs a policy update.
Step 3 Click Out-of-date next to the changed component you are interested in.
A policy comparison report appears in a new window. For more information, see Comparing Access Control Policies,
on page 78 and Comparing Two Intrusion Policies or Revisions, on page 287.
Step 4 Optionally, reapply the policy. See Deploying Configuration Changes, on page 73.
Caution In special cases, deploying configuration changes may cause a short pause in traffic flow and processing, and
may also cause a few packets to pass uninspected. To minimize inconvenience, deploy during a change
window.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
73
Getting Started with Access Control Policies
Troubleshooting Access Control Policies and Rules
• Click Cancel to exit without deploying. Resolve the error and warning conditions, and attempt to deploy the
configuration again.
Tip In the access control policy editor, click Show Warnings to display a pop-up window that lists all the warnings
for the policy.
Additionally, the system warns you at apply-time of any issues that could affect traffic analysis and flow.
error If a rule or configuration has an error, you cannot apply the policy until you correct the issue, even if you disable
any affected rules.
warning You can apply an access control policy that displays rule or other warnings. However, misconfigurations marked
with warnings have no effect.
For example, you can apply a policy that contains preempted rules or rules that cannot match traffic due to
misconfiguration—conditions using empty object groups, application filters that match no applications, configuring
URL conditions without having enabled cloud communications, and so on. These rules do not evaluate traffic. If
you disable a rule with a warning, the warning icon disappears. It reappears if you enable the rule without correcting
the underlying issue.
As another example, many features require a specific license. An access control policy successfully applies only
to an eligible device.
information Information icons convey helpful information about configurations that may affect the flow of traffic. These
issues do not prevent you from applying the policy.
For example, if you are performing application control or URL filtering, the system may skip matching the first
few packets of a connection against some access control rules, until the system identifies the application or web
traffic in that connection. This allows connections to be established so that applications and HTTP requests can
be identified. For more information, see Limitations to Application Control, on page 118 and Guidelines and
Limitations to URL Detection and Blocking, on page 124.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
74
Getting Started with Access Control Policies
Simplifying Rules to Improve Performance
Properly configuring access control policies and rules can also reduce the resources required to process network
traffic. Creating complex rules, invoking many different intrusion policies, and mis-ordering rules can all
affect performance.
Note that combining elements into objects that you then use in access control rule conditions does not improve
performance. For example, using a network object that contains 50 individual IP addresses gives you only an
organizational—not a performance—benefit over including those IP addresses in the condition individually.
• Restrict rules by security zones whenever possible. If a device’s interfaces are not in one of the zones in
a zone-restricted rule, the rule does not affect performance on that device.
• Do not overconfigure rules. If one condition is enough to match the traffic you want to handle, do not
use two.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
75
Getting Started with Access Control Policies
Ordering Rules to Improve Performance and Avoid Preemption
using the access control policy’s advanced settings, can have the same issues. The system uses warning and
error icons to mark these.
The second rule above will never block traffic because the first rule will have already allowed the traffic.
Note the following:
• Any type of rule condition can preempt a subsequent rule.
• A rule also preempts an identical subsequent rule where all configured conditions are the same.
• A subsequent rule would not be preempted if any condition is different.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
76
Getting Started with Access Control Policies
Generating a Report of Current Access Control Settings
Rule 1: Allow Flickr, deviantART for the “Design” LDAP user group
Rule 2: Block social networking
the first rule blocks all social networking traffic, including Flickr and deviantART. Because no traffic will
ever match the second rule, your designers cannot access the content you wanted to make available.
Section Description
Policy Information Provides the name and description of the policy, the name of the user who
last modified the policy, and the date and time the policy was last modified.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
77
Getting Started with Access Control Policies
Comparing Access Control Policies
Section Description
HTTP Block Response Provides details on the pages you display to users when you block a website
using the policy.
HTTP Interactive Block
Response
Security Intelligence Provides details on the policy’s Security Intelligence whitelist and blacklist.
Default Action Lists the default action and associated variable set, if any.
Rules Lists each access control rule in the policy, and provides details about its
configuration.
Referenced Objects Provides details on the reusable objects referenced by the access control
policy, including intrusion policy variable sets and objects used by the SSL
policy.
You can also generate an access control comparison report that compares a policy with the currently applied
policy or with another policy. For more information, see Comparing Access Control Policies, on page 78.
To view an access control policy report:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the report icon next to the policy for which you want to generate a report. Remember to save any changes before
you generate an access control policy report; only saved changes appear in the report.
The system generates the report. You are prompted to save the report to your computer.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
78
Getting Started with Access Control Policies
Using the Access Control Policy Comparison View
You can use this to view and navigate both policies on the module interface, with their differences highlighted.
• The comparison report creates a record of only the differences between two policies in a format similar
to the policy report, but in PDF format.
You can use this to save, copy, print, and share your policy comparisons for further examination.
navigate individually through click Previous or Next above the title bar.
changes
The double-arrow icon centered between the left and right sides
moves, and the Difference number adjusts to identify which difference
you are viewing.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
79
Getting Started with Access Control Policies
Using the Access Control Policy Comparison Report
An access control policy comparison report is a record of all differences between two access control policies
or a policy and the currently applied policy identified by the policy comparison view, presented in PDF format.
You can use this report to further examine the differences between two policy configurations and to save and
disseminate your findings.
You can generate an access control policy comparison report from the comparison view for any policies to
which you have access. Remember to save any changes before you generate a policy report; only saved changes
appear in the report.
The format of the policy comparison report is the same as the policy report with one exception: the policy
report contains all configurations in the policy, and the policy comparison report lists only those configurations
that differ between the policies. An access control policy comparison report contains the sections described
in Generating a Report of Current Access Control Settings.
Tip You can use a similar procedure to compare SSL, network analysis, intrusion, file, or system policies.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 3 From the Compare Against drop-down list, select the type of comparison you want to make:
• To compare two different policies, select Other Policy.
The page refreshes and the Policy A and Policy B drop-down lists appear.
• To compare another policy to the currently active policy, select Running Configuration .
The page refreshes and the Target/Running Configuration A and Policy B drop-down lists appear.
Step 4 Depending on the comparison type you selected, you have the following choices:
• If you are comparing two different policies, select the policies you want to compare from the Policy A and Policy
B drop-down lists.
• If you are comparing the running configuration to another policy, select the second policy from the Policy B drop-down
list.
Step 6 Optionally, click Comparison Report to generate the access control policy comparison report.
The access control policy comparison report appears. You are prompted to save the report to your computer.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
80
Getting Started with Access Control Policies
Using Advanced Settings in an Access Control Policy
General Settings
To customize the number of characters you store in the ASA FirePOWER module database for each URL
requested by your users, see Logging URLs Detected in Connections, on page 394.
To customize the length of time before you re-block a website after a user bypasses an initial block, see
Allowing Users to Bypass URL Blocks, on page 125.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
81
Getting Started with Access Control Policies
Using Advanced Settings in an Access Control Policy
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
82
CHAPTER 5
Blacklisting Using Security Intelligence IP
Address Reputation
As a first line of defense against malicious Internet content, the ASA FirePOWER module includes the Security
Intelligence feature, which allows you to immediately blacklist (block) connections based on the latest
reputation intelligence, removing the need for a more resource-intensive, in-depth analysis. Security Intelligence
filtering requires a Protection license.
Security Intelligence works by blocking traffic to or from IP addresses that have a known bad reputation. This
traffic filtering takes place before any other policy-based inspection, analysis, or traffic handling.
Note that you could create access control rules that perform a similar function to Security Intelligence filtering
by manually restricting traffic by IP address. However, access control rules are wider in scope, more complex
to configure, and cannot automatically update using dynamic feeds.
Traffic blacklisted by Security Intelligence is immediately blocked and therefore is not subject to any further
inspection—not for intrusions, exploits, malware, and so on. Optionally, and recommended in passive
deployments, you can use a “monitor-only” setting for Security Intelligence filtering. This allows the system
to analyze connections that would have been blacklisted, but also logs the match to the blacklist and generates
an end-of-connection security intelligence event.
For your convenience, Cisco provides the Intelligence Feed, which is comprised of several regularly updated
collections of IP addresses determined by the VRT to have a poor reputation. The Intelligence Feed tracks
open relays, known attackers, bogus IP addresses (bogon), and so on. You can also customize the feature to
suit the unique needs of your organization, for example:
• Third-party feeds—you can supplement the Intelligence Feed with third-party reputation feeds, which
the system can automatically update just as it does the Cisco feed
• Custom blacklists—the system allows you to manually blacklist specific IP addresses in many ways
depending on your needs
• Enforcing blacklisting by security zone—to improve performance, you may want to target enforcement,
for example, restricting spam blacklisting to a zone that handles email traffic
• Monitoring instead of blacklisting—especially useful in passive deployments and for testing feeds before
you implement them; you can merely monitor the violating sessions instead of blocking them, generating
end-of-connection events
• Whitelisting to eliminate false positives—when a blacklist is too broad in scope, or incorrectly blocks
traffic that you want to allow (for example, to vital resources), you can override a blacklist with a custom
whitelist
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
83
Blacklisting Using Security Intelligence IP Address Reputation
Choosing a Security Intelligence Strategy
For detailed information on configuring Security Intelligence lists and feeds, including Internet access
requirements, see Working with Security Intelligence Lists and Feeds, on page 20.
Note Although feed updates and additions to the global blacklist (or global whitelist; see below) automatically
implement changes throughout your deployment, any other change to a Security Intelligence object requires
you to reapply the access control policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
84
Blacklisting Using Security Intelligence IP Address Reputation
Building the Security Intelligence Whitelist and Blacklist
For example, if a reputable feed improperly blocks your access to vital resources but is overall useful to your
organization, you can whitelist only the improperly classified IP addresses, rather than removing the whole
feed from the blacklist.
Note You cannot apply an access control policy that uses a populated global whitelist or blacklist to a device not
licensed for Protection. If you added IP addresses to either global list, you must remove the non-empty list
from the policy’s Security Intelligence configuration before you can apply the policy. For more information,
seeWorking with the Global Whitelist and Blacklist, on page 22.
After you build your whitelist and blacklist, you can log blacklisted connections. You can also set individual
blacklisted objects, including feeds and lists, to monitor-only. This allows the system to handle connections
involving blacklisted IP addresses using access control, but also logs the connection’s match to the blacklist.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
85
Blacklisting Using Security Intelligence IP Address Reputation
Building the Security Intelligence Whitelist and Blacklist
Use the Security Intelligence tab in the access control policy to configure the whitelist, blacklist, and logging
options. The page lists the Available Objects you can use in either the whitelist or blacklist, as well as the
Available Zones you can use to constrain whitelisted and blacklisted objects. Each type of object or zone is
distinguished with an different icon. The objects marked with the Cisco icon represent the different categories
in the Intelligence Feed.
In the blacklist, objects set to block are marked with the block icon while monitor-only objects are marked
with the monitor icon. Because the whitelist overrides the blacklist, if you add the same object to both lists,
the system displays the blacklisted object with a strikethrough.
You can add up to a total of 255 objects to the whitelist and the blacklist. That is, the number of objects in
the whitelist plus the number in the blacklist cannot exceed 255.
Note that although you can add network objects with a netmask of /0 to the whitelist or blacklist, address
blocks using a /0 netmask in those objects will be ignored and whitelist and blacklist filtering will not occur
based on those addresses. Address blocks with a /0 netmask from Security Intelligence feeds are also ignored.
If you want to monitor or block all traffic targeted by a policy, use an access control rule with the Monitor
or Block rule action, respectively, and a default value of any for the Source Networks and Destination
Networks, instead of Security Intelligence filtering.
To build the Security Intelligence whitelist and blacklist for an access control policy:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon next to the access control policy you want to configure.
The access control policy editor appears.
Step 5 Begin building your whitelist and blacklist by selecting one or more Available Objects.
Use Shift and Ctrl to select multiple objects, or right-click and Select All.
Tip You can search for existing objects to include, or create objects on the fly if no existing objects meet the
needs of your organization. For more information, see Searching for Objects to Whitelist or Blacklist, on
page 87.
Step 6 Optionally, constrain the selected objects by zone by selecting an Available Zone.
By default, objects are not constrained, that is, they have a zone of Any . Note that other than using Any, you can
constrain by only one zone. To enforce Security Intelligence filtering for an object on multiple zones, you must add
the object to the whitelist or blacklist separately for each zone. Also, the global whitelist or blacklist cannot be constrained
by zone.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
86
Blacklisting Using Security Intelligence IP Address Reputation
Searching for Objects to Whitelist or Blacklist
Step 8 Repeat steps Step 5 through Step 7 until you are finished adding objects to your whitelist and blacklist.
Step 9 Optionally, set blacklisted objects to monitor-only by right-clicking the object under Blacklist, then selecting
Monitor-only (do not block).
In passive deployments, Cisco recommends you set all blacklisted objects to monitor-only. Note, however, that you
cannot set the global blacklist to monitor-only.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
87
Blacklisting Using Security Intelligence IP Address Reputation
Searching for Objects to Whitelist or Blacklist
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
88
CHAPTER 6
Tuning Traffic Flow Using Access Control Rules
In an access control policy, access control rules provide a granular method of handling network traffic.
Note Security Intelligence-based traffic filtering, and some decoding and preprocessing occur before network traffic
is evaluated by access control rules. You can also configure the SSL inspection feature to block or decrypt
encrypted traffic before access control rules evaluate it.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
89
Tuning Traffic Flow Using Access Control Rules
Creating and Editing Access Control Rules
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
90
Tuning Traffic Flow Using Access Control Rules
Creating and Editing Access Control Rules
Position
Rules in an access control policy are numbered, starting at 1. The system matches traffic to rules in top-down
order by ascending rule number. With the exception of Monitor rules, the first rule that traffic matches is the
rule that handles that traffic.
Conditions
Conditions specify the specific traffic the rule handles. Conditions can match traffic by security zone, network
or geographical location, port, application, requested URL, or user. Conditions can be simple or complex;
their use often depends on license.
Action
A rule’s action determines how the system handles matching traffic. You can monitor, trust, block, or allow
(with or without further inspection) matching traffic. Note that the system does not perform inspection on
trusted or blocked traffic.
Inspection
Inspection options for an access control rule govern how the system inspects and blocks malicious traffic you
would otherwise allow. When you allow traffic with a rule, you can specify that the system first inspect it
with intrusion or file policies to block any exploits, malware, or prohibited files before they reach your assets
or exit your network.
Logging
A rule’s logging settings govern the records the system keeps of the traffic it handles. You can keep a record
of traffic that matches a rule. In general, you can log sessions at the beginning and end of a connection. You
can log connections to the ASA FirePOWER module, as well as to the system log (syslog) or to an SNMP
trap server.
Comments
Each time you save changes to an access control rule, you can add a comment.
Use the access control rule editor to add and edit access control rules; access the rule editor from the Rules
tab of the access control policy editor. In the rule editor, you:
• Configure basic properties such as the rule’s name, state, position, and action in the upper portion of the
editor.
• Add conditions using the tabs on the left side of the lower portion of the editor.
• Use the tabs on the right side of the lower portion to configure inspection and logging options, and also
to add comments to the rule. For your convenience, the editor lists the rule’s inspection and logging
options regardless of which tab you are viewing.
Note Properly creating and ordering access control rules is a complex task, but one that is essential to building an
effective deployment. If you do not plan your policy carefully, rules can preempt other rules, require additional
licenses, or contain invalid configurations. To help ensure that the system handles traffic as you expect, the
access control policy interface has a robust warning and error feedback system for rules. For more information,
see Troubleshooting Access Control Policies and Rules, on page 74
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
91
Tuning Traffic Flow Using Access Control Rules
Specifying a Rule's Order of Evaluation
Step 1 Choose Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
Step 2 Click the edit icon ( ) next to the access control policy where you want to add a rule.
Step 3 You have the following options:
• To add a new rule, click Add Rule.
• To edit an existing rule, click the edit icon ( ) next to the rule you want to edit.
Step 5 Configure the rule components, as summarized above. You can configure the following, or accept the defaults:
• Specify whether the rule is Enabled.
• Specify the rule position; see Specifying a Rule's Order of Evaluation, on page 92
• Specify a rule Action; see Using Rule Actions to Determine Traffic Handling and Inspection, on page 95
• Configure the rule’s conditions; see Using Conditions to Specify the Traffic a Rule Handles, on page 93
• For Allow and Interactive Block rules, configure the rule’s Inspection options; see Controlling Traffic Using Intrusion
and File Policies, on page 137
• Configure content restriction settings by clicking the Safe Search ( ) or YouTube EDU icon ( ) on the Applications
tab. If the icons are dimmed, content restriction is disabled for the rule. For more information, see Using Access
Control Rule to Enforce Content Restriction, on page 164
• Specify Logging options; see Logging Connections in Network Traffic, on page 383
• Add Comments; see Adding Comments to a Rule, on page 98
Your rule is saved. You can click the delete icon ( ) to delete the rule. You must apply the access control policy for
your changes to take effect; see Deploying Configuration Changes, on page 73
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
92
Tuning Traffic Flow Using Access Control Rules
Specifying a Rule's Order of Evaluation
flow), the system does not continue to evaluate traffic against additional, lower-priority rules after that traffic
matches a rule.
Tip Proper access control rule order reduces the resources required to process network traffic, and prevents rule
preemption. Although the rules you create are unique to every organization and deployment, there are a few
general guidelines to follow when ordering rules that can optimize performance while still addressing your
needs. For more information, see Ordering Rules to Improve Performance and Avoid Preemption, on page
76.
In addition to ordering rules by number, you can group rules by category. By default the system provides
three categories: Administrator, Standard, and Root. You can add custom categories, but you cannot delete
the Cisco-provided categories or change their order. For information on changing the position or category of
an existing rule, see Changing a Rule's Position or Category, on page 101
To add a rule to a category while editing or creating a rule:
In the access control rule editor, from the Insert drop-down list, select Into Category, then select the category you
want to use.
When you save the rule, it is placed last in that category.
In the access control rule editor, from the Insert drop-down list, select above rule or below rule, then type the appropriate
rule number.
When you save the rule, it is placed where you specified.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
93
Tuning Traffic Flow Using Access Control Rules
Using Conditions to Specify the Traffic a Rule Handles
• For each condition in a rule, you can add up to 50 criteria. Traffic that matches any of a condition’s
criteria satisfies the condition. For example, you can use a single rule to perform user control for up to
50 users and groups.
Note that you can constrain zone and network conditions by source and destination, using up to 50 source
and up to 50 destination criteria. If you add both source and destination criteria to a zone or network condition,
matching traffic must originate from one of the specified source zones/networks and egress through one of
the destination zones/networks. In other words, the system links multiple condition criteria of the same type
with an OR operation, and links multiple condition types with an AND operation. For example, if your rule
conditions are:
the rule would match peer-to-peer application traffic from a host on one of your private IPv4 networks—a
packet must originate from either one OR the other source network, AND represent peer-to-peer application
traffic. Both of the following connections trigger the rule:
If you do not configure a particular condition for a rule, the system does not match traffic based on that
criterion. For example, a rule with a network condition but no application condition evaluates traffic based
on its source or destination, regardless of the application used in the session.
Note When you apply an access control policy, the system evaluates all its rules and creates an expanded set of
criteria that the ASA FirePOWER module uses to evaluate network traffic. Complex access control policies
and rules can command significant resources. For tips on simplifying access control rules and other ways to
improve performance, see Troubleshooting Access Control Policies and Rules, on page 74
When you add or edit an access control rule, use the tabs on the left side of the lower portion of the rule editor
to add and edit rule conditions. The following table summarizes the types of conditions you can add. Table
Title: Access Control Rule Condition Types
Zones entering or leaving a device A security zone is a logical grouping of one or more interfaces
via an interface in a specific according to your deployment and security policies. To build a
security zone zone condition, see Controlling Traffic by Security Zone, on page
105
Networks by its source or destination You can explicitly specify IP addresses or address blocks. The
IP address, country, or geolocation feature also allows you to control traffic based on its
continent source or destination country or continent. To build a network
condition, see Controlling Traffic by Network or Geographical
Location, on page 107
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
94
Tuning Traffic Flow Using Access Control Rules
Using Rule Actions to Determine Traffic Handling and Inspection
Ports by its source or destination For TCP and UDP, you can control traffic based on the transport
port layer protocol. For ICMP and ICMPv6 (IPv6-ICMP), you can
control traffic based on its Internet layer protocol plus an optional
type and code. Using port conditions, you can also control traffic
using other protocols that do not use ports. To build a port
condition, see Controlling Traffic by Port and ICMP Codes, on
page 109
Applications by the application detected You can control access to individual applications, or filter access
in a session according to basic characteristics: type, risk, business relevance,
categories, and tags. To build an application condition, see
Controlling Application Traffic, on page 114
URLs by the URL requested in You can limit the websites that users on your network can access
the session either individually or based on the URL’s general classification
and risk level. To build a URL condition, see Blocking URLs,
on page 119
Users by the user involved in the You can control traffic based on the LDAP user logged into a
session host involved in a monitored session. You can control traffic
based on individual users or groups retrieved from a Microsoft
Active Directory server. See Access Control Rules: Realms and
Users, on page 129
Note that although you can create access control rules with any license, certain rule conditions require that
you enable specific licensed capabilities before you can apply the policy. For more information, see License
Requirements for Access Control, on page 64
The access control policy’s default action handles traffic that does not meet the conditions of any non-Monitor
access control rule; see Setting Default Handling and Inspection for Network Traffic, on page 66
Keep in mind that only devices deployed inline can block or modify traffic. Devices deployed passively can
analyze and log, but not affect, the flow of traffic.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
95
Tuning Traffic Flow Using Access Control Rules
Trust Action: Passing Traffic Without Inspection
The Monitor action does not affect traffic flow; matching traffic is neither immediately permitted nor denied.
Rather, traffic is matched against additional rules to determine whether to permit or deny it. The first
non-Monitor rule matched determines traffic flow and any further inspection. If there are no additional matching
rules, the system uses the default action.
Because the primary purpose of Monitor rules is to track network traffic, the system automatically logs end-of
connection events for monitored traffic. That is, connections are logged even if the traffic matches no other
rules and you do not enable logging on the default action. For more information, see Understanding Logging
for Monitored Connections, on page 386
You can log trusted network traffic at both the beginning and end of connections. For more information, see
Understanding Logging for Trusted Connections, on page 387
For decrypted HTTP traffic, when the system blocks a web request, you can override the default browser or
server page with a custom page that explains that the connection was denied. The system calls this custom
page an HTTP response page ; see Displaying a Custom Web Page for Blocked URLs, on page 127
You can log blocked network traffic only at the beginning of connections. Note that only devices deployed
inline can block traffic. Because blocked connections are not actually blocked in passive deployments, the
system may report multiple beginning-of-connection events for each blocked connection. For more information,
see Understanding Logging for Blocked and Interactively Blocked Connections, on page 387
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
96
Tuning Traffic Flow Using Access Control Rules
Interactive Blocking Actions: Allowing Users to Bypass Website Blocks
Caution Logging blocked TCP connections during a Denial of Service (DoS) attack can affect system performance
with multiple similar events. Before you enable logging for an Block rule, consider whether the rule monitors
traffic on an Internet-facing interface or other interface vulnerable to DoS attack.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
97
Tuning Traffic Flow Using Access Control Rules
Adding Comments to a Rule
• With a Malware license, you can perform network-based advanced malware protection (AMP), also
using a file policy. Network-based AMP can inspect files for malware, and optionally block detected
malware.
For instructions on how to associate an intrusion or file policy with an access control rule, see Controlling
Traffic Using Intrusion and File Policies, on page 137
The diagram below illustrates the types of inspection performed on traffic that meets the conditions of an
Allow rule (or a user-bypassed Interactive Block rule; see Interactive Blocking Actions: Allowing Users to
Bypass Website Blocks, on page 97). Notice that file inspection occurs before intrusion inspection; blocked
files are not inspected for intrusion-related exploits.
For simplicity, the diagram displays traffic flow for situations where both (or neither) an intrusion and a file
policy are associated with an access control rule. You can, however, configure one without the other. Without
a file policy, traffic flow is determined by the intrusion policy; without an intrusion policy, traffic flow is
determined by the file policy.
You can log allowed network traffic at both the beginning and end of connections.
Step 1 In the access control rule editor, select the Comments tab.
The Comments page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
98
Tuning Traffic Flow Using Access Control Rules
Managing Access Control Rules in a Policy
Your comment is saved. You can edit or delete this comment until you save the rule.
For each rule, the policy editor displays its name, a summary of its conditions, the rule action, plus icons that
communicate the rule’s inspection and logging options. Other icons represent comments, warnings, errors,
and other important information, as described in the following table. Disabled rules are grayed and marked
(disabled) beneath the rule name.
intrusion inspection Click an active (yellow) inspection icon to edit the inspection options for
the rule; see Controlling Traffic Using Intrusion and File Policies, on page
file and malware inspection 137 If the icon is inactive (white), no policy of that type is selected for the
rule.
logging Click an active (blue) logging icon to edit the logging options for the rule;
see Logging Connections Based on Access Control Handling, on page 391
If the icon is inactive (white), connection logging is disabled for the rule.
comment Click the number in the comment column to add a comment to a rule; see
Adding Comments to a Rule, on page 98 The number indicates how many
comments the rule already contains.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
99
Tuning Traffic Flow Using Access Control Rules
Searching Access Control Rules
warning In the access control policy editor, click Show Warnings to display a
pop-up window that lists all the warnings for the policy; see
error Troubleshooting Access Control Policies and Rules, on page 74
information
Step 1 In the access control policy editor for the policy you want to search, click the Search Rules prompt, type a search string,
then press Enter. You can also use the Tab key or click a blank page area to initiate the search.
Columns for rules with matching values are highlighted, with differentiated highlighting for the indicated (first) match.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
100
Tuning Traffic Flow Using Access Control Rules
Enabling and Disabling Rules
• To refresh the page and clear the search string and any highlighting, click the clear icon .
Step 1 In the access control policy editor for the policy that contains the rule you want to enable or disable, right-click the rule
and choose a rule state:
• To enable an inactive rule, select State > Enable.
• To disable an active rule, select State > Disable.
Moving a Rule
License: Any
Proper access control rule order reduces the resources required to process network traffic, and prevents rule
preemption.
The following procedure explains how to move one or more rules at a time using the access control policy
editor. You can also move individual access control rules using the rule editor; see Creating and Editing Access
Control Rules, on page 90
To move a rule:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
101
Tuning Traffic Flow Using Access Control Rules
Adding a New Rule Category
Step 1 In the access control policy editor for the policy that contains the rules you want to move, select the rules by clicking
in a blank area for each rule. Use the Ctrl and Shift keys to select multiple rules.
The rules you selected are highlighted.
Step 2 Move the rules. You can cut and paste or drag and drop.
To cut and paste rules into a new location, right-click a selected rule and select Cut. Then, right-click a blank area for a
rule next to where you want to paste the cut rules and select Paste above or Paste below. Note that you cannot copy and
paste access control rules between two different access control policies.
Step 1 In the access control policy editor for the policy where you want to add a rule category, click Add Category.
Tip If your policy already contains rules, you can click a blank area in the row for an existing rule to set the position
of the new category before you add it. You can also right-click an existing rule and select Insert new category.
The Add Category pop-up window appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
102
Tuning Traffic Flow Using Access Control Rules
Adding a New Rule Category
Your category is added. You can click the edit icon ( ) next to a custom category to edit its name, or click the delete
icon ( ) to delete the category. Rules in a category you delete are added to the category above.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
103
Tuning Traffic Flow Using Access Control Rules
Adding a New Rule Category
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
104
CHAPTER 7
Controlling Traffic with Network-Based Rules
Access control rules in access control policies exert granular control over network traffic logging and handling.
Network-based conditions allow you to manage which traffic can traverse your network, using one or more
of the following criteria:
• Source and destination security zones
• Source and destination IP addresses or geographical locations
• Source and destination port, which also includes transport layer protocol and ICMP code options
You can combine network-based conditions with each other and with other types of conditions to create an
access control rule. These access control rules can be simple or complex, matching and inspecting traffic using
multiple conditions. For detailed information on access control rules, see Tuning Traffic Flow Using Access
Control Rules, on page 89.
Note Security Intelligence-based traffic filtering, and some decoding and preprocessing occur before network traffic
is evaluated by access control rules. You can also configure the SSL inspection feature to block or decrypt
encrypted traffic before access control rules evaluate it.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
105
Controlling Traffic with Network-Based Rules
Controlling Traffic by Security Zone
As a simple example, you could create two zones: Internal and External, and assign the first pair of interfaces
on the device to those zones. Hosts connected to the network on the Internal side represent your protected
assets.
To extend this scenario, you could deploy additional identically configured devices to protect similar resources
in several different locations. Each of these devices protects the assets in its Internal security zone.
Tip You are not required to group all internal (or external) interfaces into a single zone. Choose the grouping that
makes sense for your deployment and security policies. For more information on creating zones, see Working
with Security Zones, on page 49.
In this deployment, you may decide that although you want these hosts to have unrestricted access to the
Internet, you nevertheless want to protect them by inspecting incoming traffic for intrusions and malware.
To accomplish this using access control, configure an access control rule with a zone condition where the
Destination Zone is set to Internal. This simple access control rule matches traffic that leaves the device
from any interface in the Internal zone.
To ensure that the system inspects matching traffic for intrusions and malware, choose a rule action of Allow,
then associate this rule with an intrusion and a file policy.
If you want to build a more complex rule, you can add a maximum of 50 zones to each of the Source Zones
and Destination Zones in a single zone condition:
• To match traffic leaving the device from an interface in the zone, add that zone to the Destination Zones.
Because devices deployed passively do not transmit traffic, you cannot use a zone comprised of passive
interfaces in a Destination Zone condition.
• To match traffic entering the device from an interface in the zone, add that zone to the Source Zones.
• If you add both source and destination zone conditions to a rule, matching traffic must originate from
one of the specified source zones and egress through one of the destination zones.
When building a zone condition, warning icons indicate invalid configurations. For details, Troubleshooting
Access Control Policies and Rules, on page 74.
To control traffic by zone:
Step 1 In the access control policy where you want to control traffic by zone, create a new access control rule or edit an existing
rule.
For detailed instructions, see Creating and Editing Access Control Rules, on page 90.
Step 3 Find and select the zones you want to add from the Available Zones.
To search for zones to add, click the Search by name prompt above the Available Zones list, then type a zone name.
The list updates as you type to display matching zones.
Click to select a zone. To select multiple zones, use the Shift and Ctrl keys, or right-click and then select Select All.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
106
Controlling Traffic with Network-Based Rules
Controlling Traffic by Network or Geographical Location
Step 4 Click Add to Source or Add to Destination to add the selected zones to the appropriate list.
You can also drag and drop selected zones.
When you build a network-based access control rule condition, you can manually specify IP address and
geographical locations. Alternately, you can configure network conditions with network and geolocation
objects , which are reusable and associate a name with one or more IP addresses, address blocks, countries,
continents, and so on.
Tip After you create a network or geolocation object, you can use it not only to build access control rules, but
also to represent IP addresses in various other places in the system’s module interface. For more information,
see Managing Reusable Objects, on page 17.
Note that if you want to write rules to control traffic by geographical location, to ensure you are using up-to-date
geolocation data to filter your traffic, Cisco strongly recommends you regularly update the geolocation
database (GeoDB) on your ASA FirePOWER module; see Updating the Geolocation Database, on page 495.
You can add a maximum of 50 items to each of the Source Networks and Destination Networks in a single
network condition, and you can mix network and geolocation-based configurations:
• To match traffic from an IP address or geographical location, configure the Source Networks.
• To match traffic to an IP address or geographical location, configure the Destination Networks.
If you add both source and destination network conditions to a rule, matching traffic must originate from one
of the specified IP addresses and be destined for one of the destination IP addresses.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
107
Controlling Traffic with Network-Based Rules
Controlling Traffic by Network or Geographical Location
When building a network condition, warning icons indicate invalid configurations. For details, see
Troubleshooting Access Control Policies and Rules, on page 74.
Network conditions also allow you to handle proxied traffic based on the originating client. Use a source
network condition to specify proxy servers, then add an original client constraint to specify original client IP
addresses. The systems uses a packet's X-Forwarded-For (XFF), True-Client-IP, or custom-defined HTTP
header field to determine original client IP.
Traffic matches the rule if the proxy’s IP addresss matches the rule's source network constraint, and the original
client's IP address matches the rule's original client constraint. For example, to allow traffic from a specific
original client address, but only if it uses a specific proxy, create three rules:
Rule 1: Blocks non-proxied traffic from a specific IP address (209.165.201.1)
Source Networks: 209.165.201.1
Original Client Networks: none/any
Action: Block
Rule 2: Allows proxied traffic from the same IP address, but only if the proxy server for that traffic is one
you choose (209.165.200.225 or 209.165.200.238)
Source Networks: 209.165.200.225 and 209.165.200.238
Original Client Networks: 209.165.201.1
Action: Allow
Rule 3: Blocks proxied traffic from the same IP address if it uses any other proxy server.
Source Networks: any
Original Client Networks: 209.165.201.1
Action: Block
To control traffic by network or geographical location:
Step 1 In the access control policy where you want to control traffic by network, create a new access control rule or edit an
existing rule; see Creating and Editing Access Control Rules, on page 90.
Step 2 In the rule editor, select the Networks tab.
Step 3 Find and select the networks you want to add from the Available Networks, as follows:
• Click the Networks tab to display network objects and groups to add; click the Geolocation tab to display geolocation
objects.
• To add a network object on the fly, which you can then add to the condition, click the add icon ( ) above the
Available Networks list; see Working with Network Objects, on page 19.
• To search for network or geolocation objects to add, select the appropriate tab, click the Search by name or value
prompt above the Available Networks list, then type an object name or the value of one of the object’s components.
The list updates as you type to display matching objects.
To select an object, click it. To select multiple objects, use the Shift and Ctrl keys, or right-click and then select Select
All.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
108
Controlling Traffic with Network-Based Rules
Controlling Traffic by Port and ICMP Codes
Step 5 Click Add to Source, Add to Original Client, or Add to Destination to add the selected objects to the appropriate list.
You can also drag and drop selected objects.
Step 6 Add any source or destination IP addresses or address blocks that you want to specify manually.
Click the Enter an IP address prompt below the Source Networks or Destination Networks list; then type an IP address
or address block and click Add.
When you build a port-based access control rule condition, you can manually specify ports. Alternately, you
can configure port conditions with port objects , which are reusable and associate a name with one or more
ports.
Tip After you create a port object, you can use it not only to build access control rules, but also to represent ports
in various other places in the system’s module interface. You can create port objects either using the object
manager or on-the-fly while you are configuring access control rules. For more information, see the procedure
later in this section.
You can add a maximum of 50 items to each of the Selected Source Ports and Selected Destination Ports
lists in a single network condition:
• To match traffic from a port, configure the Selected Source Ports.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
109
Controlling Traffic with Network-Based Rules
Controlling Traffic by Port and ICMP Codes
If you add only source ports to a condition, you can add ports that use different transport protocols. For
example, you can add both DNS over TCP and DNS over UDP as source port conditions in a single access
control rule.
• To match traffic to a port, configure the Selected Destination Ports.
If you add only destination ports to a condition, you can add ports that use different transport protocols.
• To match traffic both originating from specific Selected Source Ports and destined for specific Selected
Destination Ports, configure both.
If you add both source and destination ports to a condition, you can only add ports that share a single transport
protocol (TCP or UDP). For example, if you add DNS over TCP as a source port, you can add Yahoo Messenger
Voice Chat (TCP) as a destination port but not Yahoo Messenger Voice Chat (UDP).
Keep the following points in mind when building a port condition:
• When you add a destination ICMP port with the type set to 0 or a destination ICMPv6 port with the type
set to 129, the access control rule only matches unsolicited echo replies. ICMP echo replies sent in
response to ICMP echo requests are ignored. For a rule to match on any ICMP echo, use ICMP type 8
or ICMPv6 type 128.
• When you use the GRE (47) protocol as a destination port condition, you can only add other network-based
conditions to the access control rule, that is, zone, and network conditions. You cannot save the rule if
you add reputation or user-based conditions.
When building a port condition, warning icons indicate invalid configurations. For example, you can use the
object manager to edit in-use port objects so that the rules that use those object groups become invalid. For
details, see Working with Port Objects, on page 25.
To control traffic by port:
Step 1 In the access control policy where you want to control traffic by port, create a new access control rule or edit an existing
rule.
For detailed instructions, see Tuning Traffic Flow Using Access Control Rules, on page 89.
Step 3 Find and select the ports you want to add from the Available Ports, as follows:
• To add a port object on the fly, which you can then add to the condition, click the add icon above the Available Ports
list; see Working with Port Objects, on page 25.
• To search for port objects and groups to add, click the Search by name or value prompt above the Available Ports
list, then type either the name of the object, or the value of a port in the object. The list updates as you type to display
matching objects. For example, if you type 80, the ASA FirePOWER module displays the Cisco-provided HTTP
port object.
To select an object, click it. To select multiple objects, use the Shift and Ctrl keys, or right-click and then select Select
All.
Step 4 Click Add to Source or Add to Destination to add the selected objects to the appropriate list.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
110
Controlling Traffic with Network-Based Rules
Controlling Traffic by Port and ICMP Codes
Step 5 Add any source or destination ports that you want to specify manually.
• For source ports, select either TCP or UDP from the Protocol drop-down list under the Selected Source Ports list.
Then, enter a Port. You can specify a single port with a value from 0 to 65535.
• For destination ports, select a protocol (including All for all protocols) from the Protocol drop down list under the
Selected Destination Ports list. You can also type the number of an unassigned protocol that does not appear in
the list.
If you select ICMP or IPv6-ICMP, a pop-up window appears where you can select a type and a related code. For more
information, see the IANA site for ICMP types and codes or ICMP v6 types and codes.
If you do not want to specify a protocol, or optionally if you specified TCP or UDP, enter a Port. You can specify a
single port with a value from 0 to 65535.
Click Add. Note that the ASA FirePOWER module will not add a port to a rule condition that results in an invalid
configuration.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
111
Controlling Traffic with Network-Based Rules
Controlling Traffic by Port and ICMP Codes
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
112
CHAPTER 8
Controlling Traffic With Reputation-Based Rules
Access control rules in access control policies exert granular control over network traffic logging and handling.
Reputation-based conditions in access control rules allow you to manage which traffic can traverse your
network, by contextualizing your network traffic and limiting it where appropriate. Access control rules govern
the following types of reputation-based control:
• Application conditions allow you to perform application control , which controls application traffic based
on not only individual applications, but also applications’ basic characteristics: type, risk, business
relevance, categories, and tags.
• URL conditions allow you to perform URL filtering , which controls web traffic based on individual
websites, as well as websites’ system-assigned category and reputation.
You can combine reputation-based conditions with each other and with other types of conditions to create an
access control rule. These access control rules can be simple or complex, matching and inspecting traffic using
multiple conditions. For detailed information on access control rules, see Tuning Traffic Flow Using Access
Control Rules, on page 89.
Note Security Intelligence-based traffic filtering, and some decoding and preprocessing occur before network traffic
is evaluated by access control rules. You can also configure the SSL inspection feature to block or decrypt
encrypted traffic before access control rules evaluate it.
Requirement Application URL Filtering (cat. & rep.) URL Filtering (manual)
Control
The ASA FirePOWER module can perform other types of reputation-based control, but you do not configure
these using access control rules. For more information, see: Blacklisting Using Security Intelligence IP Address
Reputation, on page 83 explains how to limit traffic based on the reputation of a connection’s origin or
destination as a first line of defense. Tuning Intrusion Prevention Performance, on page 142 explains how to
detect, track, store, analyze, and block the transmission of malware and other types of prohibited files.
• Controlling Application Traffic, on page 114
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
113
Controlling Traffic With Reputation-Based Rules
Controlling Application Traffic
Application filters allow you to quickly create application conditions for access control rules. They simplify
policy creation and administration, and grant you assurance that the system will control web traffic as expected.
For example, you could create an access control rule that identifies and blocks all high risk, low business
relevance applications. If a user attempts to use one of those applications, the session is blocked.
In addition, Cisco frequently updates and adds additional detectors via system and vulnerability database
(VDB) updates. By using filters based on application characteristics, you can ensure that the system uses the
most up-to-date detectors to monitor application traffic.
In the module interface, filters added to a condition are listed above and separately from individually added
applications.
Note that when you deploy an access control policy, for each rule with an application condition, the system
generates a list of unique applications to match. In other words, you may use overlapping filters and individually
specified applications to ensure complete coverage.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
114
Controlling Traffic With Reputation-Based Rules
Matching Traffic with Application Filters
Note For encrypted traffic, the system can identify and filter traffic using only the applications tagged SSL Protocol.
Applications without this tag can only be detected in unencrypted or decrypted traffic.
If the Medium filter contains 110 applications and the High filter contains 82 applications, the system displays
all 192 applications in the Available Applications list.
The system links different types of filters with an AND operation. For example, if you select the Medium and
High filters under the Risks type, and the Medium and High filters under the Business Relevance type, the
resulting filter is:
In this case, the system displays only those applications that are included in both the Medium or High Risk
type AND the Medium or High Business Relevance type.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
115
Controlling Traffic With Reputation-Based Rules
Matching Traffic from Individual Applications
Once constrained, an All apps matching the filter option appears at the top of the Available Applications
list. This option allows you to add all the applications in the constrained list to the Selected Applications and
Filters list, all at once.
Note If you select one or more filters in the Application Filters list and also search the Available Applications list,
your selections and the search-filtered Available Applications list are combined using an AND operation.
That is, the All apps matching the filter condition includes all the individual conditions currently displayed
in the Available Applications list as well as the search string entered above the Available Applications list.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
116
Controlling Traffic With Reputation-Based Rules
Adding an Application Condition to an Access Control Rule
This option allows you to add the entire set of applications in the constrained Available Applications list to
the Selected Applications and Filters list, at once. In contrast to adding applications individually, adding
this set of applications counts as only one item against the maximum of 50, regardless of the number of
individual applications that comprise it.
When you build an application condition this way, the name of the filter you add to the Selected Applications
and Filters list is a concatenation of the filter types represented in the filter plus the names of up to three
filters for each type. More than three filters of the same type are followed by an ellipsis (...). For example, the
following filter name includes two filters under the Risks type and four under Business Relevance:
Filter types that are not represented in a filter you add with All apps matching the filter are not included in
the name of the filter you add. These filter types are set to any ; that is, these filter types do not constrain the
filter, so any value is allowed for these.
You can add multiple instances of All apps matching the filter to an application condition, with each instance
counting as a separate item in the Selected Applications and Filters list. For example, you could add all high
risk applications as one item, clear your selections, then add all low business relevance applications as another
item. This application condition matches applications that are high risk OR have low business relevance.
Step 1 In the access control policy where you want to control traffic by application, create a new access control rule or edit an
existing rule.
For detailed instructions, see Creating and Editing Access Control Rules, on page 90.
Step 4 Optionally, use filters to constrain the list of applications displayed in the Available Applications list.
Select one or more filters in the Application Filters list. For more information, see Matching Traffic with Application
Filters, on page 115.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
117
Controlling Traffic With Reputation-Based Rules
Limitations to Application Control
Step 5 Find and select the applications you want to add from the Available Applications list.
You can search for and select individual applications, or, when the list is constrained, All apps matching the filter. For
more information, see Matching Traffic from Individual Applications, on page 116.
Step 6 Click Add to Rule to add the selected applications to the Selected Applications and Filters list.
You can also drag and drop selected applications and filters. Filters appear under the heading Filters , and applications
appear under the heading Applications .
Tip Before you add another filter to this application condition, click Clear All Filters to clear your existing selections.
Step 7 Optionally, click the add icon above the Selected Applications and Filters list to save a custom filter comprised of all
the individual applications and filters currently in the list.
Use the object manager to manage this on-the-fly-created filter; see Working with Application Filters, on page 27. Note
that you cannot save a filter that includes another user-created filter; you cannot nest user-created filters.
This identification should occur within 3 to 5 packets, or after the server certificate exchange in the SSL
handshake if the traffic is encrypted. If one of these first packets matches all other conditions in an access
control rule containing an application condition but the identification is not complete, the access control policy
allows the packet to pass. This behavior allows the connection to be established so that applications can be
identified. For your convenience, affected rules are marked with an information icon .
The allowed packets are inspected by the access control policy’s default intrusion policy (not the default
action intrusion policy nor the almost-matched rule’s intrusion policy).
After the system completes its identification, the system applies the access control rule action, as well as any
associated intrusion and file policy, to the remaining session traffic that matches its application condition.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
118
Controlling Traffic With Reputation-Based Rules
Blocking URLs
These applications are tagged SSL Protocol. Applications without this tag can only be detected in unencrypted
or decrypted traffic.
Blocking URLs
License: feature dependent
URL conditions in access control rules allow you to limit the websites that users on your network can access.
This feature is called URL filtering . There are two ways you can use access control to specify URLs you want
to block (or, conversely, allow):
• With any license, you can manually specify individual URLs or groups of URLs to achieve granular,
custom control over web traffic.
• With a URL Filtering license, you can also control access to websites based on the URL’s general
classification, or category , and risk level, or reputation . The system displays this category and reputation
data in connection logs, intrusion events, and application details.
Note To see URL category and reputation information in events, you must create at least one access control rule
with a URL condition.
When you block a website, you can either allow the user’s browser its default behavior, or you can display a
generic system-provided or custom page. You can also give users a chance to bypass a website block by
clicking through a warning page.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
119
Controlling Traffic With Reputation-Based Rules
Blocking URLs Based on URL Category and Reputation
Note Before access control rules with category and reputation-based URL conditions can take effect, you must add
a URL Filtering license and enable communications with the Cisco cloud. This allows the ASA FirePOWER
module to retrieve URL data. For more information, see Cloud Communications Options for URL Filtering
and Malware Detection, on page 466.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
120
Controlling Traffic With Reputation-Based Rules
Blocking URLs Based on URL Category and Reputation
Note that if the cloud does not know the category or reputation of a URL, or if the ASA FirePOWER module
cannot contact the cloud, that URL does not trigger access control rules with category or reputation-based
URL conditions. You cannot assign categories or reputations to URLs manually.
Building URL Conditions
You can add a maximum of 50 items to the Selected URLs to match in a single URL condition. Each URL
category, optionally qualified by reputation, counts as a single item. Note that you can also use literal URLs
and URL objects in URL conditions, but you cannot qualify these items with a reputation. For more information,
see Performing Manual URL Blocking, on page 122.
Note that you cannot qualify a literal URL or URL object with a reputation.
When building a URL condition, warning icons indicate invalid configurations. For details, see Troubleshooting
Access Control Policies and Rules, on page 74.
To control traffic by requested URL using category and reputation data:
Step 1 Set up your appliance to obtain URL category and reputation data from the Cisco cloud.
See Enabling Cloud Communications, on page 468.
Step 2 In the access control policy where you want to control traffic by URL, create a new access control rule or edit an existing
rule.
For detailed instructions, see Creating and Editing Access Control Rules, on page 90.
Step 4 Find and select the categories of URL you want to add from the Categories and URLs list. To match web traffic regardless
of category, select Any category.
To search for categories to add, click the Search by name or value prompt above the Categories and URLs list, then
type the category name. The list updates as you type to display matching categories.
To select a category, click it. To select multiple categories, use the Shift and Ctrl keys.
Tip Although you can right-click and Select All categories, adding all categories this way exceeds the 50-item
maximum for an access control rule. Instead, use Any.
If the purpose of the rule is protection from malware, be sure to select all Threat categories, as described on
https://www.talosintelligence.com/categories.
There may be more than one page of categories. Be sure you have addressed all pages by clicking the arrows
below the categories list.
Step 5 Optionally, qualify your category selections by clicking a reputation level from the Reputations list. If you do not specify
a reputation level, the system defaults to Any, meaning all levels including sites with unknown reputation.
Optionally, select Apply to unknown reputation.
You can only select one reputation level. When you choose a reputation level, the access control rule behaves differently
depending on its purpose:
• If the rule blocks or monitors web access (the rule action is Block, Block with reset, Interactive Block, Interactive
Block with reset, or Monitor) selecting a reputation level also selects all reputations more severe than that level.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
121
Controlling Traffic With Reputation-Based Rules
If URL Categories Change
For example, if you configure a rule to block or monitor Questionable sites (level 2), it also automatically blocks
or monitors Untrusted (level 1) sites.
• If the rule allows web access, whether to trust or further inspect it (the rule action is Allow or Trust), selecting a
reputation level also selects all reputations less severe than that level. For example, if you configure a rule to allow
Favorable sites (level 4), it also automatically allows Trusted (level 5) sites.
If you change the rule action for a rule, the system automatically changes the reputation levels in URL conditions according
to the above points.
Step 6 Click Add to Rule or drag and drop the selected items to add them to the Selected URLs list.
Step 7 Save or continue editing the rule.
You must deploy the access control policy for your changes to take effect; see Deploying Configuration Changes, on
page 73.
Effect on Events
All events will have the URL category that matched at the time the traffic was seen. Legacy categories will
be labeled as such. Over time, events with legacy categories will age out of the system.
If a URL does not have a reputation at the time it was processed, the URL Reputation column in the event
viewer will be empty.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
122
Controlling Traffic With Reputation-Based Rules
Performing Manual URL Blocking
For example, access control rules treat traffic to http://example.com/ the same as traffic to https://example.com/.
To configure an access control rule that matches only HTTP or HTTPS traffic, add an application condition
to the rule. For more information, see Blocking URLs, on page 119.
• match HTTPS traffic based on the subject common name in the public key certificate used to encrypt
the traffic, and also disregard subdomains within the subject common name
Step 1 Create and add a custom Security Intelligence list containing URLs to block.
a) Create a new text file with a .txt filename extension.
We recommend including "Block" and "URLs" in the filename.
b) Add one or more URLs to the file, each on a separate line.
For detailed requirements and guidelines for your list, see the "Custom Security Intelligence Lists" topic in the
Firepower Management Center Configuration Guide for version 6.6, available from https://www.cisco.com/c/en/us/
support/security/defense-center/products-installation-and-configuration-guides-list.html
What to do next
• (Optional) Using this procedure as an example, create a custom Security Intelligence list for URL traffic
to manually allow.
For example, you can use such a list if you block a category of websites that are not appropriate for your
organization, but the category contains a website to which you need to provide access.
For this list, we recommend using "Allow" and "URLs" in the filename. Add the list to an access control
rule with an Allow action. Position the rule above any rules that would otherwise block URLs on the
list.
• Deploy changes.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
123
Controlling Traffic With Reputation-Based Rules
Guidelines and Limitations to URL Detection and Blocking
• To add URLs to your custom Security Intelligence list, see Updating a Security Intelligence List, on page
25.
Threat Categories
Be sure that your policies specifically address Threat categories, which identify known malicious sites.
For specifics, see the Threat Categories tab at the URL in Blocking URLs Based on URL Category and
Reputation, on page 120.
This identification should occur within 3 to 5 packets, or after the server certificate exchange in the SSL
handshake if the traffic is encrypted. If one of these first packets matches all other conditions in an access
control rule containing a URL condition but the identification is not complete, the access control policy allows
the packet to pass. This behavior allows the connection to be established so that URLs can be identified. For
your convenience, affected rules are marked with an information icon .
The allowed packets are inspected by the access control policy’s default intrusion policy (not the default
action intrusion policy nor the almost-matched rule’s intrusion policy). Important! Make sure you have
configured this intrusion policy.
After the system completes its identification, the system applies the access control rule action, as well as any
associated intrusion and file policy, to the remaining session traffic that matches its URL condition.
Uncategorized/Reputationless URLs
When you build a URL rule, you first choose the category you want to match. If you explicitly choose
Uncategorized URLs, you cannot further constrain by reputation.
Uncategorized URLs with Untrusted reputation are handled by the Malicious Sites category. If you want to
block uncategorized sites with any other reputation level, you must block all uncategorized sites.
If the system does not know the category and reputation of a URL, browsing to that website does not match
rules with category and reputation-based URL conditions. You cannot manually assign categories and
reputations to URLs, but you can manually block specific URLs. See Performing Manual URL Blocking, on
page 122.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
124
Controlling Traffic With Reputation-Based Rules
Dispute URL Category or Reputation
Step 3 Sign in to the Talos web site with your Cisco account credentials
Step 4 Follow instructions on the page.
The page includes links to view the status of your ticket; make a note of the information so you can follow up later.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
125
Controlling Traffic With Reputation-Based Rules
Allowing Users to Bypass URL Blocks
When you block a user’s HTTP web request using an access control rule, setting the rule action to Interactive
Block or Interactive Block with reset gives that user a chance to bypass the block by clicking through a
warning HTTP response page . You can display a generic system-provided response page or you can enter
custom HTML.
By default, the system allows users to bypass blocks for 10 minutes (600 seconds) without displaying the
warning page on subsequent visits. You can set the duration to as long as a year, or you can force the user to
bypass the block every time.
If the user does not bypass the block, matching traffic is denied without further inspection; you can also reset
the connection. On the other hand, if a user bypasses the block, the system allows the traffic. Allowing this
traffic means that you can continue to inspect unencrypted payloads for intrusions, malware and prohibited
files. Note that users may have to refresh after bypassing the block to load page elements that did not load.
Note that you configure the interactive HTTP response page separately from the response page you configure
for Block rules. For example, you could display the system-provided page to users whose sessions are blocked
without interaction, but a custom page to users who can click to continue. For more information, see Displaying
a Custom Web Page for Blocked URLs, on page 127.
If you block web traffic decrypted by the SSL inspection feature, the system encrypts the response page and
sends it at the end of the reencrypted SSL stream.
Tip To quickly disable interactive blocking for all rules in an access control policy, display neither the
system-provided page nor a custom page. This causes the system to block all connections that match an
Interactive Block rule without interaction.
Step 1 Create an access control rule that matches web traffic with a URL condition.
See Blocking URLs Based on URL Category and Reputation, on page 120 and Performing Manual URL Blocking, on
page 122.
Step 2 Make sure the access control rule action is Interactive Block or Interactive Block with reset.
See Using Rule Actions to Determine Traffic Handling and Inspection, on page 95.
Step 3 Assume users will bypass the block and choose inspection and logging options for the rule accordingly. As with Allow
rules:
• You can associate either type of Interactive Block rule with a file and intrusion policy. For more information, see
Controlling Traffic Using Intrusion and File Policies, on page 137.
• Logging options for interactively blocked traffic are identical to those in allowed traffic, but keep in mind that if a
user does not bypass the interactive block, the system can log only beginning-of-connection events.
Note that when the system initially warns the user, it marks any logged beginning-of-connection event with the Interactive
Block or Interactive Block with reset action. If the user bypasses the block, additional connection events logged for the
session have an action of Allow. For more information, see Logging Connections Based on Access Control Handling,
on page 391.
Step 4 Optionally, set the amount of time that elapses after a user bypasses a block before the system displays the warning page
again.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
126
Controlling Traffic With Reputation-Based Rules
Setting the User Bypass Timeout for a Blocked Website
See Setting the User Bypass Timeout for a Blocked Website, on page 127.
Step 5 Optionally, create and use a custom page to display to allow users to bypass a block.
See Displaying a Custom Web Page for Blocked URLs, on page 127.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon next to the access control policy you want to configure.
The access control policy editor appears.
Step 5 In the Allow an Interactive Block to bypass blocking for (seconds) field, type the number of seconds that must elapse
before the user bypass expires.
You can specify any number of seconds from zero to 31536000 (one year). Specifying zero forces your users to bypass
the block every time.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
127
Controlling Traffic With Reputation-Based Rules
Displaying a Custom Web Page for Blocked URLs
When the system blocks a user’s HTTP web request, what the user sees in a browser depends on how you
block the session, using the access control rule’s action. You should select:
• Block or Block with reset to deny the connection. A blocked session times out; the system resets Block
with reset connections. However, for both blocking actions, you can override the default browser or
server page with a custom page that explains that the connection was denied. The system calls this custom
page an HTTP response page .
• Interactive Block or Interactive Block with reset if you want to display an interactive HTTP response
page that warns users, but also allows them to click a button to continue or refresh the page to load the
originally requested site. Users may have to refresh after bypassing the response page to load page
elements that did not load.
You can either display a generic system-provided response page, or you can enter custom HTML. When you
enter custom text, a counter shows how many characters you have used.
In each access control policy, you configure the interactive HTTP response page separately from the response
page you use to block traffic without interaction, that is, using a Block rule. For example, you could display
the system-provided page to users whose sessions are blocked without interaction, but a custom page to users
who can click to continue.
Reliable display of HTTP response pages to your users depends on your network configuration, traffic loads,
and size of the page. If you build a custom response page, keep in mind that a smaller page is more likely to
display successfully.
To configure HTTP response pages:
Step 1 Edit the access control policy monitoring your web traffic; see Editing Access Control Policies, on page 69.
Step 2 Click the HTTP Responses tab.
Step 3 For the Block Response Page and the Interactive Block Response Page, choose responses from the drop-down lists.
For each page, you have the following choices:
• System-provided — Displays a generic response. Click the view icon ( ) to view the code for this page.
• Custom—Create a custom response page.
A pop-up window appears, prepopulated with system-provided code that you can replace or modify. When you are done,
save your changes. Note that you can edit a custom page by clicking the edit icon.
• None—Disables the response page and blocks sessions without interaction or explanation. Note that selecting this
option for interactively blocked sessions prevents users from clicking to continue; the session is blocked without
interaction.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
128
CHAPTER 9
Access Control Rules: Realms and Users
License: Control
Before you can perform user control (create access control rule conditions based on entire realms, individual
users, user groups, or ISE attributes), you must:
• Configure a realm for each Microsoft Active Directory or LDAP server you want to monitor. If you
enable user download for the realm, the Firepower Management Center regularly and automatically
queries the server to download metadata for newly or already-reported authoritative users and user groups.
Note Configuring a realm is optional if you plan to configure SGT ISE attribute
conditions but not user, group, realm, Endpoint Location, or Endpoint Profile
conditions.
User Agents, ISE/ISE-PIC, and captive portal collect authoritative user data that can be used for user control
in access control rule conditions. The identity sources monitor specified users as they log in or out of hosts
or authenticate using LDAP or AD credentials.
Note If you configure a User Agent or ISE/ISE-PIC device to monitor a large number of user groups, or if you have
a very large number of users mapped to hosts on your network, the system might drop user mappings based
on groups, due to your Firepower Management Center user limit. As a result, access control rules with realm,
user, or user group conditions may not fire as expected.
You can add a maximum of 50 realms, users, and groups to the Selected Users in a single user condition.
Conditions with user groups match traffic to or from any of the group’s members, including members of any
sub-groups, with the exception of individually excluded users and members of excluded sub-groups.
Including a user group automatically includes all of that group’s members, including members of any secondary
groups. However, if you want to use the secondary group in access control rules, you must explicitly include
the secondary group.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
129
Access Control Rules: Realms and Users
Troubleshooting Issues with User Access Control Rules
Note Hardware-based fast-path rules, Security Intelligence-based traffic filtering, SSL inspection, user identification,
and some decoding and preprocessing occur before access control rules evaluate network traffic.
Access control rules targeting realms, users, or user groups are not firing
If you configure a User Agent or ISE/ISE-PIC device to monitor a large number of user groups, or if you have
a very large number of users mapped to hosts on your network, the system may drop user records due to your
Firepower Management Center user limit. As a result, access control rules with realm or user conditions may
not fire as expected.
Access control rules targeting user groups or users within user groups are not firing as expected
If you configure an access control rule with a user group condition, your LDAP or Active Directory server
must have user groups configured. The Firepower Management Center cannot perform user group control if
the server organizes the users in basic object hierarchy.
Access control rules targeting users in secondary groups are not firing as expected
If you configure an access control rule with a user group condition that includes or excludes users who are
members of a secondary group on your Active Directory server, your server may be limiting the number of
users it reports.
By default, Active Directory servers limit the number of users they report from secondary groups. You must
customize this limit so that all of the users in your secondary groups are reported to the Firepower Management
Center and eligible for use in access control rules with user conditions.
Access control rules are not matching users when seen for the first time
After the system detects activity from a previously-unseen user, the system retrieves information from the
server. Until the system successfully retrieves this information, activity seen by this user is not handled by
matching access control rules. Instead, the user session is handled by the next access control rule it matches
(or the access control policy default action).
For example, this may explain when:
• Users who are members of user groups are not matching access control rules with user group conditions.
• Users who were reported by ISE/ISE-PIC or the User Agent are not matching access control rules, when
the server used for user data retrieval is an Active Directory server.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
130
Access Control Rules: Realms and Users
Adding a Realm, User, or User Group Condition to an Access Control Rule
Note that this may also cause the system to delay the display of user data in event views and analysis tools.
Step 1 In the access control rule editor, select the Users tab.
Step 2 Search by name or value above the Available Realms list and select a realm.
Step 3 Search by name or value above the Available Users list and select a user or group.
Step 4 Click Add to Rule, or drag and drop.
Step 5 Save or continue editing the rule.
Note Configuring a realm is optional if you plan to configure SGT ISE attribute conditions but not user, group,
realm, Endpoint Location, or Endpoint Profile conditions.
Note The ISE-PIC identity source does not provide ISE attribute data. You must configure ISE.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
131
Access Control Rules: Realms and Users
Configuring ISE Attribute Conditions
Step 1 In the access control rule editor, click the SGT/ISE Attributes tab.
Step 2 Search by name or value above the Available Attributes list and choose an attribute.
Step 3 Search by name or value above the Available Metadata list and choose metadata.
Step 4 Click Add to Rule, or drag and drop.
Step 5 Constrain the rule with an IP address in the Add a Location IP Address field.
Note You can use ISE-assigned Security Group Tags (SGTs) to constrain ISE attribute conditions. To use custom
SGTs in access control rules, see ISE SGT and Custom SGT Rule Conditions, on page 133.
What to do next
• Deploy configuration changes; see Deploying Configuration Changes, on page 73.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
132
CHAPTER 10
Access Control Rules: Custom Security Group
Tags
The Security Group Tag (SGT) specifies the privileges of a traffic source within a trusted network. Security
Group Access (a feature of both Cisco TrustSec and Cisco ISE) automatically generates the SGT when a user
adds a security group in TrustSec or ISE. SGA then applies the SGT attribute as packets enter the network.
You can use SGTs for access control by configuring ISE as an identity source or creating custom SGT objects.
Custom SGT conditions allow you to configure access control rules based on custom SGT objects. You
manually add custom SGT objects to the Firepower System, rather than obtaining SGTs via ISE.
You can only use custom SGT conditions if you disable ISE/ISE-PIC as an identity source.
• ISE SGT and Custom SGT Rule Conditions, on page 133
• Automatic Transition from Custom SGT to ISE SGT Rule Conditions, on page 134
• Configuring Custom SGT Conditions, on page 134
• Troubleshooting Custom SGT Conditions, on page 135
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
133
Access Control Rules: Custom Security Group Tags
Automatic Transition from Custom SGT to ISE SGT Rule Conditions
Step 1 In the access control rule editor, click the SGT/ISE Attributes tab.
Step 2 Choose Security Group Tag from the Available Attributes list.
Step 3 In the Available Metadata list, find and choose a custom SGT object.
If you choose , the rule matches all traffic with an SGT attribute. For example, you might choose this value if you want
the rule to block traffic from hosts that are not configured for TrustSec.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
134
Access Control Rules: Custom Security Group Tags
Troubleshooting Custom SGT Conditions
What to do next
• Deploy configuration changes; see Deploying Configuration Changes, on page 73.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
135
Access Control Rules: Custom Security Group Tags
Troubleshooting Custom SGT Conditions
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
136
CHAPTER 11
Controlling Traffic Using Intrusion and File
Policies
Intrusion and file policies work together, as the last line of defense before traffic is allowed to its destination:
• Intrusion policies govern the system’s intrusion prevention capabilities; see About Network Analysis
and Intrusion Policies, on page 243.
• File policies govern the system’s network-based file control and advanced malware protection (AMP)
capabilities; see Understanding and Creating File Policies, on page 372.
Security Intelligence-based traffic filtering (blacklisting), SSL inspection-based decisions, and traffic decoding
and preprocessing occur before network traffic is examined for intrusions, prohibited files, and malware.
Access control rules and the access control default action determine which traffic is inspected by intrusion
and file policies.
By associating an intrusion or file policy with an access control rule, you are telling the system that before it
passes traffic that matches the access control rule’s conditions, you first want to inspect the traffic with an
intrusion policy, a file policy, or both.
Intrusion prevention and AMP require that you enable specific licensed capabilities as described in the following
table.
intrusion prevention detect and optionally block intrusions and exploits Protection
file control detect and optionally block the transmission of file types Protection
advanced malware protection (AMP) detect, track, and optionally block the transmission of Malware
malware
For more information on inspecting traffic for intrusions, prohibited files, and malware, see:
• Inspecting Allowed Traffic For Intrusions and Malware, on page 138
• Tuning Intrusion Prevention Performance, on page 142
• Tuning File and Malware Inspection Performance and Storage, on page 152
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
137
Controlling Traffic Using Intrusion and File Policies
Inspecting Allowed Traffic For Intrusions and Malware
Note Sometimes, when a connection is analyzed by an access control policy, the system must process the first few
packets in that connection, allowing them to pass, before it can decide which access control rule (if any) will
handle the traffic. However, so these packets do not reach their destination uninspected, you can use an
intrusion policy—called the default intrusion policy—to inspect them and generate intrusion events.
For more information on the above scenario and instructions on associating file and intrusion policies with
access control rules and the access control default action, see:
Note Traffic allowed by an Intrusion Prevention default action can be inspected for intrusions, but cannot be
inspected for prohibited files or malware. You cannot associate a file policy with the access control default
action.
You do not have to perform both file and intrusion inspection in the same rule. For a connection matching an
Allow or Interactive Block rule:
• without a file policy, traffic flow is determined by the intrusion policy
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
138
Controlling Traffic Using Intrusion and File Policies
Configuring an Access Control Rule to Perform AMP or File Control
Tip The system does not perform any kind of inspection on trusted traffic.
For any single connection handled by an access control rule, file inspection occurs before intrusion inspection.
That is, the system does not inspect files blocked by a file policy for intrusions. Within file inspection, simple
blocking by type takes precedence over malware inspection and blocking.
Note Until a file is detected and blocked in a session, packets from the session may be subject to intrusion inspection.
For example, consider a scenario where you normally want to allow certain network traffic as defined in an
access control rule. However, as a precaution, you want to block the download of executable files, examine
downloaded PDFs for malware and block any instances you find, and perform intrusion inspection on the
traffic.
You create an access control policy with a rule that matches the characteristics of the traffic you want to
provisionally allow, and associate it with both an intrusion policy and a file policy. The file policy blocks the
download of all executables, and also inspects and blocks PDFs containing malware:
• First, the system blocks the download of all executables, based on simple type matching specified in the
file policy. Because they are immediately blocked, these files are subject to neither malware cloud lookup
nor intrusion inspection.
• Next, the system performs malware cloud lookups for PDFs downloaded to a host on your network. Any
PDFs with a malware file disposition are blocked, and are not subject to intrusion inspection.
• Finally, the system uses the intrusion policy associated with the access control rule to inspect any remaining
traffic, including files not blocked by the file policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
139
Controlling Traffic Using Intrusion and File Policies
Configuring an Access Control Rule to Perform Intrusion Prevention
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control.
The Access Control Policy page appears.
Step 2 Click the edit icon ( ) next to the access control policy where you want to configure AMP or file control using access
control rules.
Step 3 Create a new rule or edit an existing rule; seeCreating and Editing Access Control Rules, on page 90
The access control rule editor appears.
Step 4 Ensure the rule action is set to Allow, Interactive Block, or Interactive Block with reset.
Step 5 Select the Inspection tab.
The Inspection tab appears.
Step 6 Select a File Policy to inspect traffic that matches the access control rule, or select None to disable file inspection for
matching traffic.
You can click the edit ( ) icon that appears to edit the policy; see Creating a File Policy, on page 377
Tip Even if you use system-provided intrusion policies, Cisco strongly recommends you configure the system’s
intrusion variables to accurately reflect your network environment. At a minimum, modify default variables
in the default set; see Optimizing Predefined Default Variables, on page 30
Although you can associate a different intrusion policy-variable set pair with each Allow and Interactive Block
rule (as well as with the default action), you cannot apply an access control policy if the target devices have
insufficient resources to perform inspection as configured. For more information, see Simplifying Rules to
Improve Performance, on page 75
Understanding System-Provided and Custom Intrusion Policies
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
140
Controlling Traffic Using Intrusion and File Policies
Configuring an Access Control Rule to Perform Intrusion Prevention
Cisco delivers several intrusion policies with the ASA FirePOWER module. By using system-provided
intrusion policies, you can take advantage of the experience of the Cisco Vulnerability Research Team (VRT).
For these policies, the VRT sets intrusion and preprocessor rule states, as well as provides the initial
configurations for advanced settings. You can use system-provided policies as-is, or you can use them as the
base for custom policies. Building custom policies can improve the performance of the system in your
environment and provide a focused view of the malicious traffic and policy violations occurring on your
network.
In addition to custom policies that you create, the system provides two custom policies: Initial Inline Policy
and Initial Passive Policy. These two intrusion policies use the Balanced Security and Connectivity intrusion
policy as their base. The only difference between them is their Drop When Inline setting, which enables drop
behavior in the inline policy and disables it in the passive policy. For more information, see Comparing
System-Provided with Custom Policies, on page 249
Connection and Intrusion Event Logging
When an intrusion policy invoked by an access control rule detects an intrusion, it generates an intrusion
event. The system also automatically logs the end of the connection where the intrusion occurred, regardless
of the logging configuration of the access control rule. See Connections Associated with Intrusion (Automatic)
To associate an intrusion policy with an access control rule:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon ( ) next to the access control policy where you want to configure intrusion inspection using access
control rules.
Step 3 Create a new rule or edit an existing rule; see Creating and Editing Access Control Rules, on page 90
The access control rule editor appears.
Step 4 Ensure the rule action is set to Allow, Interactive Block, or Interactive Block with reset.
Step 5 Select the Inspection tab.
The Inspection tab appears.
Step 6 Select a system-provided or custom Intrusion Policy, or select None to disable intrusion inspection for traffic that matches
the access control rule.
If you select a custom intrusion policy, you can click the edit icon ( ) that appears to edit the policy; see Editing Intrusion
Policies, on page 282
Caution Do not select Experimental Policy 1 unless instructed to by a Cisco representative. Cisco uses this policy for
testing.
Step 7 Optionally, change the Variable Set associated with the intrusion policy.
You can click the edit icon ( ) that appears to edit the variable set; see Working with Variable Sets, on page 29.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
141
Controlling Traffic Using Intrusion and File Policies
Tuning Intrusion Prevention Performance
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit ( ) icon next to the access control policy you want to edit.
The access control policy editor appears.
Step 4 Click the edit icon ( ) next to Performance Settings, then select the Pattern Matching Limits tab in the pop-up
window that appears.
Step 5 You can modify the following options:
• Type a value for the maximum number of events to queue in the Maximum Pattern States to Analyze Per Packet
field.
• To inspect packets which will be rebuilt into larger streams of data before and after stream reassembly, select Disable
Content Checks on Traffic Subject to Future Reassembly. Inspection before and after reassembly requires more
processing overhead and may decrease performance.
• To disable inspection of packets which will be rebuilt into larger streams of data before and after stream reassembly,
clear Disable Content Checks on Traffic Subject to Future Reassembly. Disabling inspection decreases the
processing overhead for inspection of stream inserts and may boost performance.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
142
Controlling Traffic Using Intrusion and File Policies
Overriding Regular Expression Limits for Intrusion Rules
Caution Do not override default PCRE limits unless you are an experienced intrusion rule writer with knowledge of
the impact of degenerative patterns.
The following table describes the options you can configure to override the default limits.
Option Description
Match Limit State Specifies whether to override Match Limit. You have the following options:
• select Default to use the value configured for Match Limit
• select Unlimited to permit an unlimited number of attempts
• select Custom to specify either a limit of 1 or greater for Match Limit, or to
specify 0 to completely disable PCRE match evaluations
Match Limit Specifies the number of times to attempt to match a pattern defined in a PCRE
regular expression.
Match Recursion Limit Specifies whether to override Match Recursion Limit. You have the following
State options:
• select Default to use the value configured for Match Recursion Limit
• select Unlimited to permit an unlimited number of recursions
• select Custom to specify either a limit of 1 or greater for Match Recursion
Limit, or to specify 0 to completely disable PCRE recursions
Note that for Match Recursion Limit to be meaningful, it must be smaller than
Match Limit.
Match Recursion Limit Specifies the number of recursions when evaluating a PCRE regular expression
against the packet payload.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon ( ) next to the access control policy you want to edit.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
143
Controlling Traffic Using Intrusion and File Policies
Limiting Intrusion Events Generated Per Packet
Step 4 Click the edit icon ( ) next to Performance Settings, then select the Regular Expression Limits tab in the pop-up
window that appears.
Step 5 You can modify any of the options in the Regular Expression Constraint Options table.
Step 6 Click OK.
You must save and apply the access control policy for your changes to take effect; see Deploying Configuration Changes,
on page 73
Option Description
Maximum Events Stored Per The maximum number of events that can be stored for a given packet or
Packet packet stream.
Maximum Events Logged Per The number of events logged for a given packet or packet stream. This
Packet cannot exceed the Maximum Events Stored Per Packet value.
Prioritize Event Logging By The value used to determine event ordering within the event queue. The
highest ordered event is reported through the user interface. You can select
from:
• priority , which orders events in the queue by the event priority.
• content_length , which orders events by the longest identified content
match. When events are ordered by content length, rule events always
take precedence over decoder and preprocessor events.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
144
Controlling Traffic Using Intrusion and File Policies
Configuring Packet and Intrusion Rule Latency Thresholds
Step 2 Click the edit icon ( ) next to the access control policy you want to edit.
The access control policy editor appears.
Step 4 Click the edit icon ( ) next to Performance Settings, then select the Intrusion Event Logging Limits tab in the pop-up
window that appears.
Step 5 You can modify any of the options in the Intrusion Event Logging Limits Options table.
Step 6 Click OK.
You must save and apply the access control policy for your changes to take effect; see Deploying Configuration Changes,
on page 73
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
145
Controlling Traffic Using Intrusion and File Policies
Configuring Packet Latency Thresholding
As illustrated in the above figure, packet latency timing is tested at the following test points:
• after the completion of all decoder and preprocessor processing and before rule processing begins
• after processing by each rule
If the processing time exceeds the threshold at any test point, packet inspection ceases.
Tip Total packet processing time does not include routine TCP stream or IP fragment reassembly times.
Packet latency thresholding has no effect on events triggered by a decoder, preprocessor, or rule processing
the packet. Any applicable decoder, preprocessor, or rule triggers normally until a packet is fully processed,
or until packet processing ends because the latency threshold is exceeded, whichever comes first. If a drop
rule detects an intrusion in an inline deployment, the drop rule triggers an event and the packet is dropped.
Note No packets are evaluated against rules after processing for that packet ceases because of a packet latency
threshold violation. A rule that would have triggered an event cannot trigger that event, and for drop rules,
cannot drop the packet.
For more information on drop rules, see Setting Rule States, on page 308
Packet latency thresholding can improve system performance in both passive and inline deployments, and
can reduce latency in inline deployments, by stopping inspection of packets that require excessive processing
time. These performance benefits might occur when, for example:
• for both passive and inline deployments, sequential inspection of a packet by multiple rules requires an
excessive amount of time
• for inline deployments, a period of poor network performance, such as when someone downloads an
extremely large file, slows packet processing
In a passive deployment, stopping the processing of packets might not contribute to restoring network
performance because processing simply moves to the next packet.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
146
Controlling Traffic Using Intrusion and File Policies
Configuring Packet Latency Thresholding
The following table describes the options you can set to configure packet latency thresholding.
Option Description
Threshold (microseconds) Specifies the time, in microseconds, when inspection of a packet ceases. See the
Minimum Packet Latency Threshold Settings table for recommended minimum
threshold settings.
You can enable rule 134:3 to generate an event when the system stops inspecting a packet because the packet
latency threshold is exceeded. See Setting Rule States, on page 308 for more information.
Many factors affect measurements of system performance and packet latency, such as CPU speed, data rate,
packet size, and protocol type. For this reason, Cisco recommends that you use the threshold settings in the
following table until your own calculations provide you with settings tailored to your network environment.
1 Gbps 100
5 Mbps 1000
Multiply the average microseconds per packet for your network by a significant safety factor to ensure that
you do not unnecessarily discontinue packet inspections.
For example, the Minimum Packet Latency Threshold Settings table recommends a minimum packet latency
threshold of 100 microseconds in a one gigabit environment. This minimum recommendation is based on test
data showing an average of 250,000 packets per second, which is 0.25 packets per microsecond, or 4
microseconds per packet. Multiplying by a factor of twenty-five results in a recommended minimum threshold
of 100 microseconds.
To configure packet latency thresholding:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon ( ) next to the access control policy you want to edit.
The access control policy editor appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
147
Controlling Traffic Using Intrusion and File Policies
Understanding Rule Latency Thresholding
Step 4 Click the edit icon ( ) next to Latency-Based Performance Settings, then select the Packet Handling tab in the pop-up
window that appears.
Step 5 See the Minimum Packet Latency Threshold Settings table for recommended minimum Threshold settings.
Step 6 Click OK.
You must save and apply the access control policy for your changes to take effect; see Deploying Configuration Changes,
on page 73
In the above example, the time required to process each of the first three packets violates the rule latency
threshold of 1000 microseconds, and the violations counter increments with each violation. Processing of the
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
148
Controlling Traffic Using Intrusion and File Policies
Configuring Rule Latency Thresholding
fourth packet does not violate the threshold, and the violations counter resets to zero. The fifth packet violates
the threshold and the violations counter restarts at one.
The following example shows five consecutive rule processing times that do result in rule suspension.
In the second example, the time required to process each of the five packets violates the rule latency threshold
of 1000 microseconds. The group of rules is suspended because the rule processing time of 1100 microseconds
for each packet violates the threshold of 1000 microseconds for the specified five consecutive violations. Any
subsequent packets, represented in the figure as packets 6 through n, are not examined against suspended
rules until the suspension expires. If more packets occur after the rules are re-enabled, the violations counter
begins again at zero.
Rule latency thresholding has no effect on intrusion events triggered by the rules processing the packet. A
rule triggers an event for any intrusion detected in the packet, regardless of whether the rule processing time
exceeds the threshold. If the rule detecting the intrusion is a drop rule in an inline deployment, the packet is
dropped. When a drop rule detects an intrusion in a packet that results in the rule being suspended, the drop
rule triggers an intrusion event, the packet is dropped, and that rule and all related rules are suspended. For
more information on drop rules, see Setting Rule States, on page 308
Note Packets are not evaluated against suspended rules. A suspended rule that would have triggered an event cannot
trigger that event and, for drop rules, cannot drop the packet.
Rule latency thresholding can improve system performance in both passive and inline deployments, and can
reduce latency in inline deployments, by suspending rules that take the most time to process packets. Packets
are not evaluated again against suspended rules until a configurable time expires, giving the overloaded device
time to recover. These performance benefits might occur when, for example:
• hastily written, largely untested rules require an excessive amount of processing time
• a period of poor network performance, such as when someone downloads an extremely large file, causes
slow packet inspection
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
149
Controlling Traffic Using Intrusion and File Policies
Configuring Rule Latency Thresholding
The following table further describes the options you can set to configure rule latency thresholding.
Option Description
Threshold Specifies the time in microseconds that rules should not exceed when
examining a packet. See the Minimum Rule Latency Threshold Settings
table for recommended minimum threshold settings.
Consecutive Threshold Violations Specifies the consecutive number of times rules can take longer than the
Before Suspending Rule time set for Threshold to inspect packets before rules are suspended.
Many factors affect measurements of system performance, such as CPU speed, data rate, packet size, and
protocol type. For this reason, Cisco recommends that you use the threshold settings in the following table
until your own calculations provide you with settings tailored to your network environment.
1 Gbps 500
5 Mbps 5000
Multiply the average microseconds per packet for your network by a significant safety factor to ensure that
you do not unnecessarily suspend rules.
To configure rule latency thresholding:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon ( ) next to the access control policy you want to edit.
The access control policy editor appears.
Step 4 Click the edit icon ( ) next to Latency-Based Performance Settings, then select the Rule Handling tab in the pop-up
window that appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
150
Controlling Traffic Using Intrusion and File Policies
Configuring Intrusion Performance Statistic Logging
Step 5 You can configure any of the options in the Rule Latency Thresholding Options table.
See the Minimum Rule Latency Threshold Settings table for recommended minimum Threshold settings.
Caution Changing the setting for this troubleshooting option will affect performance and should be done only with
Support guidance.
Caution Changing the setting for this troubleshooting option will affect performance and should be done only with
Support guidance.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon ( ) next to the access control policy you want to edit.
The access control policy editor appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
151
Controlling Traffic Using Intrusion and File Policies
Tuning File and Malware Inspection Performance and Storage
Step 4 Click the edit icon ( ) next to Performance Settings, then select the Performance Statistics tab in the pop-up window
that appears.
Step 5 Modify the Sample time or Minimum number of packets as described above.
Step 6 Optionally, expand the Troubleshoot Options section and modify those options only if asked to do so by Support.
Step 7 Click OK.
You must save and apply the access control policy for your changes to take effect; see Deploying Configuration Changes,
on page 73.
Table 30: Advanced Access Control File and Malware Detection Options
Limit the number of Specify the number of bytes inspected 1460 bytes, or 0 - Set to 0 to remove the
bytes inspected when when performing file type detection. the maximum 4294967295 restriction.
doing file type segment size of (4GB)
In most cases, the system can
detection a TCP packet
identify common file types
using the first packet.
Do not calculate Prevent the system from storing files 10485760 0- Set to 0 to remove the
SHA-256 hash values larger than a certain size, performing a (10MB) 4294967295 restriction.
for files larger than (in Collective Security Intelligence Cloud (4GB)
bytes) lookup on the files, or blocking the files
if added to the custom detection list.
Allow file if cloud Specify how long the system will hold 2 seconds 0 - 30 Although this option accepts
lookup for Block the last byte of a file that matches a seconds values of up to 30 seconds,
Malware takes longer Block Malware rule and that does not Cisco recommends that you use
than (seconds) have a cached disposition, while the default value to avoid
malware cloud lookup occurs. If the time blocking traffic because of
elapses without the system obtaining a connection failures. Do not set
disposition, the file passes. Dispositions this option to 0 without
of Unavailable are not cached. contacting Support.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
152
Controlling Traffic Using Intrusion and File Policies
Tuning File and Malware Inspection Performance and Storage
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon ( ) next to the access control policy you want to edit.
The access control policy editor appears.
Step 4 Click the edit icon ( ) next to Files and Malware Settings.
The Files and Malware Settings pop-up window appears.
Step 5 You can set any of the options in the Advanced Access Control File and Malware Detection Options table.
Step 6 Click OK.
You must save and apply the access control policy for your changes to take effect; see Deploying Configuration Changes,
on page 73
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
153
Controlling Traffic Using Intrusion and File Policies
Tuning File and Malware Inspection Performance and Storage
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
154
CHAPTER 12
Intelligent Application Bypass (IAB)
Intelligent Application Bypass (IAB) identifies applications that you trust to traverse your network without
further inspection if performance and flow thresholds are exceeded. For example, if a nightly backup
significantly impacts system performance, you can configure thresholds that, if exceeded, trust traffic generated
by your backup application. Optionally, you can configure IAB so that, when an inspection performance
threshold is exceeded, IAB trusts all traffic that exceeds any flow bypass threshold, regardless of the application
type.
The system implements IAB on traffic allowed by access control rules or the access control policy's default
action, before the traffic is subject to deep inspection. A test mode allows you to determine whether thresholds
are exceeded and, if so, to identify the application flows that would have been bypassed if you enable IAB
bypass mode.
The following figure shows the IAB decision-making process.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
155
Intelligent Application Bypass (IAB)
IAB Options
IAB Options
State
Enables or disables IAB.
Note Inspection performance and flow bypass thresholds are disabled by default. You must enable at least one of
each, and one of each must be exceeded for IAB to trust traffic. If you enable more than one inspection
performance or flow bypass threshold, only one of each must be exceeded for IAB to trust traffic.
Drop Percentage
Average packets dropped as a percentage of total packets, when packets are dropped because of performance
overloads caused by expensive intrusion rules, file policies, decompression, and so on. This does not refer to
packets dropped by normal configurations such as intrusion rules. Note that specifying an integer greater than
1 activates IAB when the specified percentage of packets is dropped. When you specify 1, any percentage
from 0 through 1 activates IAB. This allows a small number of packets to activate IAB.
Processor Utilization Percentage
Average percentage of processor resources used.
Package Latency
Average packet latency in microseconds.
Flow Rate
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
156
Intelligent Application Bypass (IAB)
Configuring IAB
The rate at which the system processes flows, measured as the number of flows per second. Note that this
option configures IAB to measure flow rate , not flow count .
Note Inspection performance and flow bypass thresholds are disabled by default. You must enable at least one of
each, and one of each must be exceeded for IAB to trust traffic. If you enable more than one inspection
performance or flow bypass threshold, only one of each must be exceeded for IAB to trust traffic.
Configuring IAB
Caution Not all deployments require IAB, and those that do might use it in a limited fashion. Do not enable IAB unless
you have expert knowledge of your network traffic, especially application traffic, and system performance,
including the causes of predictable performance issues. Before you run IAB in bypass mode, make sure that
trusting the specified traffic does not expose you to risk.
To identify applications that you trust to traverse your network when thresholds are exceeded:
Step 1 In the access control policy editor, click the Advanced tab, then click the edit icon next to Intelligent Application
Bypass Settings.
If a view icon appears instead, settings are inherited from an ancestor policy, or you do not have permission to modify
the settings. If the configuration is unlocked, uncheck Inherit from base policy to enable editing.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
157
Intelligent Application Bypass (IAB)
IAB Logging and Analysis
• Inspection Performance Thresholds—Click Configure and enter at least one threshold value.
• Flow Bypass Thresholds—Click Configure and enter at least one threshold value.
You must specify at least one inspection performance threshold and one flow bypass threshold; both must be exceeded
for IAB to trust traffic. If you enter more than one threshold of each type, only one of each type must be exceeded. For
detailed information, see IAB Options, on page 156.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
158
Intelligent Application Bypass (IAB)
IAB Logging and Analysis
In the following truncated graphic, some fields are omitted. The graphic shows the Action, Reason, and
Application Protocol fields for two connection events resulting from different IAB settings in two separate
access control policies.
For the first event, the Trust action indicates that IAB was enabled in bypass mode and Bonjour protocol
traffic was trusted to pass without further inspection.
For the second event, the Allow action indicates that IAB was enabled in test mode, so Ubuntu Update Manager
traffic was subject to further inspection but would have been bypassed if IAB had been in bypass mode.
Example
In the following truncated graphic, some fields are omitted. The flow in the second event was both bypassed
(Action: Trust ; Reason: Intelligent App Bypass ) and inspected by an intrusion rule (Reason: Intrusion
Monitor ). The Intrusion Monitor reason indicates that an intrusion rule set to Generate Events detected but
did not block an exploit during the connection. In the example, this happened before the application was
detected. After the application was detected, IAB recognized the application as bypassable and trusted the
flow.
• Filter: any
Examples
In the following Custom Analysis dashboard widget examples:
• The Bypassed example shows statistics for application traffic bypassed because the applications were
specified as bypassable and IAB was enabled in bypass mode in the deployed access control policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
159
Intelligent Application Bypass (IAB)
IAB Logging and Analysis
• The Would Have Bypassed example shows statistics for application traffic that would have been bypassed
because the applications were specified as bypassable and IAB was enabled in test mode in the deployed
access control policy.
Examples
The following graphic shows two abbreviated report examples:
• The Bypassed example shows statistics for application traffic bypassed because the applications were
specified as bypassable and IAB was enabled in bypass mode in the deployed access control policy. The
Would Have Bypassed example shows statistics for application traffic that would have been bypassed
because the applications were specified as bypassable and IAB was enabled in test mode in the deployed
access control policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
160
Intelligent Application Bypass (IAB)
IAB Logging and Analysis
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
161
Intelligent Application Bypass (IAB)
IAB Logging and Analysis
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
162
CHAPTER 13
Access Control Using Content Restriction
Major search engines and content delivery services provide features that allow you to restrict search results
and website content. For example, schools use content restriction features to comply with the Children's
Internet Protection Act (CIPA).
When implemented by search engines and content delivery services, you can enforce content restriction
features only for individual browsers or users. The Firepower System allows you to extend these features to
your entire network.
The system allows you to enforce:
• Safe Search—Supported in many major search engines, this service filters out explicit and adult-oriented
content that particular environments (business, government, education, etc.) classify as objectionable.
The system does not restrict a user's ability to access the home pages for supported search engines. Note
that YouTube Restricted Mode is a subfeature of Safe Search.
• YouTube EDU—This service filters YouTube content for an educational environment. It allows schools
to set access for educational content while limiting access to noneducational content. YouTube EDU is
a different feature than YouTube Restricted Mode, which enforces restrictions on YouTube searches as
part of Google's Safe Search feature. With YouTube EDU, users access the YouTube EDU home page,
rather than the standard YouTube home page.
Content restriction features communicate the restricted status of a search or content query via an element in
the request URI, an associated cookie, or a custom HTTP header element. You can configure access control
rules to modify these elements as the system processes traffic.
Note that, to enforce content restriction, you must also enable an SSL policy, which impacts performance.
If you enable logging of connection events for these access control rules, the system logs related events with
a Reason of Content Restriction.
• Safe Search Options for Access Control Rules, on page 164
• Using Access Control Rule to Enforce Content Restriction, on page 164
• YouTube EDU Options for Access Control Rules, on page 165
• Content Restriction Rule Order, on page 166
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
163
Access Control Using Content Restriction
Safe Search Options for Access Control Rules
Caution To avoid rule preemption, position rules governing YouTube EDU above rules governing Safe Search in both
SSL and access control policies. For more information, see Content Restriction Rule Order, on page 166.
Step 1 Create an SSL policy; see Creating a Basic SSL Policy, on page 184.
Step 2 Add SSL rules for handling Safe Search and YouTube EDU traffic:
• Choose Decrypt - Resign as the Action for the rules. The system does not allow any other action for content
restriction handling.
• In the Applications tab, add selections to the Selected Applications and Filters list:
• Safe Search—Add the safesearch supported filter.
• YouTube EDU—Search for "YouTube" in the Available Applications list, and add the resulting applications.
For more information, see Controlling Encrypted Traffic Based on Application, on page 224.
Step 3 Set rule positions for the SSL rules you added. Click and drag, or use the right-click menu to cut and paste.
Step 4 Create or edit an access control policy, and associate the SSL policy with the access control policy; see Associating Other
Policies with Access Control, on page 71.
Step 5 In the access control policy, add rules for handling Safe Search and YouTube EDU traffic, placing the Safe Search rule
after the YouTube EDU rule:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
164
Access Control Using Content Restriction
YouTube EDU Options for Access Control Rules
• Choose Allow as the Action for the rules. The system does not allow any other action for content restriction handling.
• In the Applications tab, click the dimmed icon for either Safe Search or YouTube EDU , and set related options.
These icons are disabled, rather than dimmed, if you choose any Action other than Allow for the rule.
Note You cannot enable Safe Search and YouTube EDU restrictions for the same access control rule.
• In the Applications tab, refine application selections in the Selected Applications and Filters list.
In most cases, enabling Safe Search or YouTube EDU populates the Selected Applications and Filters list with the
appropriate values. The system does not automatically populate the list if a Safe Search or YouTube application is already
present in the list when you enable the feature. If applications do not populate as expected, manually add them as follows:
• Safe Search—Add the search engines filter.
• YouTube EDU—Search for "YouTube" in the Available Applications list, and add the resulting applications.
For more information, see Adding an Application Condition to an Access Control Rule, on page 117.
Step 6 Set rule positions for the access control rules you added. Click and drag, or use the right-click menu to cut and paste.
Step 7 Configure the Block Response Page that the system displays when it blocks restricted content; see Displaying a Custom
Web Page for Blocked URLs, on page 127.
What to do next
What to Do Next
Deploy configuration changes; see Deploying Configuration Changes, on page 73.
Custom ID
Specifies the value that uniquely identifies a school or district network in the YouTube EDU initiative. YouTube
provides this ID when a school or district registers for a YouTube EDU account.
Note If you check Enable YouTube EDU, you must enter a Custom ID. This ID is defined externally by YouTube.
The system does not validate what you enter against the YouTube system. If you enter an invalid ID, YouTube
EDU restrictions may not perform as expected.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
165
Access Control Using Content Restriction
Content Restriction Rule Order
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
166
CHAPTER 14
Understanding Traffic Decryption
By default, the ASA FirePOWER module cannot inspect traffic encrypted with the Secure Socket Layer (SSL)
protocol or its successor, the Transport Layer Security (TLS) protocol. As part of access control, the SSL
inspection feature allows you to either block encrypted traffic without inspecting it, or inspect encrypted or
decrypted traffic with access control. As the module handles encrypted sessions, it logs details about the
traffic. The combination of inspecting encrypted traffic and analyzing encrypted session data allows greater
awareness and control of the encrypted applications and traffic in your network.
• About Traffic Decryption, on page 167
• SSL Handshake Processing, on page 168
• SSL Inspection Requirements, on page 171
• Analyzing SSL Inspection Appliance Deployments, on page 173
If the module can decrypt the traffic, it blocks the traffic without further inspection, evaluates undecrypted
traffic with access control, or decrypts it using one of the following methods:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
167
Understanding Traffic Decryption
SSL Handshake Processing
• Decrypt with a known private key. When an external host initiates an SSL handshake with a server on
your network, the system matches the exchanged server certificate with a server certificate previously
uploaded to the appliance. It then uses the uploaded private key to decrypt the traffic.
• Decrypt by re-signing the server certificate. When a host on your network initiates an SSL handshake
with an external server, the system re-signs the exchanged server certificate with a previously uploaded
certificate authority (CA) certificate. It then uses the uploaded private key to decrypt the traffic.
Decrypted traffic is subject to the same traffic handling and analysis as originally unencrypted traffic: network,
reputation, and user-based access control; intrusion detection and prevention; and advanced malware protection.
If the system does not block the decrypted traffic post-analysis, it reencrypts the traffic before passing it to
the destination host.
Note Certain SSL inspection actions, such as blocking traffic and decrypting outgoing traffic, modify the flow of
traffic. ASA FirePOWER modules deployed inline can perform these actions. ASA FirePOWER modules
deployed passively cannot affect the flow of traffic. However, these devices can still decrypt incoming traffic;
see Example: Decrypting Traffic in a Passive Deployment, on page 174 for more information.
Although the data transmitted in the session is encrypted, the handshake messages are not.
After an SSL handshake completes, the managed device caches encrypted session data, which allows session
resumption without requiring the full handshake. The managed device also caches server certificate data,
which allows faster handshake processing in subsequent sessions.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
168
Understanding Traffic Decryption
ClientHello Message Handling
If you configure SSL inspection, when a managed device receives a ClientHello message, the system attempts
to match the message to SSL rules that have the Decrypt - Resign action. The match relies on data from the
ClientHello message and from cached server certificate data. Possible data includes:
Data Availability for SSL Rule Conditions
Zones ClientHello
Networks ClientHello
Ports ClientHello
Users ClientHello
Versions ServerHello
If the ClientHello message does not match a Decrypt - Resign rule, the system does not modify the message.
It then determines whether the message passes access control evaluation (which can include deep inspection).
If the message passes, the system transmits it to the destination server.
If the message matches a Decrypt - Resign rule, the system modifies the ClientHello message as follows:
• Compression methods—Strips the compression_methods element, which specifies the compression
methods the client supports. The Firepower System cannot decrypt compressed sessions. This modification
reduces the Compressed Session type of undecryptable traffic.
• Cipher suites—Strips cipher suites from the cipher_suites element if the Firepower System does not
support them. If the Firepower System does not support any of the specified cipher suites, the system
transmits the original, unmodified element. This modification reduces the Unknown Cipher Suite and
Unsupported Cipher Suite types of undecryptable traffic.
• Session identifiers—Strips any value from the Session Identifier element and the SessionTicket extension
that does not match cached session data. If a ClientHello value matches cached data, an interrupted
session can resume without the client and server performing the full SSL handshake. This modification
increases the chances of session resumption and reduces the Session Not Cached type of undecryptable
traffic.
• Elliptic curves—Strips elliptic curves from the Supported Elliptic Curves extension if the Firepower
System does not support them. If the Firepower System does not support any of the specified elliptic
curves, the managed device removes the extension and strips any related cipher suites from the
cipher_suites element.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
169
Understanding Traffic Decryption
ServerHello and Server Certificate Message Handling
• ALPN extensions—Strips any value from the Application-Layer Protocol Negotiation (ALPN) extension
that is unsupported in the Firepower System (for example, the SPDY and HTTP/2 protocols). This
modification only occurs if the message matches an SSL rule associated with content restriction features.
For more information, see Access Control Using Content Restriction, on page 163.
• Other Extensions—Strips the Extended Master Secret, Next Protocol Negotiation (NPN), and TLS
Channel IDs extensions.
Note The system performs these ClientHello modifications by default. If your SSL policy is configured correctly,
this default behavior results in more frequent decryption of traffic. To tune the default behavior for your
individual network, contact Support.
After the system modifies the ClientHello message, it determines whether the message passes access control
evaluation (which can include deep inspection). If the message passes, the system transmits it to the destination
server.
Direct communication between the client and server is no longer possible during the SSL handshake, because
after message modification the Message Authentication Codes (MACs) computed by the client and server no
longer match. For all subsequent handshake messages (and for the encrypted session once established), the
managed device acts as a man-in-the-middle (MITM). It creates two SSL sessions, one between client and
managed device, one between managed device and server. As a result, each session contains different
cryptographic session details.
Note The cipher suites that the Firepower System can decrypt are frequently updated and do not correspond directly
to the cipher suites you can use in SSL rule conditions. For the current list of decryptable cipher suites, contact
Support.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
170
Understanding Traffic Decryption
SSL Inspection Requirements
Action: Monitor
The SSL handshake continues to completion. The managed device tracks and logs but does not decrypt
encrypted traffic.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
171
Understanding Traffic Decryption
Deploying ASA FirePOWER Modules that Support SSL Inspection
handles encrypted traffic on the basis of zone, network, port, or SSL-related criteria Any
filters encrypted traffic using URL category and reputation data URL
Filtering
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
172
Understanding Traffic Decryption
Analyzing SSL Inspection Appliance Deployments
For more information, see Tuning Traffic Decryption Using SSL Rules, on page 217.
Decide whether you want to not decrypt, block, monitor, or decrypt the encrypted traffic you match your rules
against. Map these decisions to SSL rule actions, undecryptable traffic actions, and the SSL policy default
action. If you want to decrypt traffic, see the following table:
To decrypt... Collect...
incoming traffic to a server you control the server’s certificate file and paired private key file
outgoing traffic to an external server a CA certificate file and paired private key file
You can also generate a CA certificate and private key.
For more information, see Using Rule Actions to Determine Encrypted Traffic Handling and Inspection, on
page 204.
After you have collected this information, upload it to the system and configure reusable objects. See Managing
Reusable Objects, on page 17 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
173
Understanding Traffic Decryption
Example: Decrypting Traffic in a Passive Deployment
LifeIns also receives encrypted applications online. The Customer Service department processes the applications
within 24 hours before sending the case file to the Underwriting department. Customer Service filters out any
obvious false applications sent through the online form, which consumes a fair portion of their time.
The user also configures access control to inspect the decrypted application form traffic for fake application
data and log when fake data is detected.
In the following scenarios, the user submits an online form to Customer Service. The user’s browser establishes
a TCP connection with the server, then initiates an SSL handshake. The ASA FirePOWER module receives
a copy of this traffic. The client and server complete the SSL handshake, establishing the encrypted session.
Based on handshake and connection details, the system logs the connection and acts upon the copy of the
encrypted traffic.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
174
Understanding Traffic Decryption
Monitoring Encrypted Traffic in a Passive Deployment
The access control policy continues to process the encrypted traffic and allows it. The module generates a
connection event after the session ends.
1. The ASA FirePOWER module receives the connection event.
The access control policy continues to process the encrypted traffic and allows it. The module generates a
connection event after the session ends.
1. The ASA FirePOWER module receives the connection event.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
175
Understanding Traffic Decryption
Example: Decrypting Traffic in an Inline Deployment
Note In a passive deployment, if traffic is encrypted with either the DHE or ECDHE cipher suite, you cannot decrypt
it with a known private key.
For traffic with legitimate application form information, the system logs the connection.
The access control policy continues to process the decrypted traffic and does not find fake application
information. The module generates a connection event after the session ends.
1. The ASA FirePOWER module receives a connection event with information about the encrypted and
decrypted traffic.
In contrast, if the decrypted traffic contains fake application data, the system logs the connection and the fake
data.
The access control policy continues to process the decrypted traffic and finds fake application information.
The module generates an intrusion event. After the session ends, it generates a connection event.
1. The ASA FirePOWER module receives a connection event with information about the encrypted and
decrypted traffic, and an intrusion event for the fake application data.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
176
Understanding Traffic Decryption
Monitoring Encrypted Traffic in an Inline Deployment
LifeIns plans to deploy a device in an inline deployment for the Underwriting department.
Traffic from MedRepo’s network goes to MedRepo’s router. It routes traffic to LifeIns’s network. The device
receives the traffic, passes allowed traffic to LifeIns’s router, and sends events to the ASA FirePOWER
module. LifeIns’s router routes traffic to the destination host.
On the ASA FirePOWER module, a user configures SSL inspection to:
• log all encrypted traffic sent to the Underwriting department
• block all encrypted traffic incorrectly sent from LifeIns’s underwriting department to MedRepo’s customer
service department
• decrypt all encrypted traffic sent from MedRepo to LifeIns’s underwriting department, and from LifeIns’s
junior underwriters to MedRepo’s requests department
• not decrypt encrypted traffic sent from the senior underwriters
The user also configures access control to inspect decrypted traffic with a custom intrusion policy and:
• block decrypted traffic if it contains a spoof attempt, and log the spoof attempt
• block decrypted traffic that contains information not compliant with regulations, and log the improper
information
• allow all other encrypted and decrypted traffic
The system reencrypts allowed decrypted traffic before sending it to the destination host.
In the following scenarios, the user submits information online to a remote server. The user’s browser establishes
a TCP connection with the server, then initiates an SSL handshake. The module receives this traffic; based
on handshake and connection details, the system logs the connection and acts on the traffic. If the system
blocks the traffic, it also closes the TCP connection. Otherwise, the client and server complete the SSL
handshake, establishing the encrypted session.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
177
Understanding Traffic Decryption
Allowing Specific Users’ Encrypted Traffic in an Inline Deployment
2. LifeIns's router receives the encrypted traffic and routes it to the Requests department server.
3. The ASA FirePOWER module does not decrypt the traffic.
The access control policy continues to process the encrypted traffic and allows it, then generates a connection
event after the session ends.
1. The external router receives the traffic and routes it to the Requests department server.
2. The Underwriting department server receives the encrypted information request ( AaBb ) and decrypts it
to plain text ( help ).
3. The ASA FirePOWER module receives the connection event.
The access control policy continues to process the encrypted traffic and allows it, then generates a connection
event after the session ends.
1. The external router receives the traffic and routes it to the Requests department server.
2. The Requests department server receives the encrypted information request ( AaBb ) and decrypts it to
plain text ( help )
.
3. The ASA FirePOWER module receives the connection event.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
178
Understanding Traffic Decryption
Inspecting Encrypted Traffic with a Private Key in an Inline Deployment
3. The ASA FirePOWER module blocks the traffic without further inspection and ends the TCP connection.
It generates a connection event.
4. The internal router does not receive the blocked traffic.
5. The underwriter does not receive the blocked traffic.
6. The ASA FirePOWER module receives the connection event.
The access control policy continues to process the decrypted traffic with the custom intrusion policy and does
not find a spoof attempt. The device passes the encrypted traffic ( AaBbC ), then generates a connection event
after the session ends.
1. The internal router receives the traffic and routes it to the Underwriting department server.
2. The Underwriting department server receives the encrypted information ( AaBbC ) and decrypts it to plain
text ( stats ).
3. The ASA FirePOWER module receives the connection event with information about the encrypted and
decrypted traffic.
In contrast, any decrypted traffic that is a spoof attempt is dropped. The system logs the connection and the
spoof attempt.
The access control policy continues to process the decrypted traffic with the custom intrusion policy and finds
a spoof attempt. The ASA FirePOWER module blocks the traffic, then generates an intrusion event. It generates
a connection event after the session ends.
1. The internal router does not receive the blocked traffic.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
179
Understanding Traffic Decryption
Inspecting Specific Users’ Encrypted Traffic with a Re-signed Certificate in an Inline Deployment
2. The Underwriting department server does not receive the blocked traffic.
3. The ASA FirePOWER module receives a connection event with information about the encrypted and
decrypted traffic, and an intrusion event for the spoofing attempt.
Inspecting Specific Users’ Encrypted Traffic with a Re-signed Certificate in an Inline Deployment
License: Control
For all SSL-encrypted traffic sent from the new and junior underwriters to MedRepo’s requests department,
the system uses a re-signed server certificate to obtain session keys, then decrypts the traffic and logs the
connection. Legitimate traffic is allowed and reencrypted before being sent to MedRepo.
Note When decrypting traffic in an inline deployment by re-signing the server certificate, the ASA FirePOWER
module acts as a man-in-the-middle. It creates two SSL sessions, one between client and ASA FirePOWER
module, one between ASA FirePOWER module and server. As a result, each session contains different
cryptographic session details.
The access control policy continues to process the decrypted traffic with the custom intrusion policy and does
not find an improper request. The module reencrypts the traffic ( CcDd ), allowing it to pass. It generates a
connection event after the session ends.
1. The external router receives the traffic and routes it to the Requests department server.
2. The Requests department server receives the encrypted information ( CcDd ) and decrypts it to plain text
( help ).
3. The ASA FirePOWER module receives the connection event with information about the encrypted and
decrypted traffic.
Note Traffic encrypted with a re-signed server certificate causes client browsers to warn that the certificate is not
trusted. To avoid this, add the CA certificate to the organization’s domain root trusted certificates store or the
client trusted certificates store.
In contrast, any decrypted traffic that contains information that does not meet regulatory requirements is
dropped. The system logs the connection and the non-conforming information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
180
Understanding Traffic Decryption
Inspecting Specific Users’ Encrypted Traffic with a Re-signed Certificate in an Inline Deployment
The access control policy continues to process the decrypted traffic with the custom intrusion policy and finds
an improper request. The module blocks the traffic, then generates an intrusion event. It generates a connection
event after the session ends.
1. The external router does not receive the blocked traffic.
2. The Requests department server does not receive the blocked traffic.
3. The ASA FirePOWER module receives a connection event with information about the encrypted and
decrypted traffic, and an intrusion event for the improper request.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
181
Understanding Traffic Decryption
Inspecting Specific Users’ Encrypted Traffic with a Re-signed Certificate in an Inline Deployment
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
182
CHAPTER 15
Getting Started with SSL Policies
This chapter explains how to create and apply a simple SSL policy. It also contains basic information on
managing SSL policies: editing, updating, comparing, and so on.
• About SSL Policies, on page 183
• Creating a Basic SSL Policy, on page 184
• Editing an SSL Policy, on page 188
• Applying Decryption Settings Using Access Control, on page 190
• Generating a Report of Current Traffic Decryption Settings, on page 191
• Comparing SSL Policies, on page 192
control.
A more complex SSL policy can handle different types of undecryptable traffic with different actions, control
traffic based on whether a certificate authority (CA) issued or trusts the encryption certificate, and use SSL
rules to exert granular control over encrypted traffic logging and handling. These rules can be simple or
complex, matching and inspecting encrypted traffic using multiple criteria. After you create a basic SSL
policy, see the following chapters for more information on tailoring it to your deployment:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
183
Getting Started with SSL Policies
Creating a Basic SSL Policy
• Managing Reusable Objects, on page 17 describes how to configure reusable public key infrastructure
(PKI) objects and other SSL inspection-related objects to enhance encrypted traffic control and decrypt
traffic.
• Logging Connections in Network Traffic, on page 383 describes how to configure logging for encrypted
traffic, whether decryptable or undecryptable.
• Applying Decryption Settings Using Access Control, on page 190 describes how to associate an SSL
policy with an access control policy.
• Getting Started with Access Control Policies, on page 63 describes how to apply an access control policy
to a device.
• Tuning Traffic Flow Using Access Control Rules, on page 89 describes how to configure access control
rules to inspect decrypted traffic.
• Getting Started with SSL Rules, on page 197 describes how to configure SSL rules to handle and log
encrypted traffic.
• Tuning Traffic Decryption Using SSL Rules, on page 217 describes how to configure SSL rule conditions
to better match specific encrypted traffic.
After you create the SSL policy, you can modify the default action. For guidance on choosing a default action,
see Setting Default Handling and Inspection for Encrypted Traffic, on page 185.
The new SSL policy also contains default actions for traffic the system cannot decrypt: either it inherits the
default action you just selected for undecryptable traffic, blocks it, or does not decrypt the traffic and inspects
it with access control. You can modify the undecryptable traffic actions after you create the SSL policy. For
guidance on selecting undecryptable traffic actions, see Setting Default Handling for Undecryptable Traffic,
on page 186
On the SSL policy page (Configuration > ASA FirePOWER Configuration > Policies > SSL) you can
view all your current SSL policies by name with optional description. Options on this page allow you to
compare policies, create a new policy, copy a policy, view a report that lists all of the most recently saved
settings in each policy, edit a policy, or delete a policy.
The following table describes the actions you can take to manage your policies on the SSL Policy page:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
184
Getting Started with SSL Policies
Setting Default Handling and Inspection for Encrypted Traffic
create a new SSL policy click New Policy. See Creating a Basic SSL Policy, on page 184 for more
information.
modify the settings in an existing SSL policy click the edit icon ( ). See Editing an SSL Policy, on page 188 for more information.
compare SSL policies click Compare Policies. See Comparing SSL Policies, on page 192 for more
information.
copy an SSL policy click the copy icon ( ). See Editing an SSL Policy, on page 188 for more
information on editing a copied policy.
view a PDF report that lists the current click the report icon ( ) . See Generating a Report of Current Traffic Decryption
configuration settings in an SSL policy Settings, on page 191 for more information.
delete an SSL policy click the delete icon ( ), then click OK. When prompted whether to continue, you
are also informed if another user has unsaved changes in the policy.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > SSL.
The SSL Policy page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
185
Getting Started with SSL Policies
Setting Default Handling for Undecryptable Traffic
The following table lists the default actions you can choose, as well as their effect on encrypted traffic. Note
that the system does not perform any kind of inspection on encrypted traffic blocked by the default action.
:
Block with reset block the SSL session without further inspection and reset the TCP connection
When you first create an SSL policy, logging connections that are handled by the default action is disabled
by default. You can change this, as well as the default action itself, after you create the policy.
The following procedure explains how to set the default action for an SSL policy while editing the policy.
See Editing an SSL Policy, on page 188 for the complete procedure for editing an SSL policy.
To set the default action of an SSL policy:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > SSL.
The SSL policy page appears.
Step 2 Click the edit icon next to the SSL policy you want to configure.
The SSL policy editor appears.
Step 3 Select a Default Action. See the Setting Default Handling and Inspection for Encrypted Traffic, on page 185 table for
more information.
Step 4 Configure logging options for the default action as described in Setting Default Logging for Encrypted and Undecryptable
Connections, on page 397.
Step 5 Click Store ASA FirePOWER Changes.
The SSL Policy Editor page appears. See Editing an SSL Policy, on page 188 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
186
Getting Started with SSL Policies
Setting Default Handling for Undecryptable Traffic
Compressed Session The SSL session applies a data Inherit default action Do not decrypt
compression method.
Block
Block with reset
Inherit default action
SSLv2 Session The session is encrypted with Inherit default action Do not decrypt
SSL version 2.
Block
Note that traffic is decryptable
Block with reset
if the client hello message is
SSL 2.0, and the remainder of Inherit default action
the transmitted traffic is SSL
3.0.
Unknown Cipher Suite The system does not recognize Inherit default action Do not decrypt
the cipher suite.
Block
Block with reset
Inherit default action
Unsupported Cipher Suite The system does not support Inherit default action Do not decrypt
decryption based on the detected
Block
cipher suite.
Block with reset
Inherit default action
Session not cached The SSL session has session Inherit default action Do not decrypt
reuse enabled, the client and
Block
server reestablished the session
with the session identifier, and Block with reset
the system did not cache that
Inherit default action
session identifier.
Handshake Errors An error occurred during SSL Inherit default action Do not decrypt
handshake negotiation.
Block
Block with reset
Inherit default action
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
187
Getting Started with SSL Policies
Editing an SSL Policy
When you first create an SSL policy, logging connections that are handled by the default action is disabled
by default. Because the logging settings for the default action also apply to undecryptable traffic handling,
logging connections handled by the undecryptable traffic actions is disabled by default. For more information
on configuring default logging, see Logging Decryptable Connections with SSL Rules, on page 396.
Note The system cannot decrypt traffic if an HTTP proxy is positioned between a client and your device, and the
client and server establish a tunneled SSL connection using the CONNECT HTTP method. The Handshake
Errors undecryptable action determines how the system handles this traffic. See Decrypt Actions: Decrypting
Traffic for Further Inspection, on page 208 for more information.
Note that if your browser uses certificate pinning to verify a server certificate, you cannot decrypt this traffic
by re-signing the server certificate. Because you can still inspect this traffic with access control, it is not
handled by the undecryptable traffic actions. If you want to allow this traffic, configure an SSL rule with the
Do not decrypt action to match the server certificate common name or distinguished name.
To set the default handling for undecryptable traffic:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > SSL.
The SSL Policy page appears.
Step 2 Click the edit icon ( ) next to the SSL policy you want to configure.
The SSL policy editor appears.
Step 4 For each field, select the action you want to take on the type of undecryptable traffic, or if you want to apply the SSL
policy’s default action. See the Table 35: SSL Policy Default Actions , on page 186 table for more information.
Step 5 Click Store ASA FirePOWER Changes.
You must apply the associated access control policy for your changes to take effect; see Deploying Configuration Changes,
on page 73.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
188
Getting Started with SSL Policies
Editing an SSL Policy
After you create or modify an SSL policy, you can associate it with an access control policy, then apply the
access control policy. You can also create custom user roles that allow you to assign different permissions to
different users for configuring, organizing, and applying policies.
The following table summarizes the configuration actions you can take on the SSL policy editor.
modify the policy name or description click the name or description field, delete any characters as needed, then type the new
name or description.
set the default action find more information at Setting Default Handling and Inspection for Encrypted
Traffic, on page 185.
set default handling for undecryptable traffic find more information at Setting Default Handling for Undecryptable Traffic, on page
186.
log connections for the default action and find more information at Logging Decryptable Connections with SSL Rules, on page
undecryptable traffic actions 396.
add trusted CA certificates find more information at Trusting External Certificate Authorities, on page 236.
assign different rights to different users find more information at Collecting Prerequisite Information to Configure SSL Rules,
on page 172.
cancel your policy changes click Cancel, then, if you have made changes, click OK.
add a rule to a policy click Add Rule . See Understanding and Creating SSL Rules, on page 200 for more
information.
Tip You can also right-click a blank area in the row for a rule and select Insert
new rule.
edit an existing rule click the edit icon ( ) next to the rule. See Understanding and Creating SSL Rules,
on page 200; for more information.
Tip You can also right-click the rule and select Edit.
delete a rule click the delete icon ( ) next to the rule, then click OK.
Tip You can also right-click a blank area in the row for a selected rule, select
Delete, then click OK to delete one or more selected rules.
enable or disable an existing rule right-click a selected rule, select State, then select Disable or Enable. Disabled rules
are grayed and marked (disabled) beneath the rule name.
display the configuration page for a specific click the name, value, or icon in the column for the condition on the row for the rule.
rule attribute For example, click the name or value in the Source Networks column to display the
Networks page for the selected rule. See Tuning Traffic Decryption Using SSL Rules,
on page 217 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
189
Getting Started with SSL Policies
Applying Decryption Settings Using Access Control
When you change your configuration, a message indicates that you have unsaved changes. To retain your
changes, you must save the policy before exiting the policy editor. If you attempt to exit the policy editor
without saving your changes, you are cautioned that you have unsaved changes; you can then discard your
changes and exit the policy, or return to the policy editor.
To protect the privacy of your session, after sixty minutes of inactivity on the policy editor, changes to your
policy are discarded and you are returned to the SSL Policy page. After the first thirty minutes of inactivity,
a message appears and updates periodically to provide the number of minutes remaining before changes are
discarded. Any activity on the page cancels the timer.
When multiple users edit the same policy concurrently, a message on the policy editor identifies other users
who have unsaved changes. Any user who attempts to save changes is cautioned that his changes will overwrite
changes by other users. When the same policy is saved by multiple users, the last saved changes are retained.
To edit an SSL policy:
Step 3 Save or discard your configuration. You have the following choices:
• To save your changes and continue editing, click Store ASA FirePOWER Changes.
• To discard your changes, click Cancel and, if prompted, click OK.
Your changes are discarded and the SSL Policy page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
190
Getting Started with SSL Policies
Generating a Report of Current Traffic Decryption Settings
Note In a passive deployment, the system cannot influence the flow of traffic. If you attempt to apply an access
control policy that references an SSL policy that blocks encrypted traffic, or that is configured to decrypt
traffic by re-signing the server certificate, the system displays a warning. Also, passive deployments do not
support decrypting traffic encrypted with the ephemeral Diffie-Hellman (DHE) or the elliptic curve
Diffie-Hellman (ECDHE) cipher suites.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon ( ) next to the access control policy you want to configure.
The access control policy editor appears.
Step 5 Select an SSL policy from the SSL Policy to use for inspecting encrypted connections drop-down.
Step 6 Click OK.
Advanced settings for the access control policy appear.
Tip You can also generate an SSL comparison report that compares a policy with the currently applied policy or
with another policy. For more information, see Comparing SSL Policies, on page 192.
An SSL policy report contains the sections described in the following table.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
191
Getting Started with SSL Policies
Comparing SSL Policies
Section Description
Title Page Identifies the name of the policy report, the date and
time the policy was last modified, and the name of
the user who made that modification.
Policy Information Provides the name and description of the policy, the
name of the user who last modified the policy, and
the date and time the policy was last modified.
Rules Provides the rule action and conditions for each rule
in the policy, by rule category.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > SSL.
The SSL Policy page appears.
Step 2 Click the report icon ( ) next to the policy for which you want to generate a report. Remember to save any changes
before you generate an SSL policy report; only saved changes appear in the report.
The system generates the report. Depending on your browser settings, the report may appear in a pop-up window, or you
may be prompted to save the report to your computer.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
192
Getting Started with SSL Policies
Using the SSL Policy Comparison View
To review policy changes for compliance with your organization’s standards or to optimize system performance,
you can examine the differences between two SSL policies. You can compare any two policies or the currently
applied policy with another policy. Optionally, after you compare, you can then generate a PDF report to
record the differences between the two policies.
There are two tools you can use to compare policies:
• The comparison view displays only the differences between two policies in a side-by-side format. The
name of each policy appears in the title bar on the left and right sides of the comparison view except
when you select Running Configuration, in which case a blank bar represents the currently active
policy.
You can use this to view and navigate both policies on the web interface, with their differences highlighted.
• The comparison report creates a record of only the differences between two policies in a format similar
to the policy report, but in PDF format.
You can use this to save, copy, print, and share your policy comparisons for further examination.
navigate individually through click Previous or Next above the title bar.
changes
The double-arrow icon centered between the left and right sides
moves, and the Difference number adjusts to identify which difference
you are viewing.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
193
Getting Started with SSL Policies
Using the SSL Policy Comparison Report
Tip You can use a similar procedure to compare access control, network analysis, intrusion, file, system, or health
policies.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > SSL.
The SSL Policy appears.
Step 3 From the Compare Against drop-down list, select the type of comparison you want to make:
• To compare two different policies, select Other Policy.
The page refreshes and the Policy A and Policy B drop-down lists appear.
• To compare another policy to the currently active policy, select Running Configuration.
The page refreshes and the Target/Running Configuration A and Policy B drop-down lists appear.
Step 4 Depending on the comparison type you selected, you have the following choices:
• If you are comparing two different policies, select the policies you want to compare from the Policy A and Policy
B drop-down lists.
• If you are comparing the running configuration to another policy, select the second policy from the Policy B drop-down
list.
Step 6 Optionally, click Comparison Report to generate the SSL policy comparison report.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
194
Getting Started with SSL Policies
Using the SSL Policy Comparison Report
The SSL policy comparison report appears. Depending on your browser settings, the report may appear in a pop-up
window, or you may be prompted to save the report to your computer.
What to do next
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
195
Getting Started with SSL Policies
Using the SSL Policy Comparison Report
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
196
CHAPTER 16
Getting Started with SSL Rules
Within an SSL policy, SSL rules provide a granular method of handling encrypted traffic, whether blocking
the traffic without further inspection, not decrypting the traffic and inspecting it with access control, or
decrypting the traffic for access control analysis.
• About SSL Rules, on page 197
• Configuring Supporting Inspection Information, on page 199
• Understanding and Creating SSL Rules, on page 200
• Managing SSL Rules in a Policy, on page 209
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
197
Getting Started with SSL Rules
About SSL Rules
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
198
Getting Started with SSL Rules
Configuring Supporting Inspection Information
unencrypted traffic identically. The module can block traffic as a result of this additional inspection. All
remaining traffic is reencrypted before being allowed to the destination. Traffic that does not match the
SSL rule continues to the next rule.
• SSL Policy Default Action handles all traffic that does not match any of the SSL rules. The default
action either blocks encrypted traffic without further inspection or does not decrypt it, passing it for
access control inspection.
a cipher suite list containing one or more the cipher suite used to negotiate the encrypted session matches
cipher suites a cipher suite in the cipher suite list
a trusted CA object by uploading a CA the trusted CA trusts the server certificate used to encrypt the
certificate your organization trusts session, whether:
• the CA issued the certificate directly
• the CA issued a certificate to an intermediate CA that
issued the server certificate
an external certificate object by uploading the server certificate used to encrypt the session matches the
a server certificate uploaded server certificate
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
199
Getting Started with SSL Rules
Understanding and Creating SSL Rules
a distinguished name object containing a the subject or issuer common name, country, organization, or
certificate subject or issuer distinguished organizational unit on the certificate used to encrypt the session
name matches the configured distinguished name
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
200
Getting Started with SSL Rules
Specifying an SSL Rules Order of Evaluation
Tip Properly creating and ordering SSL rules is a complex task, but one that is essential to building an effective
deployment. If you do not plan your policy carefully, rules can preempt other rules, require additional licenses,
or contain invalid configurations. To help ensure that the module handles traffic as you expect, the SSL policy
interface has a robust warning and error feedback system for rules. For more information, see Troubleshooting
SSL Rules, on page 212.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > SSL.
The SSL Policy page appears.
Step 2 Click the edit icon ( ) next to the SSL policy where you want to add a rule.
The SSL policy editor appears, focused on the Rules tab.
• To edit an existing rule, click the edit icon ( ) next to the rule you want to edit.
Step 5 Configure the rule components, as summarized above. You can configure the following, or accept the defaults:
• Specify whether the rule is Enabled.
• Specify the rule position; see Specifying an SSL Rules Order of Evaluation, on page 202
.
• Select a rule Action; see Using Rule Actions to Determine Encrypted Traffic Handling and Inspection, on page 204.
• Configure the rule’s conditions; see Using Conditions to Specify the Encrypted Traffic a Rule Handles, on page 202.
• Specify Logging options; see Logging Decryptable Connections with SSL Rules, on page 396.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
201
Getting Started with SSL Rules
Specifying an SSL Rules Order of Evaluation
When you first create an SSL rule, you specify its position using the Insert drop-down list in the rule editor.
SSL rules in an SSL policy are numbered, starting at 1. The ASA FirePOWER module matches traffic to SSL
rules in top-down order by ascending rule number.
In most cases, the module handles network traffic according to the first SSL rule where all the rule’s conditions
match the traffic. Except in the case of Monitor rules (which log traffic but do not affect traffic flow), the
module does not continue to evaluate traffic against additional, lower-priority rules after that traffic matches
a rule.
Tip Proper SSL rule order reduces the resources required to process network traffic, and prevents rule preemption.
Although the rules you create are unique to every organization and deployment, there are a few general
guidelines to follow when ordering rules that can optimize performance while still addressing your needs.
For more information, see Ordering SSL Rules to Improve Performance and Avoid Preemption, on page 213.
In addition to ordering rules by number, you can group rules by category. By default the module provides
three categories: Administrator, Standard, and Root. You can add custom categories, but you cannot delete
the ASA FirePOWER module-provided categories or change their order. For information on changing the
position or category of an existing rule, see Changing an SSL Rules Position or Category, on page 210.
To add a rule to a category while editing or creating a rule:
In the SSL rule editor, from the Insert drop-down list, select Into Category, then select the category you want to use.
When you save the rule, it is placed last in that category.
In the SSL rule editor, from the Insert drop-down list, select above rule or below rule, then type the appropriate rule
number.
When you save the rule, it is placed where you specified.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
202
Getting Started with SSL Rules
Using Conditions to Specify the Encrypted Traffic a Rule Handles
When you add or edit an SSL rule, use the tabs on the left side of the lower portion of the rule editor to add
and edit rule conditions. The conditions you can add to an SSL rule are described in the following table.
Zones entering or leaving a device via an A security zone is a logical grouping of one or more interfaces according
interface in a specific security zone to your deployment and security policies. To build a zone condition, see
Controlling Encrypted Traffic by Network Zone, on page 218.
Networks by its source or destination IP address, You can explicitly specify IP addresses. The geolocation feature also
country, or continent allows you to control traffic based on its source or destination country or
continent. To build a network condition, see Controlling Encrypted Traffic
by Network or Geographical Location, on page 219.
Ports by its source or destination port You can control encrypted traffic based on the TCP port. To build a port
condition, see Controlling Encrypted Traffic by Port, on page 221.
Users by the user involved in the session You can control encrypted traffic based on the LDAP user logged into a
host involved in an encrypted, monitored session. You can control traffic
based on individual users or groups retrieved from a Microsoft Active
Directory server. To build a user condition, see Controlling Encrypted
Traffic Based on User, on page 222.
Applications by the application detected in a session You can control access to individual applications in encrypted sessions,
or filter access according to basic characteristics: type, risk, business
relevance, and categories. To build an application condition, see
Controlling Encrypted Traffic Based on Application, on page 224.
Categories by the URL requested in the session, You can limit the websites that users on your network can access based
based on the certificate subject on the URL’s general classification and risk level. To build a URL
distinguished name condition, see Controlling Encrypted Traffic by URL Category and
Reputation, on page 229.
Distinguished by the subject or issuer distinguished You can control encrypted traffic based on the CA that issued a server
Names name of the server certificate used to certificate, or the server certificate holder. To build a distinguished name
negotiate the encrypted session condition, see Controlling Encrypted Traffic by Certificate Distinguished
Name, on page 232.
Certificates by the server certificate used to You can control encrypted traffic based on the server certificate passed
negotiate the encrypted session to the user’s browser in order to negotiate the encrypted session. To build
a certificate condition, see Controlling Encrypted Traffic by Certificate
Status, on page 235.
Certificate Status by properties of the server certificate You can control encrypted traffic based on a server certificate’s status.
used to negotiate the encrypted session To build a certificate status condition, see Controlling Encrypted Traffic
by Certificate Status, on page 235.
Cipher Suites by the cipher suite used to negotiate You can control encrypted traffic based on the cipher suite selected by
the encrypted session the server to negotiate the encrypted session. To build a cipher suite
condition, see Controlling Encrypted Traffic by Cipher Suite, on page
240.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
203
Getting Started with SSL Rules
Using Rule Actions to Determine Encrypted Traffic Handling and Inspection
Versions by the version of SSL or TLS used to You can control encrypted traffic based on the version of SSL or TLS
encrypt the session used to encrypt the session. To build a version condition, see Controlling
Traffic by Encryption Protocol Version, on page 241.
Note that while you can control and inspect encrypted traffic, controlling traffic using detected application,
URL category, or user requires additional licenses. Also, overly complex rules can consume excessive resources
and in some cases prevent you from applying the policy. For more information, see Troubleshooting SSL
Rules, on page 212.
Your SSL inspection configuration handles, inspects, and logs decrypted traffic:
• The SSL policy’s undecryptable actions handle traffic that the ASA FirePOWER module cannot decrypt;
see Setting Default Handling for Undecryptable Traffic, on page 186.
• The policy’s default action handles traffic that does not meet the condition of any non-Monitor SSL rule;
see Setting Default Handling and Inspection for Encrypted Traffic, on page 185.
You can log a connection event when the ASA FirePOWER module blocks or trusts an encrypted session.
You can also force the module to log connections that it decrypts for further evaluation by access control
rules, regardless of how the module later handles or inspects the traffic. Connection logs for encrypted sessions
contain details about the encryption, such as the certificate used to encrypt that session. You can log only
end-of-connection events, however:
• for blocked connections (Block, Block with reset), the module immediately ends the sessions and generates
an event
• for trusted connections (Do not decrypt), the module generates an event when the session ends
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
204
Getting Started with SSL Rules
Do Not Decrypt Action: Passing Encrypted Traffic Without Inspection
a packet matches a Monitor rule, the connection is always logged, even if the packet matches no other rules
and you do not enable logging on the default action.
Tip Note that you cannot use the Block or Block with reset action in a passive or inline (tap mode) deployment,
as the device does not directly inspect the traffic. If you create a rule with the Block or Block with reset action
that contains passive or inline (tap mode) interfaces within a security zone condition, the policy editor displays
a warning icon ( ) next to the rule.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
205
Getting Started with SSL Rules
Decrypt Actions: Decrypting Traffic for Further Inspection
Re-signing a server certificate involves either replacing the certificate’s public key with a CA certificate public
key, or replacing the entire certificate. Normally, if you replace an entire server certificate, the client browser
warns the certificate is not signed by a trusted authority when establishing the SSL connection. However, if
your client’s browser trusts the CA in the policy, the browser does not warn that the certificate is not trusted.
If the original server certificate is self-signed, the ASA FirePOWER module replaces the entire certificate,
and trusts the re-signing CA, but the user’s browser does not warn that the certificate is self-signed. In this
case, replacing only the server certificate public key causes the client browser does warn that the certficate is
self-signed.
If you configure a rule with the Decrypt - Resign action, the rule matches traffic based on the referenced
internal CA certificate’s signature algorithm type, in addition to any configured rule conditions. Because you
associate one CA certificate with a Decrypt - Resign action, you cannot create an SSL rule that decrypts
multiple types of outgoing traffic encrypted with different signature algorithms. In addition, any external
certificate objects and cipher suites you add to the rule must match the associated CA certificate encryption
algorithm type.
For example, outgoing traffic encrypted with an elliptic curve (EC) algorithm matches a Decrypt - Resign
rule only if the action references an EC-based CA certificate; you must add EC-based external certificates
and cipher suites to the rule if you want to create certificate and cipher suite rule conditions. Similarly, a
Decrypt - Resign rule that references an RSA-based CA certificate matches only outgoing traffic encrypted
with an RSA algorithm; outgoing traffic encrypted with an EC algorithm does not match the rule, even if all
other configured rule conditions match.
Note the following:
• You cannot use the Decrypt - Known Key action in a passive deployment if the cipher suite used to
establish the SSL connection applies either the Diffie-Hellman ephemeral (DHE) or the elliptic curve
Diffie-Hellman ephemeral (ECDHE) key exchange algorithm. If your SSL policy targets passive or inline
(tap mode) interfaces, and contains a Decrypt - Known Key rule with a cipher suite condition containing
either a DHE or an ECDHE cipher suite, the ASA FirePOWER module displays an information icon
next to the rule. If you later add a zone condition to the SSL rule that contains passive or inline (tap
mode) interfaces, the module displays a warning icon.
• You cannot use the Decrypt - Resign action in a passive or inline (tap mode) deployment, as the device
does not directly inspect traffic. If you create a rule with the Decrypt - Resign action that contains passive
or inline (tap mode) interfaces within a security zone, the policy editor displays a warning icon next to
the rule. If your SSL policy targets passive or inline (tap mode) interfaces, and contains a Decrypt -
Resign rule, the module displays an information icon ( ) next to the rule. If you later add a zone condition
to the SSL rule that contains passive or inline (tap mode) interfaces, the module displays a warning icon
( ). If you apply an SSL policy that contains a Decrypt - Resign rule to a device with passive or inline
(tap mode) interfaces, any SSL sessions that match the rule fail.
• If the client does not trust the CA used to re-sign the server certificate, it warns the user that the certificate
should not be trusted. To prevent this, import the CA certificate into the client trusted CA store.
Alternatively, if your organization has a private PKI, you can issue an intermediate CA certificate signed
by the root CA which is automatically trusted by all clients in the organization, then upload that CA
certificate to the device.
• You can add an anonymous cipher suite to the Cipher Suite condition in an SSL rule, but keep in mind:
• The system automatically strips anonymous cipher suites during ClientHello processing. For the
system to use the rule, you must also configure your SSL rules in an order that prevents ClientHello
processing. For more information, see Ordering SSL Rules to Improve Performance and Avoid
Preemption, on page 213.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
206
Getting Started with SSL Rules
Decrypt Actions: Decrypting Traffic for Further Inspection
• You cannot use the Decrypt - Resign or Decrypt - Known Key action in the rule, because the
system cannot decrypt traffic encrypted with an anonymous cipher suite.
• The ASA FirePOWER module cannot decrypt traffic if an HTTP proxy is positioned between a client
and your device, and the client and server establish a tunneled SSL connection using the CONNECT
HTTP method. The Handshake Errors undecryptable action determines how the module handles this
traffic. See Setting Default Handling for Undecryptable Traffic, on page 186 for more information.
• You cannot match on Distinguished Name or Certificate conditions when creating an SSL rule with a
Decrypt - Known Key action. The assumption is that if this rule matches traffic, the certificate, subject
DN, and issuer DN already match the certificate associated with the rule. For more information, see
Using Rule Actions to Determine Encrypted Traffic Handling and Inspection, on page 204
.
• If you create an internal CA object and choose to generate a certificate signing request (CSR), you cannot
use this CA for a Decrypt - Resign action until you upload the signed certificate to the object. For more
information, see Obtaining and Uploading a New Signed Certificate, on page 55.
• If you configure a rule with the Decrypt - Resign action, and mismatch signature algorithm type for one
or more external certificate objects or cipher suites, the policy editor displays an information icon next
to the rule. If you mismatch signature algorithm type for all external certificate objects, or all cipher
suites, the policy displays a warning icon next to the rule, and you cannot apply the access control policy
associated with the SSL policy. For more information, see Controlling Encrypted Traffic by Certificate
, on page 234 and Controlling Encrypted Traffic by Cipher Suite, on page 240.
• If decrypted traffic matches an access control rule with an action of Interactive Block or Interactive
Block with reset, the ASA FirePOWER module blocks the matching connection without interaction and
the module does not display a response page.
• If you enable the Normalize Excess Payload option in the inline normalization preprocessor, when the
preprocessor normalizes decrypted traffic, it may drop a packet and replace it with a trimmed packet.
This does not end the SSL session. If the traffic is allowed, the trimmed packet is encrypted as part of
the SSL session.
• If your browser uses certificate pinning to verify a server certificate, you cannot decrypt this traffic by
re-signing the server certificate. If you want to allow this traffic, configure an SSL rule with the Do not
decrypt action to match the server certificate common name or distinguished name.
Step 1 In the SSL policy editor for the policy you want to decrypt incoming traffic, you have the following options:
• To add a new rule, click Add Rule.
• To edit an existing rule, click the edit icon next to the rule you want to edit.
Step 2 Select Decrypt - Known Key from the Action drop-down list.
The Click to select decryption certs field appears.
Step 3 Click the Click to select decryption certs field.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
207
Getting Started with SSL Rules
Decrypt Actions: Decrypting Traffic for Further Inspection
What to do next
To configure a rule to decrypt outgoing traffic:
Step 1 In the SSL policy editor for the policy you want to decrypt incoming traffic, you have the following options:
• To add a new rule, click Add Rule.
• To edit an existing rule, click the edit icon next to the rule you want to edit.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
208
Getting Started with SSL Rules
Managing SSL Rules in a Policy
For each rule, the policy editor displays its name, a summary of its conditions, and the rule action. Icons
represent warnings, errors, and other important information. Disabled rules are grayed out and marked (disabled)
beneath the rule name. See Troubleshooting SSL Rules, on page 212 for more information about the icons.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
209
Getting Started with SSL Rules
Enabling and Disabling SSL Rules
Step 1 In the SSL policy editor for the policy you want to search, click the Search Rules prompt, type a search string, then
press Enter. You can also use the Tab key or click a blank page area to initiate the search.
Columns for rules with matching values are highlighted, with differentiated highlighting for the indicated (first) match.
Step 2 Find the rules you are interested in:
• To refresh the page and clear the search string and any highlighting, click the clear icon < >.
Step 1 In the SSL policy editor for the policy that contains the rule you want to enable or disable, right-click the rule and choose
a rule state:
• To enable an inactive rule, select State > Enable.
• To disable an active rule , State > Disable.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
210
Getting Started with SSL Rules
Adding a New SSL Rule Category
Proper SSL rule order reduces the resources required to process network traffic, and prevents rule preemption.
The following procedure explains how to move one or more rules at a time using the SSL policy editor. You
can also move individual SSL rules using the rule editor; see Understanding and Creating SSL Rules, on page
200.
To move a rule:
Step 1 In the SSL policy editor for the policy that contains the rules you want to move, select the rules by clicking in a blank
area for each rule. Use the Ctrl and Shift keys to select multiple rules.
The rules you selected are highlighted.
Step 2 Move the rules. You can cut and paste or drag and drop.
To cut and paste rules into a new location, right-click a selected rule and select Cut. Then, right-click a blank area for a
rule next to where you want to paste the cut rules and select Paste above or Paste below. Note that you cannot copy and
paste SSL rules between two different SSL policies.
Step 3 Click Store ASA FirePOWER Changes..
You must apply the access control policy associated with the SSL policy for your changes to take effect; see Deploying
Configuration Changes, on page 73.
Step 1 In the SSL policy editor for the policy where you want to add a rule category, click Add Category.
Tip If your policy already contains rules, you can click a blank area in the row for an existing rule to set the position
of the new category before you add it. You can also right-click an existing rule and select Insert new category.
The Add Category pop-up window appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
211
Getting Started with SSL Rules
Troubleshooting SSL Rules
• To position the rule above an existing rule, select above rule from the drop-down list, then, enter an existing rule
number. This option is valid only when at least one rule exists in the policy.
warning Depending on the issue, you may be able to apply an SSL policy that displays rule or other
warnings. In these cases, the misconfigured settings will have no effect. For example, a
preempted rule never evaluates traffic. However, if a warning icon marks a licensing error
or model mismatch, you cannot apply the policy until you correct the issue.
If you disable a rule with a warning, the warning icon disappears. It reappears if you enable
the rule without correcting the underlying issue.
error If a rule or other SSL policy configuration has an error, you cannot apply the policy until
you correct the issue.
information Information icons convey helpful information about configurations that may affect the
flow of traffic. These issues are minor and will not prevent you from applying the policy.
Properly configuring SSL rules can also reduce the resources required to process network traffic. Creating
complex rules and mis-ordering rules can affect performance.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
212
Getting Started with SSL Rules
Ordering SSL Rules to Improve Performance and Avoid Preemption
The second rule above will never block traffic because the first rule will have already allowed the traffic.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
213
Getting Started with SSL Rules
Ordering SSL Rules to Improve Performance and Avoid Preemption
the first rule matches all traffic trusted by Good CA, including traffic trusted by Bad CA. Because no traffic
ever matches the second rule, malicious traffic may be allowed instead of blocked.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
214
Getting Started with SSL Rules
Configuring SSL Inspection to Improve Performance
When a managed device processes an SSL handshake, it can modify the ClientHello message to increase the
likelihood of decryption. For example, it may remove compression methods because the Firepower System
cannot decrypt compressed sessions.
The system only modifies ClientHello messages if it can conclusively match them to an SSL rule with a
Decrypt - Resign action. The first time the system detects an encrypted session to a new server, server Certificate
data is not available for ClientHello processing, which can result in an undecrypted first session. For subsequent
connections from the same client, the system can match the ClientHello message conclusively to rules with
server Certificate conditions and process the message to maximize decryption potential.
If you place rules that match on ServerHello or server Certificate conditions (certificate, distinguished names,
certificate status, cipher suites, version) before rules that match on ClientHello conditions (zones, networks,
VLAN tags, ports, users, applications, URL categories), you can preempt ClientHello modification and increase
the number of undecrypted sessions.
Simplifying Rules
The following guidelines can help you simplify your SSL rules and improve performance:
• When constructing a rule, use as few individual elements in your conditions as possible. For example,
in network conditions, use IP address blocks rather than individual IP addresses. In port conditions, use
port ranges. Use application filters and URL categories and reputations to perform application control
and URL filtering, and LDAP user groups to perform user control.
Note that combining elements into objects that you then use in SSL rule conditions does not improve
performance. For example, using a network object that contains 50 individual IP addresses gives you only an
organizational—not a performance—benefit over including those IP addresses in the condition individually.
• Restrict rules by security zones whenever possible. If a device’s interfaces are not in one of the zones in
a zone-restricted rule, the rule does not affect performance on that device.
• Do not overconfigure rules. If one condition is enough to match the traffic you want to handle, do not
use two.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
215
Getting Started with SSL Rules
Configuring SSL Inspection to Improve Performance
• If you configure certificate status conditions to trust traffic based on the root issuer CA, upload the root
CA certificate and all intermediate CA certificates within the root CA’s chain of trust to your SSL policy.
All traffic within a trusted CA’s chain of trust can be allowed without decryption, rather than unnecessarily
decrypting it.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
216
CHAPTER 17
Tuning Traffic Decryption Using SSL Rules
A basic SSL rule applies its rule action to all encrypted traffic inspected by the ASA FirePOWER module.
To better control and decrypt encrypted traffic, you can configure rule conditions to handle and log specific
types of traffic. Each SSL rule can contain 0, 1, or more rule conditions; a rule only matches traffic if the
traffic matches every condition in that SSL rule.
Note When traffic matches a rule, the ASA FirePOWER module applies the configured rule action to the traffic.
When the connection ends, the module logs the traffic if configured to do so. For more information, see
Understanding How Access Control and SSL Rule Actions Affect Logging, on page 386 and Logging
Connections Based on Access Control Handling, on page 391.
Each rule condition allows you to specify one or more properties of traffic you want to match against; these
properties include details of:
• the flow of traffic, including the security zone through which it travels, IP address and port, and country
of origin or destination
• the user associated with a detected IP address
• the traffic payload, including the application detected in the traffic
• the connection encryption, including the SSL/TLS protocol version and cipher suite and server certificate
used to encrypt the connection
• the category and reputation of the URL specified in the server certificate’s distinguished name
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
217
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic by Network Zone
SSL rules within SSL policies exert granular control over encrypted traffic logging and handling. Network-based
conditions allow you to manage which encrypted traffic can traverse your network, using one or more of the
following criteria:
• source and destination security zones
• source and destination IP addresses or geographical locations
• source and destination port
You can combine network-based conditions with each other and with other types of conditions to create an
SSL rule. These SSL rules can be simple or complex, matching and inspecting traffic using multiple conditions.
For detailed information on SSL rules, see Getting Started with SSL Rules, on page 197.
Tip You are not required to group all internal (or external) interfaces into a single zone. Choose the grouping that
makes sense for your deployment and security policies. For more information on creating zones, see Working
with Security Zones, on page 49.
In this deployment, you may decide that although you want these hosts to have unrestricted access to the
Internet, you nevertheless want to protect them by decrypting and inspecting incoming encrypted traffic.
To accomplish this with SSL inspection, configure an SSL rule with a zone condition where the Destination
Zone is set to Internal. This simple SSL rule matches traffic that leaves the device from any interface in the
Internal zone.
If you want to build a more complex rule, you can add a maximum of 50 zones to each of the Sources Zones
and Destination Zones in a single zone condition:
• To match encrypted traffic leaving the device from an interface in the zone, add that zone to the
Destination Zones.
Because devices deployed passively do not transmit traffic, you cannot use a zone comprised of passive
interfaces in a Destination Zone condition.
• To match encrypted traffic entering the device from an interface in the zone, add that zone to the Source
Zones.
If you add both source and destination zone conditions to a rule, matching traffic must originate from one of
the specified source zones and egress through one of the destination zones.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
218
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic by Network or Geographical Location
Note that just as all interfaces in a zone must be of the same type (all inline, all passive, all switched, or all
routed), all zones used in a zone condition for an SSL rule must be of the same type. That is, you cannot write
a single rule that matches encrypted traffic to or from zones of different types.
Warning icons indicate invalid configurations, such as zones that contain no interfaces. For details, hover
your pointer over the icon.
To control encrypted traffic by zone:
Step 1 In the SSL policy where you want to control encrypted traffic by zone, create a new SSL rule or edit an existing rule.
For detailed instructions, see Getting Started with SSL Rules, on page 197.
Step 3 Find and select the zones you want to add from the Available Zones.
To search for zones to add, click the Search by name prompt above the Available Zones list, then type a zone name.
The list updates as you type to display matching zones.
Click to select a zone. To select multiple zones, use the Shift and Ctrl keys, or right-click and then select Select All.
Step 4 Click Add to Source or Add to Destination to add the selected zones to the appropriate list.
You can also drag and drop selected zones.
When you build a network-based SSL rule condition, you can manually specify IP address and geographical
locations. Alternately, you can configure network conditions with network and geolocation objects , which
are reusable and associate a name with one or more IP addresses, address blocks, countries, continents, and
so on.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
219
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic by Network or Geographical Location
Tip After you create a network or geolocation object, you can use it not only to build SSL rules, but also to
represent IP addresses in various other places in the module interface. You can create these objects using the
object manager; you can also create network objects on-the-fly while you are configuring SSL rules. For more
information, see Managing Reusable Objects, on page 17.
Note that if you want to write rules to control traffic by geographical location, to ensure you are using up-to-date
geolocation data to filter your traffic, Cisco strongly recommends you regularly update the geolocation
database (GeoDB) on your ASA FirePOWER module; see Updating the Geolocation Database, on page 495.
The following graphic shows the network condition for an SSL rule that blocks encrypted connections
originating from your internal network and attempting to access resources either in the Cayman Islands or an
offshore holding corporation server at 182.16.0.3.
The example manually specifies the offshore holding corporation’s server IP address, and uses a ASA
FirePOWER module-provided Cayman Islands geolocation object to represent Cayman Island IP addresses.
You can add a maximum of 50 items to each of the Source Networks and Destination Networks in a single
network condition, and you can mix network and geolocation-based configurations:
• To match encrypted traffic from an IP address or geographical location, configure the Source Networks.
• To match encrypted traffic to an IP address or geographical location, configure the Destination Networks.
If you add both source and destination network conditions to a rule, matching encrypted traffic must originate
from one of the specified IP addresses and be destined for one of the destination IP addresses.
When building a network condition, warning icons indicate invalid configurations. For details, hover your
pointer over the icon.
To control traffic by network or geographical location:
Access: Admin/Access Admin/Network Admin
Step 1 In the SSL policy where you want to control encrypted traffic by network, create a new SSL rule or edit an existing rule.
For detailed instructions, see Understanding and Creating SSL Rules, on page 200.
Step 3 Find and select the networks you want to add from the Available Networks, as follows:
• Click the Networks tab to display network objects and groups to add; click the Geolocation tab to display geolocation
objects.
• To add a network object on the fly, which you can then add to the condition, click the add icon ( ) above the
Available Networks list; see Working with Network Objects, on page 19.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
220
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic by Port
• To search for network or geolocation objects to add, select the appropriate tab, click the Search by name or value
prompt above the Available Networks list, then type an object name or the value of one of the object’s components.
The list updates as you type to display matching objects.
To select an object, click it. To select multiple objects, use the Shift and Ctrl keys, or right-click and then select Select
All.
Step 4 Click Add to Source or Add to Destination to add the selected objects to the appropriate list.
You can also drag and drop selected objects.
Step 5 Add any source or destination IP addresses or address blocks that you want to specify manually.
Click the Enter an IP address prompt below the Source Networks or Destination Networks list; then type an IP address
or address block and click Add.
Tip After you create a port object, you can use it not only to build SSL rules, but also to represent ports in various
other places in the module interface. You can create port objects either using the object manager or on-the-fly
while you are configuring SSL rules. For more information, see Working with Port Objects, on page 25.
You can add a maximum of 50 items to each of the Selected Source Ports and Selected Destination Ports
lists in a single network condition:
• To match encrypted traffic from a TCP port, configure the Selected Source Ports.
• To match encrypted traffic to a TCP port, configure the Selected Destination Ports.
• To match encrypted traffic both originating from TCP Selected Source Ports and destined for TCP
Selected Destination Ports, configure both.
You can only configure the Selected Source Ports and Selected Destination Ports lists with TCP ports. Port
objects containing non-TCP ports are greyed out in the Available Ports list.
When building a port condition, warning icons indicate invalid configurations. For example, you can use the
object manager to edit in-use port objects so that the rules that use those object groups become invalid. For
details, hover your pointer over the icon.
To control traffic by port:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
221
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic Based on User
Step 1 In the SSL policy where you want to control encrypted traffic by TCP port, create a new SSL rule or edit an existing rule.
For detailed instructions, see Understanding and Creating SSL Rules, on page 200.
Step 3 Find and select the TCP ports you want to add from the Available Ports, as follows:
• To add a TCP port object on the fly, which you can then add to the condition, click the add icon ( ) above the
Available Ports list; see Working with Port Objects, on page 25.
• To search for TCP-based port objects and groups to add, click the Search by name or value prompt above the
Available Ports list, then type either the name of the object, or the value of a port in the object. The list updates as
you type to display matching objects. For example, if you type 443, the ASA FirePOWER module displays the ASA
FirePOWER module-provided HTTPS port object.
To select a TCP-based port object, click it. To select multiple TCP-based port objects, use the Shift and Ctrl keys, or
right-click and then select Select All. If the object includes non-TCP-based ports, you cannot add it to your port condition.
Step 4 Click Add to Source or Add to Destination to add the selected objects to the appropriate list.
You can also drag and drop selected objects.
Step 5 Enter a Port under the Selected Source Ports or Selected Destination Ports list to manually specify source or destination
ports. You can specify a single port with a value from 0 to 65535.
Step 6 Click Add.
Note that the ASA FirePOWER module will not add a port to a rule condition that results in an invalid configuration.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
222
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic by Reputation
You can combine user conditions with each other and with other types of conditions to create an SSL rule.
These SSL rules can be simple or complex, matching and inspecting traffic using multiple conditions. For
detailed information on SSL rules, see Understanding and Creating SSL Rules, on page 200.
User control requires a Control license and is supported only for LDAP users and groups (access controlled
users ), using login and logoff records reported by a User Agent monitoring Microsoft Active Directory
servers.
Before you can write SSL rules with user conditions, you must configure a connection between the ASA
FirePOWER module and at least one of your organization’s Microsoft Active Directory servers. This
configuration, called an authentication object, contains connection settings and authentication filter settings
for the server. It also specifies the users you can use in user conditions.
In addition, you must install User Agents. The agents monitor users when they authenticate against Active
Directory credentials, and send records of those logins to the ASA FirePOWER module. These records
associate users with IP addresses, which is what allows SSL rules with user conditions to trigger.
To control encrypted traffic by user:
Step 1 In the SSL policy where you want to control encrypted traffic by user, create a new SSL rule or edit an existing rule.
For detailed instructions, see Understanding and Creating SSL Rules, on page 200.
Step 3 To search for users to add, click the Search by name or value prompt above the Available Users list, then type the
username. The list updates as you type to display matching users.
To select a user, click it. To select multiple users, use the Shift and Ctrl keys, or right-click and then select Select All.
Step 4 Click Add to Rule or to add the selected users to the Selected Users list.
You can also drag and drop selected users.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
223
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic Based on Application
You can combine reputation-based conditions with each other and with other types of conditions to create an
SSL rule. These SSL rules can be simple or complex, matching and inspecting traffic using multiple conditions.
Note When you filter application traffic using access control rules, you can use application tags as a criterion. to
filter. However, you cannot use application tags to filter encrypted traffic because there is no benefit. All
applications that the ASA FirePOWER module can detect in encrypted traffic are tagged SSL Protocol;
applications without this tag can only be detected in unencrypted or decrypted traffic.
Application filters allow you to quickly create application conditions for SSL rules. They simplify policy
creation and administration, and grant you assurance that the module will control web traffic as expected. For
example, you could create an SSL rule that identifies and decrypts all high risk, low business relevance
applications in encrypted traffic. If a user attempts to use one of those applications, the session is decrypted
and inspected with access control.
In addition, Cisco frequently updates and adds additional detectors via system and vulnerability database
(VDB) updates. You can also create your own detectors and assign characteristics (risk, relevance, and so on)
to the applications they detect. By using filters based on application characteristics, you can ensure that the
module uses the most up-to-date detectors to monitor application traffic.
For traffic to match an SSL rule with an application condition, the traffic must match one of the filters or
applications that you add to a Selected Applications and Filters list.
The following graphic shows the application condition for an SSL rule that decrypts a custom group of
applications for MyCompany, all applications with high risk and low business relevance, gaming applications,
and some individually selected applications.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
224
Tuning Traffic Decryption Using SSL Rules
Matching Encrypted Traffic with Application Filters
In a single application condition, you can add a maximum of 50 items to the Selected Applications and
Filters list. Each of the following counts as an item:
• One or more filters from the Application Filters list, individually or in custom combination. This item
represents set of applications, grouped by characteristic.
• A filter created by saving search of the applications in the Available Applications list. This item represents
a set of applications, grouped by substring match.
• An individual application from the Available Applications list.
In the module interface, filters added to a condition are listed above and separately from individually added
applications.
Note that when you apply an SSL policy, for each rule with an application condition, the ASA FirePOWER
module generates a list of unique applications to match. In other words, you may use overlapping filters and
individually specified applications to ensure complete coverage.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
225
Tuning Traffic Decryption Using SSL Rules
Matching Traffic from Individual Applications
If the Medium filter contained 110 applications and the High filter contained 82 applications, the module
displays all 192 applications in the Available Applications list.
The module links different types of filters with an AND operation. For example, if you select the Medium
and High filters under the Risks type, and the Medium and High filters under the Business Relevance type,
the resulting filter is:
Risk: Medium OR HighANDBusiness Relevance: Medium OR High
In this case, the module displays only those applications that are included in both the Medium or High Risk
type AND the Medium or High Business Relevance type.
Once constrained, an All apps matching the filter option appears at the top of the Available Applications
list. This option allows you to add all the applications in the constrained list to the Selected Applications and
Filters list, all at once.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
226
Tuning Traffic Decryption Using SSL Rules
Adding an Application Condition to an SSL Rule
Note If you select one or more filters in the Application Filters list and also search the Available Applications list,
your selections and the search-filtered Available Applications list are combined using an AND operation.
That is, the All apps matching the filter condition includes all the individual conditions currently displayed
in the Available Applications list as well as the search string entered above the Available Applications list.
Filter types that are not represented in a filter you add with All apps matching the filter are not included in
the name of the filter you add. The instructional text that is displayed when you hover your pointer over the
filter name in the Selected Applications and Filters list indicates that these filter types are set to any ; that
is, these filter types do not constrain the filter, so any value is allowed for these.
You can add multiple instances of All apps matching the filter to an application condition, with each instance
counting as a separate item in the Selected Applications and Filters list. For example, you could add all high
risk applications as one item, clear your selections, then add all low business relevance applications as another
item. This application condition matches applications that are high risk OR have low business relevance.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
227
Tuning Traffic Decryption Using SSL Rules
Limitations to Encrypted Application Control
Step 1 In the SSL policy where you want to control traffic by application, create a new SSL rule or edit an existing rule.
For detailed instructions, see Understanding and Creating SSL Rules, on page 200.
Step 3 Optionally, use filters to constrain the list of applications displayed in the Available Applications list.
Select one or more filters in the Application Filters list. For more information, see Matching Encrypted Traffic with
Application Filters, on page 225.
Step 4 Find and select the applications you want to add from the Available Applications list.
You can search for and select individual applications, or, when the list is constrained, All apps matching the filter. For
more information, see Matching Traffic from Individual Applications, on page 226.
Step 5 Click Add to Rule to add the selected applications to the Selected Applications and Filters list.
You can also drag and drop selected applications and filters. Filters appear under the heading Filters , and applications
appear under the heading Applications .
Tip Before you add another filter to this application condition, click Clear All Filters to clear your existing selections.
This identification occurs after the server certificate exchange. If traffic exchanged during the handshake
matches all other conditions in an SSL rule containing an application condition but the identification is not
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
228
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic by URL Category and Reputation
complete, the SSL policy allows the packet to pass. This behavior allows the handshake to complete so that
applications can be identified. For your convenience, affected rules are marked with an information icon ( ).
After the module completes its identification, it applies the SSL rule action to the remaining session traffic
that matches its application condition.
Note You can handle and decrypt traffic to specific URLs by defining a distinguished name SSL rule condition.
The common name attribute in a certificate’s subject distinguished name contains the site’s URL. For more
information, see Controlling Encrypted Traffic by Certificate Distinguished Name, on page 232.
The following table summarizes how you build the condition shown above. Note that you cannot qualify a
literal URL or URL object with a reputation.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
229
Tuning Traffic Decryption Using SSL Rules
Blocking Encrypted URLs Based on Category and Reputation
When building a URL condition, warning icons indicate invalid configurations. For details, hover your pointer
over the icon and see Troubleshooting Access Control Policies and Rules, on page 74.
Tip If you decrypt traffic, then block it with access control, you can give users a chance to bypass the block by
clicking through a warning page. See Interactive Blocking Actions: Allowing Users to Bypass Website Blocks,
on page 97 for more information.
Step 1 In the SSL policy where you want to control encrypted traffic by URL, create a new SSL rule or edit an existing rule.
For detailed instructions, see Understanding and Creating SSL Rules, on page 200.
Step 4 Optionally, qualify your category selections by clicking a reputation level from the Reputations list. If you do not specify
a reputation level, the module defaults to Any, meaning all levels including sites with unknown reputation.
You can only select one reputation level. When you choose a reputation level, the SSL rule behaves differently depending
on its purpose:
• If the rule blocks web access or decrypts traffic (the rule action is Block, Block with reset, Decrypt - Known Key,
Decrypt - Resign, or Monitor) selecting a reputation level also selects all reputations more severe than that level.
For example, if you configure a rule to block Questionable sites (level 2), it also automatically blocks Untrusted
(level 1) sites.
• If the rule allows web access, subject to access control (the rule action is Do not decrypt), selecting a reputation
level also selects all reputations less severe than that level. For example, if you configure a rule to allow Favorable
sites (level 4), it also automatically allows Trusted (level 5) sites.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
230
Tuning Traffic Decryption Using SSL Rules
Limitations on URL Detection and Blocking
If you change the rule action for a rule, the module automatically changes the reputation levels in Category conditions
according to the above points.
Optionally, select Apply to unknown reputation.
Step 5 Click Add to Rule or to add the selected items to the Selected Categories list.
You can also drag and drop selected items.
What to do next
You must apply the access control policy associated with the SSL policy for your changes to take effect; see
Deploying Configuration Changes, on page 73.
This identification occurs after the server certificate exchange. If traffic exchanged during the handshake
matches all other conditions in an SSL rule containing a URL condition but the identification is not complete,
the SSL policy allows the packet to pass. This behavior allows the connection to be established so that URLs
can be identified. For your convenience, affected rules are marked with an information icon ( ).
After the module completes its identification, it applies the SSL rule action to the remaining session traffic
that matches its URL condition.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
231
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic by Certificate Distinguished Name
You can also detect the server certificate and handle traffic, based on the following server certificate
characteristics:
• the server certificate itself
• the certificate issuer, whether an issuing CA or if the certificate is self-signed
• the certificate holder
• various certificate statuses, such as whether the certificate is valid, or revoked by the issuing CA
To detect multiple cipher suites in a rule, the certificate issuer, or the certificate holder, you can create reusable
cipher suite list and distinguished name objects and add them to your rule. To detect the server certificate and
certain certificate statuses, you must create external certificate and external CA objects for the rule.
Note You cannot configure a distinguished name condition if you also select the Decrypt - Known Key action.
Because that action requires you to select a server certificate to decrypt traffic, the certificate already matches
the traffic. See Decrypt Actions: Decrypting Traffic for Further Inspection, on page 208 for more information.
You can match against multiple subject and issuer distinguished names in a single certificate status rule
condition; only one common or distinguished name needs to match to match the rule.
If you add a distinguished name manually, it can contain the common name attribute (CN). If you add a
common name without CN= then the module prepends CN= before saving the object.
You can also add a distinguished name with one of each attribute listed in the following table, separated by
commas.
CN Common Name up to 64 alphanumeric, backslash (\), hyphen (-), quotation ("), asterisk (*),
period (.), or space characters
O Organization
OU Organizational Unit
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
232
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic by Certificate Distinguished Name
The following graphic illustrates a distinguished name rule condition searching for certificates issued to
goodbakery.example.com or issued by goodca.example.com. Traffic encrypted with these certificates is
You can add a maximum of 50 literal values and distinguished name objects to the Subject DNs, and 50 literal
values and distinguished name objects to the Issuer DNs, in a single DN condition.
The ASA FirePOWER module-provided DN object group, Sourcefire Undecryptable Sites, contains websites
whose traffic the module cannot decrypt. You can add this group to a DN condition to block or not decrypt
traffic to or from these websites, without wasting system resources attempting to decrypt that traffic. You can
modify individual entries in the group. You cannot delete the group. System updates can modify the entries
on this list, but the module preserves user changes.
The first time the system detects an encrypted session to a new server, DN data is not available for ClientHello
processing, which can result in an undecrypted first session. After the initial session, the managed device
caches data from the server Certificate message. For subsequent connections from the same client, the system
can match the ClientHello message conclusively to rules with DN conditions and process the message to
maximize decryption potential.
To inspect encrypted traffic based on certificate subject or issuer distinguished name:
Step 1 In the SSL policy where you want to control encrypted traffic by certificate subject or issuer distinguished name, create
a new SSL rule or edit an existing rule.
For detailed instructions, see Understanding and Creating SSL Rules, on page 200.
Step 3 Find and select the distinguished names you want to add from the Available DNs, as follows:
• To add a distinguished name object on the fly, which you can then add to the condition, click the add icon above
the Available DNs list; see Working with Distinguished Name Objects, on page 51.
• To search for distinguished name objects and groups to add, click the Search by name or value prompt above the
Available DNs list, then type either the name of the object, or a value in the object. The list updates as you type to
display matching objects.
To select an object, click it. To select multiple objects, use the Shift and Ctrl keys, or right-click and then select Select
All.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
233
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic by Certificate
Step 5 Add any literal common names or distinguished names that you want to specify manually.
Click the Enter DN or CN prompt below the Subject DNs or Issuer DNs list; then type a common name or distinguished
name and click Add.
You can choose to match against multiple certificates in a single certificate rule condition; if the certificate
used to encrypt the traffic matches any of the uploaded certificates, the encrypted traffic matches the rule.
You can add a maximum of 50 external certificate objects and external certificate object groups to the Selected
Certificates in a single certificate condition.
Note the following:
• You cannot configure a certificate condition if you also select the Decrypt - Known Key action. Because
that action requires you to select a server certificate to decrypt traffic, the implication is that the certificate
already matches the traffic. See Decrypt Actions: Decrypting Traffic for Further Inspection, on page 208
for more information.
• If you configure a certificate condition with an external certificate object, any cipher suites you add to
a cipher suite condition, or internal CA objects you associate with the Decrypt - Resign action, must
match the external certificate’s signature algorithm type. For example, if your rule’s certificate condition
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
234
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic by Certificate Status
references an EC-based server certificate, any cipher suites you add, or CA certificates you associate
with the Decrypt - Resign action, must also be EC-based. If you mismatch signature algorithm types in
this case, the policy editor displays a warning icon next to the rule. For more information, see Controlling
Encrypted Traffic by Cipher Suite, on page 240 and Decrypt Actions: Decrypting Traffic for Further
Inspection, on page 208.
• The first time the system detects an encrypted session to a new server, certificate data is not available
for ClientHello processing, which can result in an undecrypted first session. After the initial session, the
managed device caches data from the server Certificate message. For subsequent connections from the
same client, the system can match the ClientHello message conclusively to rules with certificate conditions
and process the message to maximize decryption potential.
Step 1 In the SSL policy where you want to control encrypted traffic based on server certificate, create a new SSL rule or edit
an existing rule.
For detailed instructions, see Understanding and Creating SSL Rules, on page 200.
Step 3 Find and select the server certificates you want to add from the Available Certificates, as follows;
• To add an external certificate object on the fly, which you can then add to the condition, click the add icon ( )
above the Available Certificates list; see Working with Distinguished Name Objects, on page 51.
• To search for certificate objects and groups to add, click the Search by name or value prompt above the Available
Certificates list, then type either the name of the object, or a value in the object. The list updates as you type to
display matching objects.
To select an object, click it. To select multiple objects, use the Shift and Ctrl keys, or right-click and then select Select
All.
Step 4 Click Add to Rule to add the selected objects to the Subject Certificates list.
You can also drag and drop selected objects.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
235
Tuning Traffic Decryption Using SSL Rules
Trusting External Certificate Authorities
Checking whether a CA issued or revoked a certificate requires uploading root and intermediate CA certificates
and associated CRLs as objects. You then add these trusted CA objects to an SSL policy’s list of trusted CA
certificates.
For each certificate status SSL rule condition you configure, you can match traffic against the presence or
absence of a given status. You can select several statuses in one rule condition; if the certificate matches any
of the selected statuses, the rule matches the traffic.
Tip Upload all certificates within a root CA’s chain of trust to the list of trusted CA certificates, including the root
CA certificate and all intermediate CA certificates. Otherwise, it is more difficult to detect trusted certificates
issued by intermediate CAs.
When you create an SSL policy, the ASA FirePOWER module populates the Trusted CA Certificates tab
with a default Trusted CA object group, Cisco Trusted Authorities. You can modify individual entries in the
group, and choose whether to include this group in your SSL policy. You cannot delete the group. System
updates can modify the entries on this list, but user changes are preserved. See Creating a Basic SSL Policy,
on page 184 for more information.
To add trusted CAs to your policy:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > SSL.
The SSL Policy page appears.
Step 2 Click the edit icon ( ) next to the SSL policy you want to configure.
The SSL policy editor appears.
Step 4 Find and select the trusted CAs you want to add from the Available Trusted CAs, as follows:
• To add a trusted CA object on the fly, which you can then add to the condition, click the add icon ( ) above the
Available Trusted CAs list; see Working with Trusted Certificate Authority Objects, on page 57.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
236
Tuning Traffic Decryption Using SSL Rules
Matching Traffic on Certificate Status
• To search for trusted CA objects and groups to add, click the Search by name or value prompt above the Available
Trusted CAs list, then type either the name of the object, or a value in the object. The list updates as you type to
display matching objects.
To select an object, click it. To select multiple objects, use the Shift and Ctrl keys, or right-click and then select Select
All.
Step 5 Click Add to Rule to add the selected objects to the Selected Trusted CAs list.
You can also drag and drop selected objects.
You can choose to match against the presence or absence of multiple certificate statuses in a single certificate
status rule condition; the certificate needs to only match one of the criteria to match the rule.
The following table describes how the ASA FirePOWER module evaluates encrypted traffic based on the
encrypting server certificate’s status.
Revoked The policy trusts the CA that issued the server The policy trusts the CA that issued the server certificate,
certificate, and the CA certificate uploaded to the policy and the CA certificate uploaded to the policy does not
contains a CRL that revokes the server certificate contain a CRL that revokes the certificate.
Self-signed The detected server certificate contains the same subject The detected server certificate contains different subject
and issuer distinguished name and issuer distinguished names.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
237
Tuning Traffic Decryption Using SSL Rules
Matching Traffic on Certificate Status
Valid All of the following are true: At least one of the following is true:
• The policy trusts the CA that issued the certificate • The policy does not trust the CA that issued the
certificate
• The signature is valid
• The signature is invalid
• The issuer is valid
• The issuer is invalid
• None of the policy’s trusted CAs revoked the
certificate. • A trusted CA in the policy revoked the certificate
• The current date is between the certificate Valid • The current date is before the certificate Valid From
From and Valid To date date
• The current date is after the certificate Valid To date
Invalid The certificate’s signature cannot be properly validated The certificate’s signature is properly validated against
signature against the certificate’s content. the certificate’s content.
Invalid issuer The issuer CA certificate is not stored in the policy’s The issuer CA certificate is stored in the policy’s list of
list of trusted CA certificates. trusted CA certificates.
Expired The current date is after the certificate Valid To date. The current date is before or on the certificate Valid To
date.
Not yet valid The current date is before the certificate Valid From The current date is after or on the certificate Valid From
date. date.
Consider the following example. The organization trusts the Verified Authority certificate authority. The
organization does not trust the Spammer Authority certificate authority. The system administrator uploads
the Verified Authority certificate and an intermediate CA certificate issued by Verified Authority to the
module. Because Verified Authority revoked a certificate it previously issued, the system administrator uploads
the CRL that Verified Authority distributed.
The following graphic illustrates a certificate status rule condition checking for valid certificates, those issued
by Verified Authority, not on the CRL, and still within the Valid From and Valid To date. Because of the
configuration, traffic encrypted with these certificates is not decrypted and inspected with access control.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
238
Tuning Traffic Decryption Using SSL Rules
Matching Traffic on Certificate Status
The following graphic illustrates a certificate status rule condition checking for the absence of a status. In this
case, because of the configuration, it matches against traffic encrypted with a certificate that has not expired
key. 6>
Note that even though a certificate may match more than one status, the rule only takes an action on the traffic
once.
Note The first time the system detects an encrypted session to a new server, certificate status is not available for
ClientHello processing, which can result in an undecrypted first session. After the initial session, the managed
device caches data from the server Certificate message. For subsequent connections from the same client, the
system can match the ClientHello message conclusively to rules with certificate status conditions and process
the message to maximize decryption potential.
Step 1 In the SSL policy where you want to control encrypted traffic based on server certificate status, create a new SSL rule
or edit an existing rule.
For detailed instructions, see Understanding and Creating SSL Rules, on page 200.
Step 2 In the SSL rule editor, select the Cert Status tab.
The Cert Status tab appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
239
Tuning Traffic Decryption Using SSL Rules
Controlling Encrypted Traffic by Cipher Suite
Step 3 For each certificate status, you have the following options:
• Select Yes to match against the presence of that certificate status.
• Select No to match against the absence of that certificate status.
• Select Do Not Match to not match that certificate status.
Note You cannot add new cipher suites. You can neither modify nor delete predefined cipher suites.
You can add a maximum of 50 cipher suites and cipher suite lists to the Selected Cipher Suites in a single
Cipher Suite condition.
Note the following:
• If you add cipher suites not supported for your deployment, you cannot apply the access control policy
associated with the SSL policy. For example, passive deployments do not support decrypting traffic with
the any of the ephemeral Diffie-Hellman (DHE) or ephemeral elliptic curve Diffie-Hellman (ECDHE)
cipher suites. Creating a rule with these cipher suites prevents you from applying your access control
policy.
• If you configure a cipher suite condition with a cipher suite, any external certificate objects you add to
a certificate condition, or internal CA objects you associate with the Decrypt - Resign action, must match
the cipher suite’s signature algorithm type. For example, if your rule’s cipher suite condition references
an EC-based cipher suite, any server certificates you add, or CA certificates you associate with the
Decrypt - Resign action, must also be EC-based. If you mismatch signature algorithm types in this case,
the policy editor displays a warning icon next to the rule. For more information, see Controlling Encrypted
Traffic by Cipher Suite, on page 240 and Decrypt Actions: Decrypting Traffic for Further Inspection, on
page 208.
• You can add an anonymous cipher suite to the Cipher Suite condition in an SSL rule, but keep in mind:
• The system automatically strips anonymous cipher suites during ClientHello processing. For the
system to use the rule, you must also configure your SSL rules in an order that prevents ClientHello
processing. For more information, see Ordering SSL Rules to Improve Performance and Avoid
Preemption, on page 213.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
240
Tuning Traffic Decryption Using SSL Rules
Controlling Traffic by Encryption Protocol Version
• You cannot use either the Decrypt - Resign or Decrypt - Known Key action in the rule, because
the system cannot decrypt traffic encrypted with an anonymous cipher suite.
• When specifying a cipher suite as a rule condition, consider that the rule matches on the negotiated cipher
suite in the ServerHello message, rather than on the full list of cipher suites specified in the ClientHello
message. During ClientHello processing, the managed device strips unsupported cipher suites from the
ClientHello message. However, if this results in all specified cipher suites being stripped, the system
retains the original list. If the system retains unsupported cipher suites, subsequent evaluation results in
an undecrypted session.
Step 1 In the SSL policy where you want to control encrypted traffic by cipher suite, create a new SSL rule or edit an existing
rule.
For detailed instructions, see Understanding and Creating SSL Rules, on page 200.
Step 2 In the SSL rule editor, select the Cipher Suite tab.
The Cipher Suite tab appears.
Step 3 Find and select the cipher suites you want to add from the Available Cipher Suites, as follows;
• To add a cipher suite list on the fly, which you can then add to the condition, click the add icon above the Available
Cipher Suites list; see Working with Geolocation Objects, on page 60.
• To search for cipher suites and lists to add, click the Search by name or value prompt above the Available Cipher
Suites list, then type either the name of the cipher suite, or a value in the cipher suite. The list updates as you type
to display matching cipher suites.
To select a cipher suite, click it. To select multiple cipher suites, use the Shift and Ctrl keys, or right-click and then select
Select All.
Step 4 Click Add to Rule to add the selected cipher suites to the Selected Cipher Suites list.
You can also drag and drop selected cipher suites.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
241
Tuning Traffic Decryption Using SSL Rules
Controlling Traffic by Encryption Protocol Version
Note You cannot select SSL v2.0 in a version rule condition; the ASA FirePOWER module does not support
decrypting traffic encrypted with SSL version 2.0. You can configure an undecryptable action to allow or
block this traffic without further inspection. For more information, see Logging Decryptable Connections
with SSL Rules, on page 396.
Step 1 In the SSL policy where you want to control encrypted traffic by encryption protocol version, create a new SSL rule or
edit an existing rule.
For detailed instructions, see Understanding and Creating SSL Rules, on page 200.
Step 3 Select the protocol versions you want to match against: SSL v3.0, TLS v1.0, TLS v1.1, or TLS v1.2.
Step 4 Add or continue editing the rule.
You must apply the access control policy associated with the SSL policy for your changes to take effect; see Deploying
Configuration Changes, on page 73.
What to do next
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
242
CHAPTER 18
Understanding Network Analysis and Intrusion
Policies
Network analysis and intrusion policies work together as part of the ASA FirePOWER module intrusion
detection and prevention feature. The term intrusion detection generally refers to the process of passively
analyzing network traffic for potential intrusions and storing attack data for security analysis. The term intrusion
prevention includes the concept of intrusion detection, but adds the ability to block or alter malicious traffic
as it travels across your network.
• About Network Analysis and Intrusion Policies, on page 243
• Understanding How Policies Examine Traffic For Intrusions, on page 244
• Comparing System-Provided with Custom Policies, on page 249
• Using the Navigation Panel, on page 255
• Resolving Conflicts and Committing Policy Changes, on page 257
Both network analysis and intrusion policies are invoked by a parent access control policy, but at different
times. As the system analyzes traffic, the network analysis (decoding and preprocessing) phase occurs before
and separately from the intrusion prevention (additional preprocessing and intrusion rules) phase. Together,
network analysis and intrusion policies provide broad and deep packet inspection. They can help you detect,
alert on, and protect against network traffic that could threaten the availability, integrity, and confidentiality
of hosts and their data.
The ASA FirePOWER moduleis delivered with several similarly named network analysis and intrusion policies
(for example, Balanced Security and Connectivity) that complement and work with each other. By using
system-provided policies, you can take advantage of the experience of the Cisco Vulnerability Research Team
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
243
Understanding Network Analysis and Intrusion Policies
Understanding How Policies Examine Traffic For Intrusions
(VRT). For these policies, the VRT sets intrusion and preprocessor rule states, as well as provides the initial
configurations for preprocessors and other advanced settings.
You can also create custom network analysis and intrusion policies. You can tune settings in custom policies
to inspect traffic in the way that matters most to you.
You create, edit, save, and manage network analysis and intrusion policies using similar policy editors. When
you are editing either type of policy, a navigation panel appears on the left side of the user interface; the right
side displays various configuration pages.
This chapter contains a brief overview of the types of configurations the network analysis and intrusion policies
govern, explains how the policies work together to examine traffic and generate records of policy violations,
and provides basic information on navigating the policy editors. This chapter also explains the benefits and
limitations of using custom versus system-provided policies. To customize your intrusion deployment, see
the following for your next steps:
• Working with Variable Sets, on page 29 explains how to configure the system’s intrusion variables to
accurately reflect your network environment. Even if you do not use custom policies, Cisco strongly
recommends that you modify the default variables in the default variable set. Advanced users can create
and use custom variable sets for pairing with one or more custom intrusion policies.
• About Intrusion Policies, on page 279 explains how to create and edit a simple custom intrusion policy.
• Controlling Traffic Using Intrusion and File Policies, on page 137 explains how to configure the system
to use intrusion policies to examine only the traffic you are interested in by associating intrusion policies
with a parent access control policy. It also explains how to configure advanced intrusion policy
performance options.
• Using Layers in a Network Analysis or Intrusion Policy Layers, on page 259 explain how, in larger
organizations or complex deployments, you can use building blocks called policy layers to more efficiently
manage multiple network analysis or intrusion policies.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
244
Understanding Network Analysis and Intrusion Policies
Decoding, Normalizing, and Preprocessing: Network Analysis Policies
Similarly, at each step of the process, a packet could cause the system to generate an event. Intrusion and
preprocessor events (sometimes referred to collectively as intrusion events ) are indications that a packet or
its contents may represent a security risk.
Note that for a single connection, although the system selects a network analysis policy before an access
control rule as shown in the diagram, some preprocessing (notably application layer preprocessing) occurs
after access control rule selection. This does not affect how you configure preprocessing in custom network
analysis policies.
A network analysis policy governs packet processing in phases. First the system decodes packets through the
first three TCP/IP layers, then continues with normalizing, preprocessing, and detecting protocol anomalies.
• The packet decoder converts packet headers and payloads into a format that can be easily used by the
preprocessors and later, intrusion rules. Each layer of the TCP/IP stack is decoded in turn, beginning
with the data link layer and continuing through the network and transport layers. The packet decoder
also detects various anomalous behaviors in packet headers.
• In inline deployments, the inline normalization preprocessor reformats (normalizes) traffic to minimize
the chances of attackers evading detection. It prepares packets for examination by other preprocessors
and intrusion rules, and helps ensure that the packets the system processes are the same as the packets
received by the hosts on your network.
• Various network and transport layers preprocessors detect attacks that exploit IP fragmentation, perform
checksum validation, and perform TCP and UDP session preprocessing.
Note that some advanced transport and network preprocessor settings apply globally to all traffic handled by
an access control policy. You configure these in the access control policy rather than in a network analysis
policy.
• Various application-layer protocol decoders normalize specific types of packet data into formats that the
intrusion rules engine can analyze. Normalizing application-layer protocol encodings allows the system
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
245
Understanding Network Analysis and Intrusion Policies
Decoding, Normalizing, and Preprocessing: Network Analysis Policies
to effectively apply the same content-related intrusion rules to packets whose data is represented differently,
and to obtain meaningful results. For more information.
• The Modbus and DNP3 SCADA preprocessors detect traffic anomalies and provide data to intrusion
rules. Supervisory Control and Data Acquisition (SCADA) protocols monitor, control, and acquire data
from industrial, infrastructure, and facility processes such as manufacturing, production, water treatment,
electric power distribution, airport and shipping systems, and so on.
• Several preprocessors allow you to detect specific threats, such as Back Orifice, portscans, SYN floods
and other rate-based attacks.
Note that you configure the sensitive data preprocessor, which detects sensitive data such as credit card
numbers and Social Security numbers in ASCII text, in intrusion policies.
In a newly created access control policy, one default network analysis policy governs preprocessing for all
traffic for all intrusion policies invoked by the same parent access control policy. Initially, the system uses
the Balanced Security and Connectivity network analysis policy as the default, but you can change it to another
system-provided or custom network analysis policy. In a more complex deployment, advanced users can tailor
traffic preprocessing options to specific security zones and networks by assigning different custom network
analysis policies to preprocess matching traffic. For more information, see Comparing System-Provided with
Custom Policies, on page 249.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
246
Understanding Network Analysis and Intrusion Policies
Access Control Rules: Intrusion Policy Selection
Note All packets, regardless of which network analysis policy preprocesses them, are matched to configured access
control rules—and thus are potentially subject to inspection by intrusion policies—in top-down order. For
more information, see Limitations of Custom Policies, on page 253.
The diagram in Understanding How Policies Examine Traffic For Intrusions, on page 244 shows the flow of
traffic through a device in an inline, intrusion prevention and AMP deployment, as follows:
• The access control rule allows matching traffic to proceed. The traffic is then inspected for prohibited
files and malware by a file policy, and then for intrusions by an intrusion policy.
• In this scenario, the access control policy’s default action allows matching traffic. The traffic is then
inspected by an intrusion policy. You can (but do not have to) use a different intrusion policy when you
associate intrusion policies with access control rules or the default action.
The example in the diagram does not include any blocking or trusting rules because the system does not
inspect blocked or trusted traffic. For more information, see Using Rule Actions to Determine Traffic Handling
and Inspection, on page 95 and Setting Default Handling and Inspection for Network Traffic, on page 66.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
247
Understanding Network Analysis and Intrusion Policies
Intrusion Event Generation
in the rule. The system compares packets against the conditions specified in each rule and, if the packet data
matches all the conditions specified in a rule, the rule triggers.
The system includes the following types of rules created by the VRT:
• shared object intrusion rules , which are compiled and cannot be modified (except for rule header
information such as source and destination ports and IP addresses)
• standard text intrusion rules , which can be saved and modified as new custom instances of the rule.
• preprocessor rules , which are rules associated with preprocessors and packet decoder detection options
in the network analysis policy. You cannot copy or edit preprocessor rules. Most preprocessor rules are
disabled by default; you must enable them to use preprocessors to generate events and, in an inline
deployment, drop offending packets.
When the system processes packets according to an intrusion policy, first a rule optimizer classifies all activated
rules in subsets based on criteria such as: transport layer, application protocol, direction to or from the protected
network, and so on. Then, the intrusion rules engine selects the appropriate rule subsets to apply to each packet.
Finally, a multi-rule search engine performs three different types of searches to determine if the traffic matches
the rule:
• The protocol field search looks for matches in particular fields in an application protocol.
• The generic content search looks for ASCII or binary byte matches in the packet payload.
• The packet anomaly search looks for packet headers and payloads that, rather than containing specific
content, violate well-established protocols.
In a custom intrusion policy, you can tune detection by enabling and disabling rules, as well as by writing
and adding your own standard text rules.
Variable Sets
Whenever the system uses an intrusion policy to evaluate traffic, it uses an associated variable set . Most
variables in a set represent values commonly used in intrusion rules to identify source and destination IP
addresses and ports. You can also use variables in intrusion policies to represent IP addresses in rule
suppressions and dynamic rule states.
The system provides a single default variable set, which is comprised of predefined default variables. Most
system-provided shared object rules and standard text rules use these predefined default variables to define
networks and port numbers. For example, the majority of the rules use the variable $HOME_NET to specify
the protected network and the variable $EXTERNAL_NET to specify the unprotected (or outside) network.
In addition, specialized rules often use other predefined variables. For example, rules that detect exploits
against web servers use the $HTTP_SERVERS and $HTTP_PORTS variables.
Tip Even if you use system-provided intrusion policies, Cisco strongly recommends you modify key default
variables in the default set. When you use variables that accurately reflect your network environment, processing
is optimized and the system can monitor relevant systems for suspicious activity. Advanced users can create
and use custom variable sets for pairing with one or more custom intrusion policies. For more information,
see Optimizing Predefined Default Variables, on page 30.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
248
Understanding Network Analysis and Intrusion Policies
Comparing System-Provided with Custom Policies
When the system identifies a possible intrusion, it generates an intrusion or preprocessor event (sometimes
collectively called intrusion events ). You can view the data to gain a greater understanding of the attacks
against your network assets. In an inline deployment, the system can also drop or replace packets that you
know to be harmful.
Each intrusion event includes an event header and contains information about the event name and classification;
the source and destination IP addresses; ports; the process that generated the event; and the date and time of
the event, as well as contextual information about the source of the attack and its target. For packet-based
events, the system also logs a copy of the decoded packet header and payload for the packet or packets that
triggered the event.
The packet decoder, the preprocessors, and the intrusion rules engine can all cause the system to generate an
event. For example:
• If the packet decoder (configured in the network analysis policy) receives an IP packet that is less than
20 bytes, which is the size of an IP datagram without any options or payload, the decoder interprets this
as anomalous traffic. If, later, the accompanying decoder rule in the intrusion policy that examines the
packet is enabled, the system generates a preprocessor event.
• If the IP defragmentation preprocessor encounters a series of overlapping IP fragments, the preprocessor
interprets this as a possible attack and, when the accompanying preprocessor rule is enabled, the system
generates a preprocessor event.
• Within the intrusion rules engine, most standard text rules and shared object rules are written so that they
generate intrusion events when triggered by packets.
As the device accumulates intrusion events, you can begin your analysis of potential attacks. The system
provides you with the tools you need to review intrusion events and evaluate whether they are important in
the context of your network environment and your security policies.
Note how:
• A default network analysis policy governs the preprocessing of all traffic handled by the access control
policy. Initially, the system-provided Balanced Security and Connectivity network analysis policy is the
default.
• The default action of the access control policy allows all non-malicious traffic, as determined by the
system-provided Balanced Security and Connectivity intrusion policy .
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
249
Understanding Network Analysis and Intrusion Policies
Understanding the System-Provided Policies
• The policy uses default Security Intelligence options (global whitelist and blacklist only), does not decrypt
encrypted traffic with an SSL policy, and does not perform special handling and inspection of network
traffic using access control rules.
A simple step you can take to tune your intrusion prevention deployment is to use a different set of
system-provided network analysis and intrusion policies as your defaults. Cisco delivers several pairs of these
policies with the ASA FirePOWER module.
Or, you can tailor your intrusion prevention deployment by creating and using custom policies. You may find
that the preprocessor options, intrusion rule, and other advanced settings configured in those policies do not
address the security needs of your network. By tuning your network analysis and intrusion policies you can
configure, at a very granular level, how the system processes and inspects the traffic on your network for
intrusions.
Tip Even if you use system-provided network analysis and intrusion policies, you should configure the system’s
intrusion variables to accurately reflect your network environment. At a minimum, modify key default variables
in the default set; see Optimizing Predefined Default Variables, on page 30.
As new vulnerabilities become known, the VRT releases intrusion rule updates. These rule updates can modify
any system-provided network analysis or intrusion policy, and can provide new and updated intrusion rules
and preprocessor rules, modified states for existing rules, and modified default policy settings. Rule updates
may also delete rules from system-provided policies and provide new rule categories, as well as modify the
default variable set.
If a rule update affects your deployment, the system marks affected intrusion and network analysis policies
as out of date, as well as their parent access control policies. You must reapply an updated policy for its
changes to take effect.
For your convenience, you can configure rule updates to automatically reapply affected intrusion policies,
either alone or in combination with affected access control policies. This allows you to easily and automatically
keep your deployment up-to-date to protect against recently discovered exploits and intrusions.
To ensure up-to-date preprocessing settings, you must reapply access control policies, which also reapplies
any associated SSL, network analysis, and file policies that are different from those currently running, and
can also can update default values for advanced preprocessing and performance options. For more information,
see Importing Rule Updates and Local Rule Files, on page 485.
Cisco delivers the following network analysis and intrusion policies with the ASA FirePOWER module:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
250
Understanding Network Analysis and Intrusion Policies
Benefits of Custom Policies
Caution Cisco uses another policy, Experimental Policy 1, for testing purposes. Do not use it unless instructed to do
so by a Cisco representative.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
251
Understanding Network Analysis and Intrusion Policies
Benefits of a Custom Network Analysis Policy
Note If you disable a preprocessor in a custom network analysis policy, but the system needs to use that preprocessor
to later evaluate packets against an enabled intrusion or preprocessor rule, the system automatically enables
and uses the preprocessor although the preprocessor remains disabled in the network analysis policy user
interface.
• Specify ports, where appropriate, to focus the activity of certain preprocessors. For example, you can
identify additional ports to monitor for DNS server responses or encrypted SSL sessions, or ports on
which you decode telnet, HTTP, and RPC traffic
For advanced users with complex deployments, you can create multiple network analysis policies, each tailored
to preprocess traffic differently. Then, you can configure the system to use those policies to govern the
preprocessing of traffic using different security zones or networks.
Note Tailoring preprocessing using custom network analysis policies—especially multiple network analysis
policies—is an advanced task. Because preprocessing and intrusion inspection are so closely related, you
must be careful to allow the network analysis and intrusion policies examining a single packet to complement
each other. For more information, see Limitations of Custom Policies, on page 253.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
252
Understanding Network Analysis and Intrusion Policies
Limitations of Custom Policies
or user. The scenario in Understanding How Policies Examine Traffic For Intrusions, on page 244 shows a
deployment where traffic is inspected by one of two intrusion policies.
The main function of intrusion policies is to manage which intrusion and preprocessor rules are enabled and
how they are configured, as follows:
• Within each intrusion policy, you should verify that all rules applicable to your environment are enabled,
and improve performance by disabling rules that are not applicable to your environment. In an inline
deployment, you can specify which rules should drop or modify malicious packets. For more information,
see Setting Rule States, on page 308.
• You can modify existing rules and write new standard text rules as needed to catch new exploits or to
enforce your security policies.
Other customizations you might make to an intrusion policy include:
• The sensitive data preprocessor detects sensitive data such as credit card numbers and Social Security
numbers in ASCII text. Note that other preprocessors that detect specific threats (back orifice attacks,
several portscan types, and rate-based attacks that attempt to overwhelm your network with excessive
traffic) are configured in network analysis policies.
• Global thresholds cause the system to generate events based on how many times traffic matching an
intrusion rule originates from or is targeted to a specific address or address range within a specified time
period. This helps prevent the system from being overwhelmed with a large number of events. For more
information, see Limiting Intrusion Event Logging, on page 323.
• Suppressing intrusion event notifications and setting thresholds for individual rules or entire intrusion
policies can also can prevent the system from being overwhelmed with a large number of events. For
more information, see Filtering Intrusion Event Notification Per Policy, on page 310.
• In addition to intrusion events, you can enable logging to syslog facilities or send event data to an SNMP
trap server. Per policy, you can specify intrusion event notification limits, set up intrusion event notification
to external logging facilities, and configure external responses to intrusion events. For more information,
see Configuring External Alerting for Intrusion Rules, on page 421.
Notice how a default network analysis policy governs the preprocessing of all traffic handled by the access
control policy. Initially, the system-provided Balanced Security and Connectivity network analysis policy is
the default.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
253
Understanding Network Analysis and Intrusion Policies
Limitations of Custom Policies
A simple way to tune preprocessing is to create and use a custom network analysis policy as the default, as
summarized in Benefits of a Custom Network Analysis Policy, on page 252. However, if you disable a
preprocessor in a custom network analysis policy but the system needs to evaluate preprocessed packets
against an enabled intrusion or preprocessor rule, the system automatically enables and uses the preprocessor
although it remains disabled in the network analysis policy user interface.
Note In order to get the performance benefits of disabling a preprocessor, you must make sure that none of your
intrusion policies have enabled rules that require that preprocessor.
An additional challenge arises if you use multiple custom network analysis policies. For advanced users with
complex deployments, you can tailor preprocessing to specific security zones and networks by assigning
custom network analysis policies to preprocess matching traffic. To accomplish this, you add custom network
analysis rules to your access control policy. Each rule has an associated network analysis policy that governs
the preprocessing of traffic that matches the rule.
Tip You configure network analysis rules as an advanced setting in an access control policy. Unlike other types
of rules in the ASA FirePOWER module, network analysis rules invoke—rather than being contained
by—network analysis policies.
The system matches packets to any configured network analysis rules in top-down order by rule number.
Traffic that does not match any network analysis rule is preprocessed by the default network analysis policy.
While this allows you a great deal of flexibility in preprocessing traffic, keep in mind that all packets, regardless
of which network analysis policy preprocessed them, are subsequently matched to access control rules—and
thus to potential inspection by intrusion policies—in their own process. In other words, preprocessing a packet
with a particular network analysis policy does not guarantee that the packet will be examined with any
particular intrusion policy. You must carefully configure your access control policy so it invokes the correct
network analysis and intrusion policies to evaluate a particular packet.
The following diagram shows in focused detail how the network analysis policy (preprocessing) selection
phase occurs before and separately from the intrusion prevention (rules) phase. For simplicity, the diagram
eliminates the file/malware inspection phases. It also highlights the default network analysis and default-action
intrusion policies.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
254
Understanding Network Analysis and Intrusion Policies
Using the Navigation Panel
In this scenario, an access control policy is configured with two network analysis rules and a default network
analysis policy:
• Network Analysis Rule A preprocesses matching traffic with Network Analysis Policy A. Later, you
want this traffic to be inspected by Intrusion Policy A.
• Network Analysis Rule B preprocesses matching traffic with Network Analysis Policy B. Later, you
want this traffic to be inspected by Intrusion Policy B.
• All remaining traffic is preprocessed with the default network analysis policy. Later, you want this traffic
to be inspected by the intrusion policy associated with the access control policy’s default action.
After the system preprocesses traffic, it can examine the traffic for intrusions. The diagram shows an access
control policy with two access control rules and a default action:
• Access Control Rule A allows matching traffic. The traffic is then inspected by Intrusion Policy A.
• Access Control Rule B allows matching traffic. The traffic is then inspected by Intrusion Policy B.
• The access control policy’s default action allows matching traffic. The traffic is then inspected by the
default action’s intrusion policy.
Each packet’s handling is governed by a network analysis policy and intrusion policy pair, but the system
does not coordinate the pair for you. Consider a scenario where you misconfigure your access control policy
so that Network Analysis Rule A and Access Control Rule A do not process the same traffic. For example,
you could intend the paired policies to govern the handling of traffic on a particular security zone, but you
mistakenly use different zones in the two rules’ conditions. This could cause traffic to be incorrectly
preprocessed. For this reason, tailoring preprocessing using network analysis rules and custom policies is an
advanced task.
Note that for a single connection, although the system selects a network analysis policy before an access
control rule, some preprocessing (notably application layer preprocessing) occurs after access control rule
selection. This does not affect how you configure preprocessing in custom network analysis policies.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
255
Understanding Network Analysis and Intrusion Policies
Using the Navigation Panel
Network analysis and intrusion policies use similar user interfaces to edit and save changes to their
configurations; see Editing Intrusion Policies, on page 282
A navigation panel appears on the left side of the user interface when you are editing either type of policy.
The following graphic shows the navigation panel for the network analysis policy (left) and the intrusion
policy (right).
A dividing line separates the navigation panel into links to policy settings you can configure with (below) or
without (above) direct interaction with policy layers. To navigate to any settings page, click its name in the
navigation panel. Dark shading of an item in the navigation panel highlights your current settings page. For
example, in the illustration above the Policy Information page would be displayed to the right of the navigation
panel.
Policy Information
The Policy Information page provides configuration options for commonly used settings. As shown in the
illustration for the network analysis policy panel above, a policy change icon appears next to Policy
Information in the navigation panel when the policy contains unsaved changes. The icon disappears when
you save your changes.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
256
Understanding Network Analysis and Intrusion Policies
Resolving Conflicts and Committing Policy Changes
Policy Layers
The Policy Layers page displays a summary of the layers that comprise your network analysis or intrusion
policy. Expanding the Policy Layers link displays sublinks to summary pages for the layers in your policy.
Expanding each layer sublink displays further sublinks to the configuration pages for all rules, preprocessors,
or advanced settings that are enabled in the layer. For more information, see Using Layers in a Network
Analysis or Intrusion Policy Layers, on page 259.
Note After you save, you must apply a network analysis or intrusion policy for your changes to take effect. If you
apply a policy without saving, the system uses the most recently saved configuration. Although you can
reapply an intrusion policy independently, network analysis policies are applied with their parent access
control policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
257
Understanding Network Analysis and Intrusion Policies
Resolving Conflicts and Committing Policy Changes
• You cannot save an intrusion policy if it includes enabled sensitive data rules but you have not enabled
the sensitive data preprocessor. You must either allow the system to enable the preprocessor and save
the policy, or disable the rules and save again.
• If you disable a required preprocessor in a network analysis policy, you can still save the policy. However,
the system automatically uses the disabled preprocessor with its current settings, even though the
preprocessor remains disabled in the user interface. For more information, see Limitations of Custom
Policies, on page 253.
• If you disable inline mode in a network analysis policy but enable the Inline Normalization preprocessor,
you can still save the policy. However, the system warns you that normalization settings will be ignored.
Disabling inline mode also causes the system to ignore other settings that allow preprocessors to modify
or block traffic, including checksum verification and rate-based attack prevention.
discard all unsaved changes click Discard Changes, then click OK to discard your changes and go to
the Intrusion Policy page. If you do not want to discard your changes, click
Cancel to return to the Policy Information page.
exit the policy, but cache select any menu or other path to another page. On exiting, click Leave
changes page when prompted, or click Stay on page to remain in the advanced
editor.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
258
CHAPTER 19
Using Layers in a Network Analysis or Intrusion
Policy Layers
Larger organizations with many ASA FirePOWER modules may have many intrusion policies and network
analysis policies to support the unique needs of different departments, business units or, in some instances,
different companies. Configurations in both policy types are contained in building blocks called layers, which
you can use to efficiently manage multiple policies.
Layers in intrusion and network analysis policies work in essentially the same way. You can create and edit
either policy type without consciously using layers. You can modify your policy configurations and, if you
have not added user layers to your policy, the system automatically includes your changes in a single
configurable layer that is initially named My Changes . Optionally, you can also add up to 200 layers where
you can configure any combination of settings. You can copy, merge, move, and delete user layers and, most
important, share individual user layers with other policies of the same type.
• Understanding the Layer Stack, on page 259
• Managing Layers, on page 263
Tip You can create an intrusion or network analysis policy based solely on the default settings in the base policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
259
Using Layers in a Network Analysis or Intrusion Policy Layers
Understanding the Base Layer
The following figure shows an example layer stack that, in addition to the base policy layer and the initial My
Changes layer, also includes two additional user-configurable layers, User Layer 1 and User Layer 2 . Note
in the figure that each user-configurable layer that you add is initially positioned as the highest layer in the
stack; thus, User Layer 2 in the figure was added last and is highest in the stack.
All settings in the system-added layer are inherited except for the changes that resulted in the new layer.
• When the highest layer is a shared layer, the system adds a layer when you take either of the following
actions:
• share the highest layer with other policies
• add a shared layer to your policy
• Regardless of whether you allow rule updates to modify your policy, changes in a rule update never
override changes you make in a layer. This is because changes in a rule update are made in the base
policy, which determines the default settings in your base policy layer; your changes are always made
in a higher layer, so they override any changes that a rule update makes to your base policy. See Importing
Rule Updates and Local Rule Files, on page 485 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
260
Using Layers in a Network Analysis or Intrusion Policy Layers
Understanding Custom Base Policies
If you use a system-provided policy as your base, importing rule updates may modify settings in your base
policy. However, you can configure a custom policy to not automatically make these changes to its
system-provided base policy. This allows you to update system-provided base policies manually, on a schedule
independent of rule update imports. In either case, changes that a rule update makes to your base policy do
not change or override settings in your My Changes or any other layer. For more information, see Allowing
Rule Updates to Modify a System-Provided Base Policy, on page 262.
System-provided intrusion and network analysis policies are similarly named but contain different
configurations. For example, the Balanced Security and Connectivity network analysis policy and the Balanced
Security and Connectivity intrusion policy work together and can both be updated in intrusion rule updates.
For more information, see Understanding the System-Provided Policies, on page 250.
Step 1 While editing your policy, click Policy Information in the navigation panel.
The Policy Information page appears.
Step 2 Select a base policy from the Base Policy drop-down list.
Step 3 Optionally, if you choose a system-provided base policy, click Manage Base Policy to specify whether intrusion rule
updates can automatically modify your base policy.
For more information, see Allowing Rule Updates to Modify a System-Provided Base Policy, on page 262.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
261
Using Layers in a Network Analysis or Intrusion Policy Layers
Allowing Rule Updates to Modify a System-Provided Base Policy
Step 4 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. For more information, see Resolving Conflicts and Committing
Policy Changes, on page 257 .
Rule updates do not modify a custom base policy unless both of the following conditions are met:
• You allow rule updates to modify the system-provided base policy of the parent policy, that is, the policy
that originated the custom base policy.
• You have not made changes in the parent policy that override the corresponding settings in the parent’s
base policy.
When both conditions are met, changes in the rule update are passed to the child policy, that is, the policy
using the custom base policy, when you save the parent policy.
For example, if a rule update enables a previously disabled intrusion rule, and you have not modified the
rule’s state in the parent intrusion policy, the modified rule state is passed to the base policy when you save
the parent policy.
Likewise, if a rule update modifies a default preprocessor setting and you have not modified the setting in the
parent network analysis policy, the modified setting is passed to the base policy when you save the parent
policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
262
Using Layers in a Network Analysis or Intrusion Policy Layers
Managing Layers
See Changing the Base Policy, on page 261 for more information.
To allow rule updates to modify a system-provided base policy:
Step 1 While editing a policy that uses a system-provided policy as its base policy, click Policy Information in the navigation
panel.
The Policy Information page appears.
Step 3 Select or clear the Update when a new Rule Update is installed check box.
When you save your policy with the check box cleared and then import a rule update, an Update Now button appears
on the Base Policy summary page and the status message on the page updates to inform you that the policy is out of
date. Optionally, you can click Update Now to update your base policy with the changes in the most recently imported
rule update.
Step 4 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. For more information, see Resolving Conflicts and Committing
Policy Changes, on page 257.
Managing Layers
License: Protection
The Policy Layers page provides a single-page summary of the complete layer stack for your network analysis
or intrusion policy. On this page you can add shared and unshared layers, copy, merge, move, and delete
layers, access the summary page for each layer, and access configuration pages for enabled, disabled, and
overridden configurations within each layer.
For each layer, you can view the following information:
• whether the layer is a built-in, shared user, or unshared user layer
• which layers contain the highest, that is the effective, preprocessor or advanced setting configurations,
by feature name
• in an intrusion policy, the number of intrusion rules whose states are set in the layer, and the number of
rules set to each rule state.
The feature name in the summary for each layer indicates which configurations are enabled, disabled,
overridden, or inherited in the layer, as follows:
This page also provides a summary of the net effect of all enabled preprocessors (network analysis) or advanced
settings (intrusion) and, for intrusion policies, intrusion rules.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
263
Using Layers in a Network Analysis or Intrusion Policy Layers
Managing Layers
The following table lists the actions available on the Policy Layers page.
Table 47: Network Analysis and Intrusion Policy Layer Configuration Actions
display the summary page for a layer click the layer name in the row for the layer or, alternately, click the edit icon next
to a user layer. You can also click the view icon to access the read-only summary
page for a shared layer.
See Sharing Layers Between Policies, on page 267, Configuring Preprocessors and
Advanced Settings in Layers, on page 272, and Configuring Intrusion Rules in Layers,
on page 269 for information on actions you can take on the summary page for a layer.
access a layer-level preprocessor or advanced click the feature name in the row for the layer. Note that configuration pages are
setting configuration page read-only in the base policy and in shared layers. See Configuring Preprocessors and
Advanced Settings in Layers, on page 272 for more information.
access a layer-level rule configuration page click the icon for drop and generate events , generate events or disabled in
filtered by rule state type the summary for the layer. No rules are displayed if the layer contains no rules set
to the selected rule state.
add a shared layer from another policy see Sharing Layers Between Policies, on page 267.
change a layer’s name or description see Changing a Layer's Name and Description, on page 265.
move, copy, or delete a layer see Moving, Copying, and Deleting Layers, on page 266.
merge a layer into the next layer beneath it see Merging Layers, on page 266.
Step 1 While editing your policy, click Policy Layers in the navigation panel.
The Policy Layers summary page appears.
Step 2 You can take any of the actions in the Network Analysis and Intrusion Policy Layer Configuration Actions table.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
264
Using Layers in a Network Analysis or Intrusion Policy Layers
Adding a Layer
Step 3 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. For more information, see Resolving Conflicts and Committing
Policy Changes, on page 257.
Adding a Layer
License: Protection
You can add up to 200 layers to a network analysis or intrusion policy. When you add a layer, it appears as
the highest layer in your policy. The initial state is Inherit for all features and, in an intrusion policy, no event
filtering, dynamic state, or alerting rule actions are set.
To add a layer to your network analysis or intrusion policy:
Step 1 While editing your policy, click Policy Layers in the navigation panel.
The Policy Layers page appears.
Step 4 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. For more information, see Resolving Conflicts and Committing
Policy Changes, on page 257.
Step 1 While editing your policy, click Policy Layers in the navigation panel.
The Policy Layers page appears.
Step 2 Click the edit icon next to the user layer you want to edit.
The summary page for the layer appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
265
Using Layers in a Network Analysis or Intrusion Policy Layers
Moving, Copying, and Deleting Layers
Step 4 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. For more information, see Resolving Conflicts and Committing
Policy Changes, on page 257.
Step 1 While editing your policy, click Policy Layers in the navigation panel.
The Policy Layers page appears.
The page refreshes and a copy of the layer appears as the highest layer.
• To move a layer up or down within the User Layers page area, click any open area in the layer summary and drag
until the position arrow points to a line above or below a layer where you want to move the layer.
The screen refreshes and the layer appears in the new location.
• To delete a layer, click the delete icon for the layer you want to delete, then click OK
Step 3 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. For more information, see Resolving Conflicts and Committing
Policy Changes, on page 257.
Merging Layers
License: Protection
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
266
Using Layers in a Network Analysis or Intrusion Policy Layers
Sharing Layers Between Policies
You can merge a user-configurable layer in your network analysis or intrusion policy with the next user layer
beneath it. A merged layer retains all settings that were unique to either layer, and accepts the settings from
the higher layer if both layers included settings for the same preprocessor, intrusion rule, or advanced setting.
The merged layer retains the name of the lower layer.
In the policy where you create a shared layer that you add to other policies, you can merge an unshared layer
immediately above the shared layer with the shared layer, but you cannot merge the shared layer with an
unshared layer beneath it.
In a policy where you add a shared layer that you created in another policy, you can merge the shared layer
into an unshared layer immediately beneath it and the resulting layer is no longer shared; you cannot merge
an unshared layer into a shared layer beneath it.
To merge a user layer with a user layer beneath it:
Step 1 While editing your policy, click Policy Layers in the navigation panel.
The Policy Layers page appears.
Step 2 Click the merge icon in the upper of the two layers, then click OK.
The page refreshes and the layer is merged with the layer beneath it.
Step 3 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. For more information, see Resolving Conflicts and Committing
Policy Changes, on page 257.
The master policy in the figure includes a company-wide layer with settings applicable to the policies at Site
A and Site B. It also includes site-specific layers for each policy. For example, in the case of a network analysis
policy Site A might not have web servers on the monitored network and would not require the protection or
processing overhead of the HTTP Inspect preprocessor, but both sites would likely require TCP stream
preprocessing. You could enable TCP stream processing in the company-wide layer that you share with both
sites, disable the HTTP Inspect preprocessor in the site-specific layer that you share with Site A, and enable
the HTTP Inspect preprocessor in the site-specific layer that you share with Site B. By editing configurations
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
267
Using Layers in a Network Analysis or Intrusion Policy Layers
Sharing Layers Between Policies
in a higher layer in the site-specific policies, you could also further tune the policy for each site if necessary
with any configuration adjustments.
It is unlikely that the flattened net settings in the example master policy would be useful for monitoring traffic,
but the time saved in configuring and updating the site-specific policies makes this a useful application of
policy layers.
Many other layer configurations are possible. For example, you could define policy layers by company, by
department, or by network. In the case of an intrusion policy, you could also include advanced settings in one
layer and rule settings in another.
Tip You cannot add a shared layer to a policy when your base policy is a custom policy where the layer you want
to share was created. When you attempt to save your changes, an error message indicates that the policy
includes a circular dependency. See Understanding Custom Base Policies, on page 261 for more information.
Step 1 While editing your policy, click Policy Layers in the navigation panel.
The Policy Layers page appears.
Step 2 Click the edit icon next to the layer you want to share with other policies.
The summary page for the layer appears.
Step 5 While editing your policy, click Policy Layers in the navigation panel.
The Policy Layers page appears.
Step 6 Select the shared layer you want to add from the Add Shared Layer drop-down list, then click OK.
The Policy Layers summary page appears and the shared layer you selected appears as the highest layer in your policy.
If there are no shared layers in any other policies, no drop-down list appears; click OK or Cancel on the pop-up window
to return to the Policy Layers summary page.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
268
Using Layers in a Network Analysis or Intrusion Policy Layers
Configuring Intrusion Rules in Layers
Step 7 Click the add shared layer icon next to User Layers.
The Add Shared Layer pop-up window appears.
Step 8 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache.
For more information, see Resolving Conflicts and Committing Policy Changes, on page 257.
one rule state override a rule state set for the rule in a lower layer, and ignore all thresholds, suppressions,
rate-based rule states, and alerts for that rule configured in lower layers. See Setting Rule
States, on page 308 for more information.
If you want a rule to inherit its state from the base policy or a lower layer, set the rule state to
Inherit. Note that when you are working on the intrusion policy Rules page, you cannot set a
rule state to Inherit.
Note also that rule state settings are color-coded when you view them on the Rules page for a
specific layer: rules whose effective state is set in a lower layer are highlighted in yellow; rules
whose effective state is set in a higher layer are highlighted in red; rules whose effective state
is set in the current layer are not highlighted. Because the intrusion policy Rules page is a
composite view of the net effect of all rule settings, rule states are not color-coded on this page.
one thresholdSNMP alert override a setting of the same type for the rule in a lower layer. Note that setting a threshold
overwrites any existing threshold for the rule in the layer. See Configuring Event Thresholding,
on page 311 and Adding SNMP Alerts, on page 320 for more information.
one or more suppressionrate-based cumulatively combine settings of the same type for each selected rule down to the first layer
rule state where a rule state is set for the rule. Settings below the layer where a rule state is set are ignored.
See Configuring Suppression Per Intrusion Policy, on page 314 and Adding Dynamic Rule
States, on page 317 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
269
Using Layers in a Network Analysis or Intrusion Policy Layers
Removing Multi-Layer Rule Settings
one or more comment add a comment to a rule. Comments are rule-specific, not policy- or layer-specific. You can
add one or more comments to a rule in any layer. See Adding Dynamic Rule States, on page
317 for more information.
For example, if you set a rule state to Drop and Generate Events in one layer and to Disabled in a higher layer,
the intrusion policy Rules page shows that the rule is disabled.
In another example, if you set a source-based suppression for a rule to 192.168.1.1 in one layer, and you also
set a destination-based suppression for the rule to 192.168.1.2 in another layer, the Rules page shows that the
cumulative effect is to suppress events for the source address 192.168.1.1 and the destination address
192.168.1.2. Note that suppression and rate-based rule state settings cumulatively combine settings of the
same type for each selected rule down to the first layer where a rule state is set for the rule. Settings below
the layer where a rule state is set are ignored.
To modify rules in a layer:
Step 1 While editing your intrusion policy, expand Policy Layers in the navigation panel and expand the policy layer you want
to modify.
Step 2 Click Rules immediately beneath the policy layer you want to modify.
The Rules page for the layer appears.
You can modify any of the settings in the Layer Rule Settings table. See Tuning Intrusion Policies Using Rules, on page
291 for more information on configuring intrusion rules.
To delete an individual setting from an editable layer, double-click the rule message on the Rules page for the layer to
display rule details. Click Delete next to the setting you want to delete, then click OK twice.
Step 3 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. For more information, see Resolving Conflicts and Committing
Policy Changes, on page 257.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
270
Using Layers in a Network Analysis or Intrusion Policy Layers
Accepting Rule Changes from a Custom Base Policy
Note Removing rule settings derived from a shared layer or the base policy causes any changes to this rule from
lower layers or the base policy to be ignored. To stop ignoring changes from lower layers or the base policy,
set the rule state to Inherit on the summary page for the topmost layer. See Setting Rule States, on page 308
for more information.
Step 1 While editing your intrusion policy, click Rules immediately beneath Policy Information in the navigation panel.
Tip You can also select Policy from the layer drop-down list on the Rules page for any layer, or select Manage
Rules on the Policy Information page.
The intrusion policy Rules page appears.
Step 2 Select the rule or rules from which you want to remove multiple settings. You have the following options:
• To select a specific rule, select the check box next to the rule.
• To select all the rules in the current list, select the check box at the top of the column.
See Understanding Rule Filtering in an Intrusion Policy, on page 300 and Setting a Rule Filter in an Intrusion Policy, on
page 307 for information on locating rules.
Step 5 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. For more information, see Resolving Conflicts and Committing
Policy Changes, on page 257.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
271
Using Layers in a Network Analysis or Intrusion Policy Layers
Configuring Preprocessors and Advanced Settings in Layers
When a custom network analysis or intrusion policy where you have not added layers uses another custom
policy as its base policy, you must set a rule to inherit its rule state if:
• you delete an event filter, dynamic state, or SNMP alert set for the rule in the base policy, and
• you want the rule to accept subsequent changes that you make to it in the other custom policy that you
use as your base policy
The following procedure explains how to accomplish this. See Removing Multi-Layer Rule Settings, on page
270 to accept settings for these rules in a policy where you have added layers.
To accept rule changes in a policy where you have not added layers:
Step 1 While editing your intrusion policy, expand the Policy Layers link in the navigation panel, then expand the My Changes
link.
Step 2 Click the Rules link immediately beneath My Changes.
The Rules page for the My Changes layer appears.
Step 3 Select the rule or rules whose settings you want to accept. You have the following options:
• To select a specific rule, select the check box next to the rule.
• To select all the rules in the current list, select the check box at the top of the column.
See Understanding Rule Filtering in an Intrusion Policy, on page 300 and Setting a Rule Filter in an Intrusion Policy, on
page 307 for information on locating rules.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
272
Using Layers in a Network Analysis or Intrusion Policy Layers
Configuring Preprocessors and Advanced Settings in Layers
When you enable a preprocessor or advanced setting, a sublink to the configuration page for that feature
appears beneath the layer name in the navigation panel, and an edit icon appears next to the feature on the
summary page for the layer; these disappear when you disable the feature in the layer or set it to Inherit.
Setting the state (enabled or disabled) for a preprocessor or advanced setting overrides the state and
configuration settings for that feature in lower layers. If you want a preprocessor or advanced setting to inherit
its state and configuration from the base policy or a lower layer, set it to Inherit. Note that the Inherit selection
is not available when you are working in the Settings or Advanced Settings page.
Color-coding on each layer summary page indicates as follows whether the effective configuration is in a
higher, lower, or the current layer:
• red - the effective configuration is in a higher layer
• yellow - the effective configuration is in a lower layer
• unshaded - the effective configuration is in the current layer
Because the Settings and Advanced Settings pages are composite views of all relevant settings, these page
do not use color coding to indicate the positions of effective configurations.
The system uses the configuration in the highest layer where the feature is enabled. Unless you explicitly
modify the configuration, the system uses the default configuration. For example, if you enable and modify
the network analysis DCE/RPC preprocessor in one layer, and you also enable but do not modify it in a higher
layer, the system uses the default configuration in the higher layer.
The following table describes the actions available on the summary page for user-configurable layers.
modify the layer name or description type a new value for Name or Description.
share the layer with other intrusion policies select Allow this layer to be used by other policies.
See Sharing Layers Between Policies, on page 267 for more information.
enable or disable a preprocessor/advanced setting in click Enabled or Disabled next to the feature.
the current layer
When you enable, a sublink to the configuration page appears beneath the
layer name in the navigation panel, and an edit icon appears on the summary
page next to the feature.
Disabling removes the sublink and edit icon.
access the configuration page for an enabled click the edit icon or the feature sublink to modify the current configuration.
preprocessor/advanced setting
Note that the Back Orifice preprocessor has no user-configurable options.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
273
Using Layers in a Network Analysis or Intrusion Policy Layers
Configuring Preprocessors and Advanced Settings in Layers
Step 1 While editing your policy, expand Policy Layers in the navigation panel, then click the name of the layer you want to
modify.
The summary page for the layer appears.
Step 2 You can take any of the actions in the Layer Summary Page Actions table.
Step 3 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. For more information, see Resolving Conflicts and Committing
Policy Changes, on page 257.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
274
CHAPTER 20
Tuning Preprocessing in Passive Deployments
Typically, the system uses the static settings in your network analysis policy to preprocess and analyze traffic.
With the adaptive profiles feature, however, the system can adapt to network traffic by associating traffic with
host information and processing the traffic accordingly.
When a host receives traffic, the operating system running on the host reassembles IP fragments. The order
used for that reassembly depends on the operating system. Similarly, each operating system may implement
TCP in different ways, and therefore reassemble TCP streams differently. If preprocessors reassemble data
using a format other than that used for the operating system of the destination host, the system may miss
content that could be malicious when reassembled on the receiving host.
Tip In a passive deployment, Cisco recommends that you configure adaptive profiles. In an inline deployment,
Cisco recommends that you configure the inline normalization preprocessor with the Normalize TCP Payload
option enabled.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
275
Tuning Preprocessing in Passive Deployments
Configuring Adaptive Profiles
For example, you configure adaptive profiles for the 10.6.0.0/16 subnet and set the default IP Defragmentation
target-based policy to Linux. The ASA FirePOWER module where you configure the settings includes the
10.6.0.0/16 subnet.
When a device detects traffic from Host A, which is not in the 10.6.0.0/16 subnet, it uses the Linux target-based
policy to reassemble IP fragments. However, when it detects traffic from Host B, which is in the 10.6.0.0/16
subnet, it retrieves Host B’s operating system data, where Host B is running Microsoft Windows XP
Professional. The system uses the Windows target-based profile to do the IP defragmentation for the traffic
destined for Host B.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
276
Tuning Preprocessing in Passive Deployments
Configuring Adaptive Profiles
Tip You can apply adaptive profiles to all hosts in the network by using a variable with a value of any or by
specifying 0.0.0.0/0 as the network value.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon next to the access control policy you want to edit.
The access control policy editor appears.
Step 3 Select the Advanced tab.
The access control policy advanced settings page appears.
Step 4 Click the edit icon next to Detection Enhancement Settings.
The Detection Enhancement Settings pop-up window appears.
Step 5 Select Adaptive Profiles - Enabled to enable adaptive profiles.
Step 6 Optionally, in the Adaptive Profiles - Attribute Update Interval field, type the number of minutes that should elapse
between synchronization of data.
Note Increasing the value for this option could improve performance in a large network.
Step 7 In the Adaptive Profiles - Networks field, type the specific IP address, address block, or variable, or a list that includes
any of these addressing methods separated by commas, to identify any host in the network for which you want to use
adaptive profiles.
See Working with Variable Sets, on page 29 for information on configuring variables.
Step 8 Click OK to retain your settings.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
277
Tuning Preprocessing in Passive Deployments
Configuring Adaptive Profiles
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
278
CHAPTER 21
Getting Started with Intrusion Policies
This chapter explains how to create a simple custom intrusion policy. The chapter also contains basic
information on managing intrusion policies: editing, comparing, and so on.
• About Intrusion Policies, on page 279
• Creating a Custom Intrusion Policy, on page 280
• Managing Intrusion Policies, on page 281
• Editing Intrusion Policies, on page 282
• Applying an Intrusion Policy, on page 285
• Generating a Report of Current Intrusion Settings, on page 286
• Comparing Two Intrusion Policies or Revisions, on page 287
Tip System-provided intrusion and network analysis policies are similarly named but contain different
configurations. For example, the Balanced Security and Connectivity network analysis policy and the Balanced
Security and Connectivity intrusion policy work together and can both be updated in intrusion rule updates.
However, the network analysis policy governs mostly preprocessing options, whereas the intrusion policy
governs mostly intrusion rules. About Network Analysis and Intrusion Policies, on page 243 provides an
overview of how network analysis and intrusion policies work together to examine your traffic, as well as
some basics on using the navigation panel, resolving conflicts, and committing changes.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
279
Getting Started with Intrusion Policies
Creating a Custom Intrusion Policy
• Configure various advanced settings such as external alerting, sensitive data preprocessing, and global
rule thresholding.
• Use layers as building blocks to efficiently manage multiple intrusion policies.
When tailoring your intrusion policy, especially when enabling and adding rules, keep in mind that some
intrusion rules require that traffic first be decoded or preprocessed in a certain way. Before an intrusion policy
examines a packet, the packet is preprocessed according to configurations in a network analysis policy. If you
disable a required preprocessor, the system automatically uses it with its current settings, although the
preprocessor remains disabled in the network analysis policy user interface.
Note Because preprocessing and intrusion inspection are so closely related, the network analysis and intrusion
policies examining a single packet must complement each other. Tailoring preprocessing, especially using
multiple custom network analysis policies, is an advanced task. For more information, see Limitations of
Custom Policies, on page 253.
After you configure a custom intrusion policy, you can use it as part of your access control configuration by
associating the intrusion policy with one or more access control rules or an access control policy’s default
action. This forces the system to use the intrusion policy to examine certain allowed traffic before the traffic
passes to its final destination. A variable set that you pair with the intrusion policy allows you to accurately
reflect your home and external networks and, as appropriate, the servers on your network. For more information,
see Controlling Traffic Using Intrusion and File Policies, on page 137.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Tip You can also import a policy from another ASA FirePOWER module; see Importing and Exporting
Configurations, on page 513.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
280
Getting Started with Intrusion Policies
Managing Intrusion Policies
If you have unsaved changes in another policy, click Cancel when prompted to return to the Intrusion Policy page. See
Resolving Conflicts and Committing Policy Changes, on page 257 for information on saving unsaved changes in another
policy.
The Create Intrusion Policy pop-up window appears.
Options on the Intrusion Policy page allow you to take the actions in the following table.
create a new intrusion policy click Create Policy. Creating a Custom Intrusion
Policy, on page 280
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
281
Getting Started with Intrusion Policies
Editing Intrusion Policies
edit an existing intrusion policy click the edit icon ( ) . Editing Intrusion Policies, on page
282
reapply an intrusion policy click the apply icon ( ). Applying an Intrusion Policy, on
page 285
export an intrusion policy to import click the export icon ( ). Exporting Configurations, on page
on another ASA FirePOWER module 513
view a PDF report that lists the click the report icon ( ). Generating a Report of Current
current configuration settings in a Intrusion Settings, on page 286
intrusion policy
compare the settings of two intrusion click Compare Policies. Comparing Two Intrusion Policies
policies or two revisions of the same or Revisions, on page 287
policy
specify drop behavior in an inline select or clear the Drop when Inline check box Setting Drop Behavior in an Inline
deployment on the Policy Information page. Deployment, on page 283
change the base policy select a base policy from the Base Policy Changing the Base Policy, on page 261
drop-down list on the Policy Information page.
view the settings in the base policy click Manage Base Policy on the Policy Understanding the Base Layer, on page
Information page 260
display or configure intrusion rules click Manage Rules on the Policy Information Viewing Rules in an Intrusion Policy, on
page. page 293
display a filtered view of intrusion on the Policy Information page, click View next Filtering Rules in an Intrusion Policy, on
rules by current rule state and, to the number of rules under Manage Rules that page 299
optionally, configure those rules are set to Generate Events or to Drop and Generate
Events.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
282
Getting Started with Intrusion Policies
Setting Drop Behavior in an Inline Deployment
enable, disable, or edit advanced click Advanced Settings in the navigation panel Configuring Advanced Settings in an
settings Intrusion Policy, on page 284
manage policy layers click Policy Layers in the navigation panel Using Layers in a Network Analysis or
Intrusion Policy Layers, on page 259
When tailoring an intrusion policy, especially when enabling and adding rules, keep in mind that some intrusion
rules require that traffic first be decoded or preprocessed in a certain way. Before an intrusion policy examines
a packet, the packet is preprocessed according to configurations in a network analysis policy. If you disable
a required preprocessor, the system automatically uses it with its current settings, although the preprocessor
remains disabled in the network analysis policy user interface.
Note Because preprocessing and intrusion inspection are so closely related, the network analysis and intrusion
policies examining a single packet must complement each other. Tailoring preprocessing, especially using
multiple custom network analysis policies, is an advanced task. For more information, see Limitations of
Custom Policies, on page 253.
The system caches one intrusion policy. While editing an intrusion policy, if you select any menu or other
path to another page, your changes stay in the system cache even if you leave the page. In addition to the
actions you can perform in the table above, About Network Analysis and Intrusion Policies, on page 243
provides information on resolving conflicts and committing changes
To edit a intrusion policy:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the intrusion policy you want to configure.
The intrusion policy editor appears, focused on the Policy Information page and with a navigation panel on the left.
Step 3 Edit your policy. Take any of the actions summarized above.
Step 4 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache. For
more information, see Resolving Conflicts and Committing Policy Changes, on page 257.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
283
Getting Started with Intrusion Policies
Configuring Advanced Settings in an Intrusion Policy
For intrusion rules to affect traffic, you must correctly configure drop rules and rules that replace content, as
well as correctly deploy the system inline. Finally, you must enable the intrusion policy’s drop behavior , or
Drop when Inline setting.
Note To block the transfer of malware files over FTP, you must not only correctly configure network-based advanced
malware protection (AMP), but also enable Drop when Inline in your access control policy’s default intrusion
policy.
If you want to assess how your configuration would function in an inline deployment without actually affecting
traffic, you can disable drop behavior. In this case, the system generates intrusion events but does not drop
packets that trigger drop rules. When you are satisfied with the results, you can enable drop behavior.
Note that in passive deployments the system cannot affect traffic regardless of the drop behavior. In other
words, in a passive deployment, rules set to Drop and Generate Events behave identically to rules set to
Generate Events—the system generates intrusion events but cannot drop packets.
When you view intrusion events, workflows can include the inline result , which indicates whether traffic
was actually dropped, or whether it only would have dropped. When a packet matches a drop rule, the inline
result is:
• Dropped, for packets dropped by a correctly configured inline deployment with drop behavior enabled.
• Would have dropped , for packets that were not dropped either because your device is deployed passively
or because drop behavior is disabled. Note that the inline result is always Would have dropped for packets
seen while the system is pruning, regardless of deployment.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon next to the policy you want to edit.
The Policy Information page appears.
Step 4 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache. For
more information, see Resolving Conflicts and Committing Policy Changes, on page 257.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
284
Getting Started with Intrusion Policies
Applying an Intrusion Policy
An intrusion policy’s advanced settings require specific expertise to configure. The base policy for your
intrusion policy determines which advanced settings are enabled by default and the default configuration for
each.
When you select Advanced Settings in the navigation panel of an intrusion policy, the policy lists its advanced
settings by type. On the Advanced Settings page, you can enable or disable advanced settings in your intrusion
policy, as well as access advanced setting configuration pages.
An advanced setting must be enabled for you to configure it. When you enable an advanced setting, a sublink
to the configuration page for the advanced setting appears beneath the Advanced Settings link in the navigation
panel, and an Edit link to the configuration page appears next to the advanced setting on the Advanced Settings
page.
Tip To revert an advanced setting’s configuration to the settings in the base policy, click Revert to Defaults on
the configuration page for the advanced setting. When prompted, confirm that you want to revert.
When you disable an advanced setting, the sublink and Edit link no longer appear, but your configurations
are retained. Note that some intrusion policy configurations (sensitive data rules, SNMP alerts for intrusion
rules) require enabled and correctly configured advanced settings. You cannot save an intrusion policy
misconfigured in this way; see Resolving Conflicts and Committing Policy Changes, on page 257.
Modifying the configuration of an advanced setting requires an understanding of the configuration you are
modifying and its potential impact on your network. The following sections provide links to specific
configuration details for each advanced setting.
External Responses
In addition to the various views of intrusion events within the user interface, you can enable logging to system
log (syslog) facilities or send event data to an SNMP trap server. Per policy, you can specify intrusion event
notification limits, set up intrusion event notification to external logging facilities, and configure external
responses to intrusion events.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
285
Getting Started with Intrusion Policies
Generating a Report of Current Intrusion Settings
After you apply an intrusion policy using access control (see Deploying Configuration Changes, on page 73),
you can reapply the intrusion policy at any time. This allows you to implement intrusion policy changes on
your monitored network without reapplying the access control policy. While reapplying, you can also view
a comparison report to review the changes made since the last time the intrusion policy was applied.
Note the following when reapplying intrusion policies:
• You can schedule intrusion policy reapply tasks to recur on a regular basis; see Automating Applying
an Intrusion Policy, on page 445.
• When you import a rule update, you can automatically apply intrusion policies after the import completes.
If you do not enable this option, you must manually reapply the policies changed by the rule update. See
Importing Rule Updates and Local Rule Files, on page 485 for more information.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the apply icon ( ) next to the policy you want to reapply.
The Reapply Intrusion Policy window appears.
Section Description
Policy Information Provides the name and description of the intrusion policy, the name of the user who last
modified the policy, and the date and time the policy was last modified. Also indicates
whether dropping packets in an inline deployment is enabled or disabled, the current
rule update version, and whether the base policy is locked to the current rule update.
Advanced Settings Lists all enabled intrusion policy advanced settings and their configurations.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
286
Getting Started with Intrusion Policies
Comparing Two Intrusion Policies or Revisions
You can also generate a comparison report that compares two intrusion policies, or two revisions of the same
policy. For more information, see Comparing Two Intrusion Policies or Revisions, on page 287.
To view an intrusion policy report:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the report icon ( ) next to the intrusion policy for which you want to generate a report. Remember to commit any
potential changes before you generate an intrusion policy report; only committed changes appear in the report.
The system generates the intrusion policy report. You are prompted to save the report to your computer.
You can use this to view and navigate both policy revisions on the user interface, with their differences
highlighted.
• The comparison report creates a record of only the differences between two intrusion policies or intrusion
policy revisions in a format similar to the intrusion policy report, but in PDF format.
You can use this to save, copy, print and share your policy comparisons for further examination.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
287
Getting Started with Intrusion Policies
Using the Intrusion Policy Comparison Report
• Green indicates that the highlighted setting appears in one policy or policy revision but not the other.
You can perform any of the actions described in the following table.
navigate individually through changes click Previous or Next above the title bar.
Tip You can use a similar procedure to compare SSL, access control, network analysis, file, or system policies.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
288
Getting Started with Intrusion Policies
Using the Intrusion Policy Comparison Report
Step 3 From the Compare Against drop-down list, select the type of comparison you want to make:
• To compare two different policies, select Other Policy.
• To compare two revisions of the same policy, select Other Revision.
Remember to commit any changes before you generate an intrusion policy report; only committed changes appear in the
report.
Step 4 Depending on the comparison type you selected, you have the following choices:
• If you are comparing two different policies, select the policies you want to compare from the Policy A and Policy
B drop-down lists.
• If you are comparing two revisions of the same policy, select the policy from the Policy drop-down list, then select
the revisions you want to compare from the Revision A and Revision B drop-down lists.
Step 6 Click Comparison Report to generate the intrusion policy comparison report.
Step 7 The intrusion policy report appears. You are prompted to save the report to your computer.
What to do next
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
289
Getting Started with Intrusion Policies
Using the Intrusion Policy Comparison Report
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
290
CHAPTER 22
Tuning Intrusion Policies Using Rules
You can use the Rules page in an intrusion policy to configure rule states and other settings for shared object
rules, standard text rules, and preprocessor rules.
You enable a rule by setting its rule state to Generate Events or to Drop and Generate Events. Enabling a rule
causes the system to generate events on traffic matching the rule. Disabling a rule stops processing of the rule.
Optionally, you can set your intrusion policy so that a rule set to Drop and Generate Events in an inline
deployment generates events on, and drops, matching traffic. See Setting Drop Behavior in an Inline
Deployment, on page 283 for more information. In a passive deployment, a rule set to Drop and Generate
Events just generates events on matching traffic.
You can filter rules to display a subset of rules, enabling you to select the exact set of rules where you want
to change rule states or rule settings.
When an intrusion rule or rule argument requires a disabled preprocessor, the system automatically uses it
with its current configuration even though it remains disabled in the network analysis policy’s user interface.
For more information, see Limitations of Custom Policies, on page 253.
See the following sections for more information:
• Understanding Intrusion Prevention Rule Types, on page 292 describes the intrusion rules and preprocessor
rules you can view and configure in an intrusion policy.
• Viewing Rules in an Intrusion Policy, on page 293 describes how you can change the order of rules on
the Rules page, interpret the icons on the page, and focus in on rule details.
• Filtering Rules in an Intrusion Policy, on page 299 describes how you can use rule filters to find the rules
for which you want to apply rule settings.
• Setting Rule States, on page 308 describes how to enable and disable rules from the Rules page.
• Filtering Intrusion Event Notification Per Policy, on page 310 explains how to set event filtering thresholds
for specific rules and set suppression on specific rules.
• Adding Dynamic Rule States, on page 317 explains how to set rule states that trigger dynamically when
rate anomalies are detected in matching traffic.
• Adding SNMP Alerts, on page 320 describes how to associate SNMP alerts with specific rules.
• Adding Rule Comments, on page 321 describes how to add comments to rules in an intrusion policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
291
Tuning Intrusion Policies Using Rules
Understanding Intrusion Prevention Rule Types
Type Description
shared object An intrusion rule created by the Cisco Vulnerability Research Team (VRT) that is delivered as a binary module
rule compiled from C source code. You can use shared object rules to detect attacks in ways that standard text rules
cannot. You cannot modify the rule keywords and arguments in a shared object rule; you are limited to either
modifying variables used in the rule, or modifying aspects such as the source and destination ports and IP addresses
and saving a new instance of the rule as a custom shared object rule. A shared object rule has a GID (generator
ID) of 3.
standard text rule An intrusion rule either created by the VRT, copied and saved as a new custom rule, created using the rule editor,
or imported as a local rule that you create on a local machine and import. You cannot modify the rule keywords
and arguments in a standard rule created by the VRT; you are limited to either modifying variables used in the
rule, or modifying aspects such as the source and destination ports and IP addresses and saving a new instance
of the rule as a custom standard text rule. See Importing Local Rule Files, on page 490for more information. A
standard text rule created by the VRT has a GID (generator ID) of 1. Custom standard text rules that you create
using the rule editor or import as local rules have a SID (Signature ID) of 1000000 or greater.
preprocessor rule A rule associated with a detection option of the packet decoder or with one of the preprocessors included with
the ASA FirePOWER module. You must enable preprocessor rules if you want them to generate events. These
rules have a decoder- or preprocessor-specific GID (generator ID).
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
292
Tuning Intrusion Policies Using Rules
Viewing Rules in an Intrusion Policy
You can also sort rules by different criteria; for more information, see Sorting the Rule Display, on page 294.
Note that the icons used as column headers correspond to the menus in the menu bar, where you access those
configuration items. For example, the Rule State menu is marked with the same icon as the Rule State
column.
The following table describes the columns on the Rules page.
GID Integer which indicates the Generator ID (GID) for the rule. Viewing Events, on page 399
SID Integer which indicates the Snort ID (SID), which acts a Viewing Events, on page 399
unique identifier for the rule.
The rule state for the rule, which may be one of three states: Setting Rule States, on page 308
• generate events
• disable
Note that you can access the Set rule state dialog box for a
rule by clicking on its rule state icon.
Event filter, including event thresholds and event Filtering Intrusion Event Notification
suppression, applied to the rule. Per Policy, on page 310
Dynamic rule state for the rule, which goes into effect if Adding Dynamic Rule States, on page
specified rate anomalies occur. 317
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
293
Tuning Intrusion Policies Using Rules
Sorting the Rule Display
Alerts configured for the rule (currently SNMP alerts only). Adding SNMP Alerts, on page 320
You can also use the layer drop-down list to switch to the Rules page for other layers in your policy. Note
that, unless you add layers to your policy, the only editable views listed in the drop-down list are the policy
Rules page and the Rules page for a policy layer that is originally named My Changes ; note also that making
changes in one of these views is the same as making the changes in the other. See Using Layers in a Network
Analysis or Intrusion Policy Layers, on page 259 for more information. The drop-down list also lists the Rules
page for the read-only base policy. See Understanding the Base Layer, on page 260 for information on the
base policy.
To view the rules in an intrusion policy:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Note that an up or down arrow on a heading or icon indicates that the sort is on that column in that
direction.
To sort rules in an intrusion policy:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy
The Intrusion Policy page appears.
Step 2 Click the edit icon next to the policy you want to edit.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
294
Tuning Intrusion Policies Using Rules
Viewing Rule Details
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 Click the title or icon in the top of the column you want to sort by.
The rules are sorted by the column, in the direction indicated by the arrow that appears on the column heading. To sort
in the opposite direction, click the heading again. The sort order and the arrow reverse.
Summary The rule summary. For rule-based events, this row appears when Viewing Events, on page 399
the rule documentation contains summary information.
Rule State The current rule state for the rule. Also indicates the layer where Setting Rule States, on page 308; Using Layers
the rule state is set. in a Network Analysis or Intrusion Policy
Layers, on page 259
Thresholds Thresholds currently set for this rule, as well as the facility to add Setting a Threshold for a Rule, on page 296
a threshold for the rule.
Suppressions Suppression settings currently set for this rule, as well as the facility Setting Suppression for a Rule, on page 297
to add suppressions for the rule.
Dynamic State Rate-based rule states currently set for this rule, as well as the Setting a Dynamic Rule State for a Rule, on
facility to add dynamic rule states for the rule. page 297
Alerts Alerts currently set for this rule, as well as the facility to add an Adding SNMP Alerts, on page 320
alert for the rule. Currently, only SNMP alerts are supported.
Comments Comments added to this rule, as well as the facility to add comments Adding Rule Comments, on page 321
for the rule.
Documentation The rule documentation for the current rule, supplied by the Cisco Viewing Events, on page 399
Vulnerability Research Team (VRT).
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
295
Tuning Intrusion Policies Using Rules
Setting a Threshold for a Rule
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 Highlight the rule whose rule details you want to view.
Step 5 Click Show details.
The Rule Detail view appears. To hide the details again, click Hide details.
Tip You can also open Rule Detail by double-clicking a rule in the Rules view.
Note that a revert icon ( ) appears in a field when you type an invalid value; click it to revert to the last valid
value for that field or to clear the field if there was no previous value.
To set a threshold from the rule details:
Step 2 From the Type drop-down list, select the type of threshold you want to set:
• Select Limit to limit notification to the specified number of event instances per time period.
• Select Threshold to provide notification for each specified number of event instances per time period.
• Select Both to provide notification once per time period after a specified number of event instances.
Step 3 From the Track By drop-down list, select Source or Destination to indicate whether you want the event instances tracked
by source or destination IP address.
Step 4 In the Count field, type the number of event instances you want to use as your threshold.
Step 5 In the Seconds field, type a number between 0 and 2147483647 that specifies the time period, in seconds, for which event
instances are tracked.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
296
Tuning Intrusion Policies Using Rules
Setting Suppression for a Rule
The system adds your threshold and displays an event filter icon ( ) next to the rule in the Event Filtering column. If
you add multiple event filters to a rule, the system includes an indication over the icon of the number of event filters.
Note that a revert icon ( ) appears in a field when you type an invalid value; click it to revert to the last
valid value for that field or to clear the field if there was no previous value.
To set suppression from the rule details:
Step 2 From the Suppression Type drop-down list, select one of the following options:
• Select Rule to completely suppress events for a selected rule.
• Select Source to suppress events generated by packets originating from a specified source IP address.
• Select Destination to suppress events generated by packets going to a specified destination IP address.
Step 3 If you selected Source or Destination for the suppression type, the Network field appears. In the Network field, enter
the IP address, an address block, or a comma-separated list comprised of any combination of these. If the intrusion policy
is associated with the default action of an access control policy, you can also specify or list a network variable in the
default action variable set.
For information on using IPv4 CIDR and IPv6 prefix length address blocks, see Firepower System IP Address Conventions
in your version of the Firepower Management Center Configuration Guide.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
297
Tuning Intrusion Policies Using Rules
Setting an SNMP Alert for a Rule
Note that a revert icon ( ) appears in a field when you type an invalid value; click it to revert to the last
valid value for that field or to clear the field if there was no previous value.
To set a dynamic rule state from the rule details:
Step 2 From the Track By drop-down list, select an option to indicate how you want the rule matches tracked:
• Select Source to track the number of hits for that rule from a specific source or set of sources.
• Select Destination to track the number of hits for that rule to a specific destination or set of destinations.
• Select Rule to track all matches for that rule.
Step 3 Optionally, if you set Track By to Source or Destination, enter the IP address of each host you want to track in the
Network field.
Step 4 Next to Rate, indicate the number of rule matches per time period to set the attack rate:
• In the Count field, using an integer between 0 and 2147483647, specify the number of rule matches you want to
use as your threshold.
• In the Seconds field, using an integer between 0 and 2147483647, specify the number of seconds that make up the
time period for which attacks are tracked.
Step 5 From the New State drop-down list, select the new action to be taken when the conditions are met:
• Select Generate Events to generate an event.
• Select Drop and Generate Events to generate an event and drop the packet that triggered the event in inline
deployments or to generate an event in passive deployments.
• Select Disabled to take no action.
Step 6 In the Timeout field, using an integer between 1 and 2147483647 (approximately 68 years), type the number of seconds
you want the new action to remain in effect. After the timeout occurs, the rule reverts to its original state. Specify 0 to
prevent the new action from timing out.
Step 7 Click OK.
The system adds the dynamic rule state and displays a dynamic state icon next to the rule in the Dynamic State column.
If you add multiple dynamic rule state filters to a rule, a number over the icon indicates the number of filters.
If any required fields are blank, you receive an error message indicating which fields you must fill.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
298
Tuning Intrusion Policies Using Rules
Adding a Rule Comment for a Rule
The system adds the alert and displays an alert icon next to the rule in the Alerting column. If you add multiple alerts
to a rule, the system includes an indication over the icon of the number of alerts.
The system adds the comment and displays a comment icon next to the rule in the Comments column. If you add
multiple comments to a rule, a number over the icon indicates the number of comments.
Tip To delete a rule comment, click Delete in the rule comments section. Note that you can only delete a comment
if the comment is cached with uncommitted intrusion policy changes. After intrusion policy changes are
committed, the rule comment is permanent.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
299
Tuning Intrusion Policies Using Rules
Understanding Rule Filtering in an Intrusion Policy
When you select a keyword by clicking on a node in the criteria list, a pop-up window appears, where you
supply the argument you want to filter by.
If that keyword is already used in the filter, the argument you supply replaces the existing argument for that
keyword.
• When you select a filter type group heading that is a keyword (Category, Classifications, Microsoft
Vulnerabilities, Microsoft Worms, Priority, and Rule Update), it lists the available arguments.
When you select an item from this type of group, the argument and the keyword it applies to are immediately
added to the filter. If the keyword is already in the filter, it replaces the existing argument for the keyword
that corresponds to that group.
For example, if you click os-linux under Category in the filter panel, Category:"os-linux" is added to the
filter text box. If you then click os-windows under Category, the filter changes to Category:"os-windows" .
• Reference under Rule Content is a keyword, and so are the specific reference ID types listed below it.
When you select any of the reference keywords, a pop-up window appears, where you supply an argument
and the keyword is added to the existing filter. If the keyword is already in use in the filter, the new
argument you supply replaces the existing argument.
For example, if you click Rule Content > Reference > CVE ID in the filter panel, a pop-up window prompts
you to supply the CVE ID. If you enter 2007 , then CVE:”2007” is added to the filter text box. In another
example, if you click Rule Content > Reference in the filter panel, a pop-up window prompts you to supply
the reference. If you enter 2007 , then Reference:”2007” is added to the filter text box.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
300
Tuning Intrusion Policies Using Rules
Guidelines for Constructing Intrusion Policy Rule Filters
• When you select rule filter keywords from different groups, each filter keyword is added to the filter and
any existing keywords are maintained (unless overridden by a new value for the same keyword).
For example, if you click os-linux under Category in the filter panel, Category:"os-linux" is added to the
filter text box. If you then click MS00-006 under Microsoft Vulnerabilities, the filter changes to
Category:"os-linux" MicrosoftVulnerabilities:"MS00-006" .
• When you select multiple keywords, the system combines them using AND logic to create a compound
search filter. For example, if you select preprocessor under Category and then select Rule Content >
GID and enter 116 , you get a filter of Category: “preprocessor” GID:”116” , which retrieves all rules
that are preprocessor rules and have a GID of 116.
• The Category, Microsoft Vulnerabilities, Microsoft Worms, Platform Specific, and Priority filter groups
allow you to submit more than one argument for a keyword, separated by commas. For example, you
can press Shift and then select os-linux and os-windows from Category to produce the filter
Category:"os-windows,app-detect" , which retrieves any rules in the os-linux category or in the os-windows
category.
The same rule may be retrieved by more than one filter keyword/argument pair. For example, the DOS Cisco
attempt rule (SID 1545) appears if rules are filtered by the dos category, and also if you filter by the High
priority.
Note The Cisco VRT may use the rule update mechanism to add and remove rule filters.
Note that the rules on the Rules page may be either shared object rules (generator ID 3) or standard text rules
(generator ID 1). The following table describes the different rule filters.
Rule Finds rules according to the configuration of the rule. See No A grouping keywords
Configuration Understanding Rule Configuration Filters, on page 302.
Rule Content Finds rules according to the content of the rule. See No A grouping keywords
Understanding Rule Content Filters, on page 304.
Category Finds rules according to the rule categories used by the Yes A keyword arguments
rule editor. Note that local rules appear in the local
sub-group. See <Understanding Rule Categories, on page
306.
Classifications Finds rules according to the attack classification that No A keyword arguments
appears in the packet display of an event generated by the
rule. .
Microsoft Finds rules according to Microsoft bulletin number. Yes A keyword arguments
Vulnerabilities
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
301
Tuning Intrusion Policies Using Rules
Understanding Rule Configuration Filters
Microsoft Worms Finds rules based on specific worms that affect Microsoft Yes A keyword arguments
Windows hosts.
Platform Specific Finds rules according to their relevance to specific versions Yes A keyword arguments
of operating systems.
Note that if you pick one
Note that a rule may affect more than one operating system of the items from the
or more than one version of an operating system. For sub-list, it adds a
example, enabling SID 2260 affects multiple versions of modifier to the argument.
Mac OS X, IBM AIX, and other operating systems.
Priority Finds rules according to high, medium, and low priorities. Yes A keyword arguments
The classification assigned to a rule determines its priority. Note that if you pick one
These groups are further grouped into rule categories. Note of the items from the
that local rules (that is, rules that you create) do not appear sub-list, it adds a
in the priority groups. modifier to the argument.
Rule Update Finds rules added or modified through a specific rule No A keyword arguments
update. For each rule update, view all rules in the update,
only new rules imported in the update, or only existing
rules changed by the update.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
302
Tuning Intrusion Policies Using Rules
Understanding Rule Configuration Filters
• To find rules that are set to generate events and drop the matching packet, select Drop and Generate Events,
then click OK.
• To find disabled rules, select Disabled, then click OK.
The Rules page updates to display rules according to current rule state.
The Rules page updates to display rules where the type of threshold indicated in the filter has been applied to the
rule.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
303
Tuning Intrusion Policies Using Rules
Understanding Rule Content Filters
• To find rules where a dynamic state of Generate Events is configured, select Generate Events, then click OK.
• To find rules where a dynamic state of Drop and Generate Events is configured, select Drop and Generate
Events, then click OK.
• To find where a dynamic state of Disabled is configured, select Disabled, then click OK.
• To find any rule with suppression set, select All, then click OK.
The Rules page updates to display rules where the dynamic rule state indicated in the filter has been applied to the
rule.
Message Type the message string to filter by, then click OK. Finds rules that contain the supplied string
in the message field.
SID Type the SID number to filter by, then click OK. Finds rules that have the specified SID.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
304
Tuning Intrusion Policies Using Rules
Understanding Rule Content Filters
GID Type the GID number to filter by, then click OK. Finds rules that have the specified GID.
Reference Type the reference string to filter by, then click OK. Finds rules that contain the supplied string
in the reference field.
To enter a string for a specific type of reference that you want to
filter by, select CVE ID, URL, Bugtraq ID, Nessus ID,
Arachnids ID, or Mcafee ID, then type a string and click OK.
Action Select the action to filter by: Finds rules that start with alert or pass .
• To find alert rules, select Alert, then click OK.
• To find pass rules, select Pass, then click OK.
Protocol Select the protocol to filter by: ICMP, IP, TCP, or UDP; then Finds rules that include the selected
click OK. protocol.
Direction Select a directional setting to filter by: Finds rules based on whether the rule
includes the indicated directional setting.
• To find rules that inspect traffic moving in a specific direction,
select Directional, then click OK.
• To find rules that inspect traffic moving in either direction
between a source and destination, select Bidirectional, then
click OK.
Source IP Type the source IP address to filter by, then click OK. Finds rules that use the specified addresses
or variables for the source IP address
Note that you can filter by a valid IP address, a CIDR block/prefix
designation in the rule.
length, or using variables such as $HOME_NET or
$EXTERNAL_NET .
Destination IP Type the destination IP address to filter by, then click OK. Finds rules that use the specified addresses
or variables for the source IP address
Note that you can filter by a valid IP address, a CIDR block/prefix
designation in the rule.
length, or using variables such as $HOME_NET or
$EXTERNAL_NET .
Source port Type the source port to filter by, then click OK. Finds rules that include the specified source
port.
The port value must be an integer between 1 and 65535 or a port
variable.
Destination port Type the destination port to filter by, then click OK. Finds rules that include the specified
destination port.
The port value must be an integer between 1 and 65535 or a port
variable.
Rule Overhead Select the amount of rule overhead to filter by: Low, Medium, Finds rules with the selected rule overhead.
High, or Very High; then click OK.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
305
Tuning Intrusion Policies Using Rules
Understanding Rule Categories
Metadata Type the metadata key-value pair to filter by, separated by a space; Find rules with metadata containing the
then click OK. matching key-value pair.
For example, type metadata:”service http” to locate rules with
metadata relating to the HTTP application protocol.
Note The Cisco VRT may use the rule update mechanism to add and remove rule categories.
where keyword is one of the keywords in the filter groups described in the Table 54: Rule types, on page
292table and argument is enclosed in double quotes and is a single, case-insensitive, alphanumeric string to
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
306
Tuning Intrusion Policies Using Rules
Setting a Rule Filter in an Intrusion Policy
search for in the specific field or fields relevant to the keyword. Note that keywords should be typed with
initial capitalization.
Arguments for all keywords except gid and sid are treated as partial strings. For example, the argument 123
returns "12345" , "41235" , "45123", and so on. The arguments for gid and sid return only exact matches; for
example, sid:3080 returns only SID 3080 .
Each rule filter can also include one or more alphanumeric character strings. Character strings search the rule
Message field, Signature ID, and Generator ID. For example, the string 123 returns the strings "Lotus123" ,
"123mania" , and so on in the rule message, and also returns SID 6123 , SID 12375 , and so on. You can
search for a partial SID by filtering with one or more character strings.
All character strings are case-insensitive and are treated as partial strings. For example, any of the strings
ADMIN , admin , or Admin return "admin" , "CFADMIN" , "Administrator" and so on.
You can enclose character strings in quotes to return exact matches. For example, the literal string "overflow
attempt" in quotes returns only that exact string, whereas a filter comprised of the two strings overflow and
attempt without quotes returns "overflow attempt" , "overflow multipacket attempt" , "overflow with evasion
attempt" , and so on.
You can narrow filter results by entering any combination of keywords, character strings, or both, separated
by spaces. The result includes any rule that matches all the filter conditions.
You can enter multiple filter conditions in any order. For example, each of the following filters returns the
same rules:
• url:at login attempt cve:200
• login attempt cve:200 url:at
• login cve:200 attempt url:at
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
307
Tuning Intrusion Policies Using Rules
Setting Rule States
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 Construct a filter by clicking on keywords or arguments in the filter panel on the left. Note that if you click an argument
for a keyword already in the filter, it replaces the existing argument.
The page refreshes to display all matching rules, and the number of rules matching the filter is displayed above the filter
text box.
Step 5 Select the rule or rules where you want to apply a new setting. You have the following options:
• To select a specific rule, select the check box next to the rule.
• To select all the rules in the current list, select the check box at the top of the column.
Step 6 Optionally, make any changes to the rule that you would normally make on the page. See the following sections for more
information:
• See Setting Rule States, on page 308 for information on enabling and disabling rules on the Rules page.
• See Filtering Intrusion Event Notification Per Policy, on page 310 for information on adding thresholding and
suppression to rules.
• See Adding Dynamic Rule States, on page 317 for information on setting dynamic rule states that trigger when rate
anomalies occur in matching traffic.
• See Adding SNMP Alerts, on page 320 for information on adding SNMP alerts to specific rules.
• See Adding Rule Comments, on page 321 for information on adding rule comments to rules.
Step 7 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache.
See Managing Intrusion Policies, on page 281 and Editing Intrusion Policies, on page 282 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
308
Tuning Intrusion Policies Using Rules
Setting Rule States
and disabled in the Connectivity over Security default policy. Intrusion policy rules you create inherit the
default states of the rules in the default policy you use to create your policy.
You can set a rule to Generate Events, to Drop and Generate Events, or to Disable individually, or you
can filter the rules by a variety of factors to select the rules for which you want to modify the state. In an inline
deployment, you can use the Drop and Generate Events rule state in inline intrusion deployments to drop
malicious packets. Note that rules with the Drop and Generate Events rule state generate events but do not
drop packets in a passive deployment. Setting a rule to Generate Events or to Drop and Generate Events
enables the rule; setting the rule to Disable disables it.
Consider two scenarios. In the first scenario, the rule state for a specific rule is set to Generate Events. When
a malicious packet crosses your network and triggers the rule, the packet is sent to its destination and the
system generates an intrusion event. In the second scenario, assume that the rule state for the same rule is set
to Drop and Generate Events in an inline deployment. In this case, when the malicious packet crosses the
network, the system drops the malicious packet and generates an intrusion event. The packet never reaches
its target.
In an intrusion policy, you can set a rule’s state to one of the following:
• Set the rule state to Generate Events if you want the system to detect a specific intrusion attempt and
generate an intrusion event when it finds matching traffic.
• Set the rule state to Drop and Generate Events if you want the system to detect a specific intrusion
attempt, then drop the packet containing the attack and generate an intrusion event when it finds matching
traffic in an inline deployment, or to generate an intrusion event when it finds matching traffic in a passive
deployment.
Note that for the system to drop packets, your intrusion policy must be set to drop rules in an inline deployment;
see Setting Drop Behavior in an Inline Deployment, on page 283 for more information.
• Set the rule state to Disable if you do not want the system to evaluate matching traffic.
Filtering rules on the Rules page can help you find the rules you want to set as drop rules. For more information,
see Filtering Rules in an Intrusion Policy, on page 299.
The VRT sometimes uses a rule update to change the default state of one or more rules in a default policy. If
you allow rule updates to update your base policy, you also allow the rule update to change the default state
of a rule in your policy when the default state changes in the default policy you used to create your policy (or
in the default policy it is based on). Note, however, that if you have changed the rule state, the rule update
does not override your change.
To change the rule state for one or more rules:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
309
Tuning Intrusion Policies Using Rules
Filtering Intrusion Event Notification Per Policy
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Note that this page indicates the total number of enabled rules, the total number of enabled rules set to Generate Events,
and the total number set to Drop and Generate Events. Note also that in a passive deployment, rules set to Drop and
Generate Events only generate events.
Step 4 Locate the rule or rules where you want to set the rule state. You have the following options:
• To sort the current display, click on a column heading or icon. To reverse the sort, click again.
• Construct a filter by clicking on keywords or arguments in the filter panel on the left. For more information, see the
following topics: Understanding Rule Filtering in an Intrusion Policy, on page 300 and Setting a Rule Filter in an
Intrusion Policy, on page 307.
Step 5 Select the rule or rules where you want to set the rule state. You have the following options:
• To select a specific rule, select the check box next to the rule.
• To select all the rules in the current list, select the check box at the top of the column.
Note Cisco strongly recommends that you do not enable all the intrusion rules in an intrusion policy. The performance
of your device is likely to degrade if all rules are enabled. Instead, tune your rule set to match your network
environment as closely as possible.
Step 7 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache. See
Managing Intrusion Policies, on page 281 and Editing Intrusion Policies, on page 282 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
310
Tuning Intrusion Policies Using Rules
Configuring Event Thresholding
of times. In other cases, you may only need to see a few occurrences to know there is a widespread problem.
For example, if a DoS attack is launched against your web server, you may only need to see a few occurrences
of an intrusion event to know that you need to address the situation. Seeing hundreds of the same event only
overwhelms your system.
Option Description
Limit Logs and displays events for the specified number of packets (specified by the Count argument) that trigger the rule
during the specified time period. For example, if you set the type to Limit, the Count to 10 , and the Seconds to 60 , and
14 packets trigger the rule, the system stops logging events for the rule after displaying the first 10 that occur within the
same minute.
Threshold Logs and displays a single event when the specified number of packets (specified by the Count argument) trigger the
rule during the specified time period. Note that the counter for the time restarts after you hit the threshold count of events
and the system logs that event. For example, you set the type to Threshold, Count to 10 , and Seconds to 60 , and the
rule triggers 10 times by second 33. The system generates one event, then resets the Seconds and Count counters to 0.
The rule then triggers another 10 times in the next 25 seconds. Because the counters reset to 0 at second 33, the system
logs another event.
Both Logs and displays an event once per specified time period, after the specified number (count) of packets trigger the rule.
For example, if you set the type to Both, Count to two, and Seconds to 10 , the following event counts result:
• If the rule is triggered once in 10 seconds, the system does not generate any events (the threshold is not met)
• If the rule is triggered twice in 10 seconds, the system generates one event (the threshold is met when the rule triggers
the second time)
• If the rule is triggered four times in 10 seconds, the system generates one event (the threshold is met when the rule
triggers the second time, and following events are ignored)
Next, you must specify tracking, which determines whether the event threshold is calculated per source or
destination IP address. Select one of the options from the following table to specify how the system tracks
event instances.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
311
Tuning Intrusion Policies Using Rules
Adding and Modifying Intrusion Event Thresholds
Option Description
Finally, you must specify the number of instances and time period that define the threshold.
Option Description
Count The number of event instances per specified time period per tracking IP address required to meet the threshold.
Seconds The number of seconds that elapse before the count resets. If you set the threshold type to limit, the tracking to Source
IP, the count to 10 , and the seconds to 10 , the system logs and displays the first 10 events that occur in 10 seconds from
a given source port. If only 7 events occur in the first 10 seconds, the system logs and displays those; if 40 events occur
in the first 10 seconds, the system logs and displays 10, then begins counting again when the 10-second time period elapses.
Note that you can use intrusion event thresholding alone or in any combination with rate-based attack
prevention, the detection_filter keyword, and intrusion event suppression. See Adding Dynamic Rule States,
on page 317, and Configuring Suppression Per Intrusion Policy, on page 314 for more information.
Note that a revert icon ( ) appears in a field when you type an invalid value; click it to revert to the last
valid value for that field or to clear the field if there was no previous value.
To add or modify event thresholds:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
312
Tuning Intrusion Policies Using Rules
Viewing and Deleting Intrusion Event Thresholds
Step 4 Locate the rule or rules where you want to set a threshold. You have the following options:
• To sort the current display, click on a column heading or icon. To reverse the sort, click again.
• Construct a filter by clicking on keywords or arguments in the filter panel on the left. For more information, see
the following topics: Understanding Rule Filtering in an Intrusion Policy, on page 300 and Setting a Rule Filter in
an Intrusion Policy, on page 307.
Step 5 Select the rule or rules where you want to set a threshold. You have the following options:
• To select a specific rule, select the check box next to the rule.
• To select all the rules in the current list, select the check box at the top of the column.
Step 7 From the Type drop-down list, select the type of threshold you want to set:
• Select Limit to limit notification to the specified number of event instances per time period.
• Select Threshold to provide notification for each specified number of event instances per time period.
• Select Both to provide notification once per time period after a specified number of event instances.
Step 8 From the Track By drop-down list, select whether you want the event instances tracked by Source or Destination IP
address.
Step 9 In the Count field, specify the number of event instances you want to use as your threshold.
Step 10 In the Seconds field, specify the number of seconds that make up the time period for which event instances are tracked.
Step 11 Click OK.
The system adds your threshold and displays an event filter icon ( ) next to the rule in the Event Filtering column.
If you add multiple event filters to a rule, a number over the icon indicates the number of event filters.
Step 12 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache.
See Managing Intrusion Policies, on page 281 and Editing Intrusion Policies, on page 282 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
313
Tuning Intrusion Policies Using Rules
Configuring Suppression Per Intrusion Policy
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 Locate the rule or rules that have a configured threshold you want to view or delete. You have the following options:
• To sort the current display, click on a column heading or icon. To reverse the sort, click again.
• Construct a filter by clicking on keywords or arguments in the filter panel on the left. For more information, see the
following topics: Understanding Rule Filtering in an Intrusion Policy, on page 300 and Setting a Rule Filter in an
Intrusion Policy, on page 307.
Step 5 Select the rule or rules with a configured threshold you want to view or delete. You have the following options:
• To select a specific rule, select the check box next to the rule.
• To select all the rules in the current list, select the check box at the top of the column.
Step 6 To remove the threshold for each selected rule, select Event Filtering > Remove Thresholds. Click OK in the confirmation
pop-up window that appears.
Tip To remove a specific threshold, you can also highlight the rule and click Show details. Expand the threshold
settings, then click Delete next to the threshold settings you want to remove. Click OK to confirm that you
want to delete the configuration.
The page refreshes and the threshold is deleted.
Step 7 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache. See
Managing Intrusion Policies, on page 281 and Editing Intrusion Policies, on page 282 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
314
Tuning Intrusion Policies Using Rules
Suppressing Intrusion Events
Note that you can use intrusion event suppression alone or in any combination with rate-based attack prevention,
the detection_filter keyword, and intrusion event thresholding. See Adding Dynamic Rule States, on page
317, and Configuring Event Thresholding, on page 311 for more information.
Note that a revert icon ( ) appears in a field when you type an invalid value; click it to revert to the last valid
value for that field or to clear the field if there was no previous value.
To suppress event display:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 Locate the rule or rules where you want to set suppression. You have the following options:
• To sort the current display, click on a column heading or icon. To reverse the sort, click again.
• Construct a filter by clicking on keywords or arguments in the filter panel on the left. For more information, see
the following topics: Understanding Rule Filtering in an Intrusion Policy, on page 300 and Setting a Rule Filter in
an Intrusion Policy, on page 307.
Step 5 Select the rule or rules for which you want to configure suppression conditions. You have the following options:
• To select a specific rule, select the check box next to the rule.
• To select all rules in the current list, select the check box at the top of the column.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
315
Tuning Intrusion Policies Using Rules
Viewing and Deleting Suppression Conditions
• Select Destination to suppress events generated by packets going to a specified destination IP address.
Step 8 If you selected Source or Destination for the suppression type, in the Network field enter the IP address, address
block, or variable you want to specify as the source or destination IP address, or a comma-separated list comprised of
any combination of these.
Step 9 Click OK.
The system adds your suppression conditions and displays an event filter icon ( ) next to the rule in the Event Filtering
column next the suppressed rule. If you add multiple event filters to a rule, a number over the icon indicates the number
of event filters.
Step 10 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache.
See Managing Intrusion Policies, on page 281 and Editing Intrusion Policies, on page 282 for more information.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 Locate the rule or rules where you want to view or delete suppressions. You have the following options:
• To sort the current display, click on a column heading or icon. To reverse the sort, click again.
• Construct a filter by clicking on keywords or arguments in the filter panel on the left. For more information, see the
following topics:Understanding Rule Filtering in an Intrusion Policy, on page 300 and Setting a Rule Filter in an
Intrusion Policy, on page 307.
Step 5 Select the rule or rules for which you want to view or delete suppressions. You have the following options:
• To select a specific rule, select the check box next to the rule.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
316
Tuning Intrusion Policies Using Rules
Adding Dynamic Rule States
• To select all rules in the current list, select the check box at the top of the column.
Step 7 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache. See
Managing Intrusion Policies, on page 281 and Editing Intrusion Policies, on page 282for more information.
Note that when started, the new action occurs until the timeout is reached, even if the rate falls below the
configured rate during that time period. When the timeout is reached, if the rate has fallen below the threshold,
the action for the rule reverts to the action initially configured for the rule.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
317
Tuning Intrusion Policies Using Rules
Setting a Dynamic Rule State
You can configure rate-based attack prevention in an inline deployment to block attacks, either temporarily
or permanently. Without rate-based configuration, rules set to Generate Events do generate events, but the
system does not drop packets for those rules. However, if the attack traffic matches rules that have rate-based
criteria configured, the rate action may cause packet dropping to occur for the period of time that the rate
action is active, even if those rules are not initially set to Drop and Generate Events.
Note Rate-based actions cannot enable disabled rules or drop traffic that matches disabled rules.
You can define multiple rate-based filters on the same rule. The first filter listed in the intrusion policy has
the highest priority. Note that when two rate-based filter actions conflict, the action of the first rate-based
filter is carried out.
The following diagram shows an example where an attacker is attempting to access a host. Repeated attempts
to find a password trigger a rule which has rate-based attack prevention configured. The rate-based settings
change the rule attribute to Drop and Generate Events after rule matches occur five times in a 10-second
span. The new rule attribute times out after 15 seconds.
After the timeout, note that packets are still dropped in the rate-based sampling period that follows. If the
sampled rate is above the threshold in the current or previous sampling period, the new action continues. The
new action reverts to Generate Events only after a sampling period completes where the sampled rate was
below the threshold rate.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
318
Tuning Intrusion Policies Using Rules
Setting a Dynamic Rule State
You can define multiple dynamic rule state filters for the same rule. The first filter listed in the rule details in
the intrusion policy has the highest priority. Note that when two rate-based filter actions conflict, the action
of the first rate-based filter is carried out.
Note that a revert icon appears in a field when you type an invalid value; click it to revert to the last valid
value for that field or to clear the field if there was no previous value.
Note Dynamic rule states cannot enable disabled rules or drop traffic that matches disabled rules.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 Locate the rule or rules where you want to add a dynamic rule state. You have the following options:
• To sort the current display, click on a column heading or icon. To reverse the sort, click again.
• Construct a filter by clicking on keywords or arguments in the filter panel on the left.
Step 5 Select the rule or rules where you want to add a dynamic rule state. You have the following options:
• To select a specific rule, select the check box next to the rule.
• To select all the rules in the current list, select the check box at the top of the column.
Step 7 From the Track By drop-down list, select how you want the rule matches tracked:
• Select Source to track the number of hits for that rule from a specific source or set of sources.
• Select Destination to track the number of hits for that rule to a specific destination or set of destinations.
• Select Rule to track all matches for that rule.
Step 8 If you set Track By to Source or Destination, enter the address of each host you want to track in the Network field.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
319
Tuning Intrusion Policies Using Rules
Adding SNMP Alerts
You can specify a single IP address, address block, variable, or a comma-separated list comprised of any combination
of these.
Step 9 Next to Rate, indicate the number of rule matches per time period to set the attack rate:
• In the Count field, using an integer between 1 and 2147483647, specify the number of rule matches you want to
use as your threshold.
• In the Seconds field, using an integer between 1 and 2147483647, specify the number of seconds that make up
the time period for which attacks are tracked.
Step 10 From the New State drop-down list, specify the new action to be taken when the conditions are met:
• Select Generate Events to generate an event.
• Select Drop and Generate Events to generate an event and drop the packet that triggered the event in inline
deployments or generate an event in passive deployments.
• Select Disabled to take no action.
Step 11 In the Timeout field, type the number of seconds you want the new action to remain in effect. After the timeout occurs,
the rule reverts to its original state. Specify 0 or leave the Timeout field blank to prevent the new action from timing
out.
Step 12 Click OK.
The system adds the dynamic rule state and displays a dynamic state icon next to the rule in the Dynamic State
column. If you add multiple dynamic rule state filters to a rule, a number over the icon indicates the number of filters.
If any required fields are blank, you receive an error message indicating which fields you must fill.
Tip To delete all dynamic rule settings for a set of rules, select the rules on the Rules page, then select Dynamic
State > Remove Rate-Based States. You can also delete individual rate-based rule state filters from the rule
details for the rule by selecting the rule, clicking Show details, then clicking Delete by the rate-based filter
you want to remove.
Step 13 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache.
See Managing Intrusion Policies, on page 281 and Editing Intrusion Policies, on page 282 for more information.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
320
Tuning Intrusion Policies Using Rules
Adding Rule Comments
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 Locate the rule or rules where you want to set SNMP alerts. You have the following options:
• To sort the current display, click on a column heading or icon. To reverse the sort, click again.
• Construct a filter by clicking on keywords or arguments in the filter panel on the left. For more information, see the
following topics: Understanding Rule Filtering in an Intrusion Policy, on page 300 and Setting a Rule Filter in an
Intrusion Policy, on page 307.
Step 5 Select the rule or rules where you want to set SNMP alerts:
• To select a specific rule, select the check box next to the rule.
• To select all the rules in the current list, select the check box at the top of the column.
Step 7 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache. See
Managing Intrusion Policies, on page 281 and Editing Intrusion Policies, on page 282 for more information.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Intrusion Policy.
The Intrusion Policy page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
321
Tuning Intrusion Policies Using Rules
Adding Rule Comments
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 Locate the rule or rules where you want to add a comment to a rule. You have the following options:
• To sort the current display, click on a column heading or icon. To reverse the sort, click again.
• Construct a filter by clicking on keywords or arguments in the filter panel on the left. For more information, see the
following topics: Understanding Rule Filtering in an Intrusion Policy, on page 300 and Setting a Rule Filter in an
Intrusion Policy, on page 307.
Step 5 Select the rule or rules where you want to add a comment:
• To select a specific rule, select the check box next to the rule.
• To select all the rules in the current list, select the check box at the top of the column.
Step 9 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache.
See Managing Intrusion Policies, on page 281 and Editing Intrusion Policies, on page 282 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
322
CHAPTER 23
Globally Limiting Intrusion Event Logging
You can use thresholds to limit the number of times the system logs and displays intrusion events. This chapter
covers the following sections:
• Limiting Intrusion Event Logging, on page 323
• Understanding Thresholding, on page 323
• Configuring Global Thresholds, on page 325
Understanding Thresholding
License: Protection
By default, every intrusion policy contains a global rule threshold. The default threshold limits event generation
for each rule to one event every 60 seconds on traffic going to the same destination. This global threshold
applies by default to all intrusion rules and preprocessor rules. Note that you can disable the threshold in the
Advanced Settings page in an intrusion policy.
You can also override this threshold by setting individual thresholds on specific rules. For example, you might
set a global limit threshold of five events every 60 seconds, but then set a specific threshold of ten events for
every 60 seconds for SID 1315. All other rules generate no more than five events in each 60-second period,
but the system generates up to ten events for each 60-second period for SID 1315.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
323
Globally Limiting Intrusion Event Logging
Understanding Thresholding Options
For more information on setting rule-based thresholds, see Configuring Event Thresholding, on page 311.
The following diagram shows an example where an attack is in progress for a specific rule. A global limit
threshold limits event generation for each rule to two events every 20 seconds.
Note that the period starts at one second and ends at 21 seconds. After the period ends, note that the cycle
starts again and the next two rule matches generate events, then the system does not generate any more events
during that period.
Option Description
Limit Logs and displays events for the specified number of packets (specified by the count argument) that trigger the rule during
the specified time period. For example, if you set the type to Limit, the Count to 10 , and the Seconds to 60 , and 14
packets trigger the rule, the system stops logging events for the rule after displaying the first 10 that occur within the
same minute.
Threshold Logs and displays a single event when the specified number of packets (specified by the count argument) trigger the rule
during the specified time period. Note that the counter for the time restarts after you hit the threshold count of events and
the system logs that event. For example, you set the type to Threshold, Count to 10 , and Seconds to 60 , and the rule
triggers 10 times by second 33. The system generates one event, then resets the Seconds and Count counters to 0 . The
rule then triggers another 10 times in the next 25 seconds. Because the counters reset to 0 at second 33, the system logs
another event.
Both Logs and displays an event once per specified time period, after the specified number (count) of packets trigger the rule.
For example, if you set the type to Both, Count to 2 , and Seconds to 10 , the following event counts result:
• If the rule is triggered once in 10 seconds, the system does not generate any events (the threshold is not met)
• If the rule is triggered twice in 10 seconds, the system generates one event (the threshold is met when the rule triggers
the second time)
• If the rule is triggered four times in 10 seconds, the system generates one event (the threshold is met when the rule
triggered the second time and following events are ignored)
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
324
Globally Limiting Intrusion Event Logging
Configuring Global Thresholds
Next, specify the tracking, which determines whether the event instance count is calculated per source or
destination IP address. Finally, specify the number of instances and time period that define the threshold.
Option Description
Count The number of event instances per specified time period per tracking IP address or address range
required to meet the threshold.
Seconds The number of seconds that elapse before the count resets. If you set the threshold type to Limit,
the tracking to Source, Count to 10, and Seconds to 10, the system logs and displays the first 10
events that occur in 10 seconds from a given source port. If only seven events occur in the first 10
seconds, the system logs and displays those, if 40 events occur in the first 10 seconds, the system
logs and displays 10, then begins counting again when the 10-second time period elapses.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies> Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 You have two choices, depending on whether Global Rule Thresholding under Intrusion Rule Thresholds is enabled:
• If the configuration is enabled, click Edit.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
325
Globally Limiting Intrusion Event Logging
Disabling the Global Threshold
The Global Rule Thresholding page appears. A message at the bottom of the page identifies the intrusion policy layer
that contains the configuration. See Using Layers in a Network Analysis or Intrusion Policy Layers, on page 259 for more
information.
Step 5 From the Type radio buttons, select the type of threshold that will apply over the time specified by the seconds argument.
See the Table 62: Thresholding Options , on page 324 table for more information:
• Select Limit to log and display an event for each packet that triggers the rule until the limit specified by the count
argument is exceeded.
• Select Threshold to log and display a single event for each packet that triggers the rule and represents either the
instance that matches the threshold set by the count argument or is a multiple of the threshold.
• Select Both to log and display a single event after the number of packets specified by the count argument trigger
the rule.
Step 6 Select the tracking method from the Track By radio buttons:
• Select Source to identify rule matches in traffic coming from a particular source IP address or addresses.
• Select Destination to identify rule matches in traffic going to a particular destination IP address.
Step 9 Save your policy, continue editing, discard your changes, or exit while leaving your changes in the system cache. See
Resolving Conflicts and Committing Policy Changes, on page 257 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
326
Globally Limiting Intrusion Event Logging
Disabling the Global Threshold
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies> Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
What to do next
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
327
Globally Limiting Intrusion Event Logging
Disabling the Global Threshold
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
328
CHAPTER 24
Introduction to Identity Data
You can configure identity policies to use User Agents, ISE/ISE-PIC devices, or captive portal to obtain data
about the users on your network. For more information, see User Identity Sources, on page 353.
• Uses for Identity Data, on page 329
• User Detection Fundamentals, on page 329
• User Database Limits, on page 331
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
329
Introduction to Identity Data
User Detection Fundamentals
Armed with this information, you can use other features of the ASA FirePOWER module to mitigate risk,
perform access control, and take action to protect others from disruption. These capabilities also significantly
improve audit controls and enhance regulatory compliance.
After you configure user identity sources, you can perform user awareness and user control.
User awareness
The ability to view and analyze user data
User control
The ability to configure user access control rule conditions to block users or user activity in traffic on your
network, based on conclusions you drew from user awareness.
You can obtain user data from authoritative identity sources (referenced by your identity policy).
An identity source is authoritative if a trusted server validated the user login. You can use the data obtained
from authoritative logins to perform user awareness and user control. Authoritative user logins are obtained
from passive and active authentications:
• Passive authentications occur when a user authenticates through an external server. The User Agent and
ISE/ISE-PIC are the only passive authentication methods supported by the ASA FirePOWER module.
• Active authentications occur when a user authenticates through a Firepower device. Captive portal is the
only active authentication method supported by the ASA FirePOWER module.
The following table provides a brief overview of the user identity sources supported by the ASA FirePOWER
module.
User Server Source Type Authentication User User For more information,
Identity Requirements Type Awareness? Access see...
Source Control?
User Agent Microsoft Active authoritative passive Yes Yes The User Agent
Directory logins Identity Source, on
page 355
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
330
Introduction to Identity Data
The User Activity Database
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
331
Introduction to Identity Data
User Database Limits
When deploying an ASA FirePOWER module managed via ASDM, you can store a maximum of 2,000
authoritative users in the Users database.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
332
CHAPTER 25
Realms and Identity Policies
This chapter covers the following sections:
• About Servers and Realms, on page 333
• Supported Servers for Realms, on page 334
• Troubleshooting Issues with Realms, on page 335
• Identity Policy Fundamentals, on page 336
• Creating a Realm, on page 336
• Configuring Basic Realm Information, on page 339
• Configuring a Realm Directory, on page 340
• Configuring an Identity Policy, on page 341
• Managing Realms, on page 349
• Managing the Identity Policy, on page 351
You can add multiple servers as directories in a realm, but they must share the same basic realm information.
The directories within a realm must be exclusively LDAP or exclusively AD servers. After you enable a realm,
your saved changes take effect next time the ASA FirePOWER module queries the server.
To perform user awareness, you must configure a realm for any of the supported server types. The module
uses these connections to query the servers for data associated with POP3 and IMAP users. The module uses
the email addresses in POP3 and IMAP logins to correlate with LDAP users on an Active Directory,
OpenLDAP, or Oracle Directory Server Enterprise Edition server. For example, if a device detects a POP3
login for a user with the same email address as an LDAP user, the module associates the LDAP user’s metadata
with that user.
To perform user access control, you can configure the following:
• a realm for an AD server configured for either a User Agent or ISE/ISE-PIC device.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
333
Realms and Identity Policies
Supported Servers for Realms
Note Configuring a realm is optional if you plan to configure SGT ISE attribute conditions but not user, group,
realm, Endpoint Location, or Endpoint Profile conditions.
If you configure a realm to download users (for user awareness or user control), the ASA FirePOWER module
regularly queries the server to obtain metadata for new and updated users whose activity was detected since
the last query.
User activity data is stored in the user activity database and user identity data is stored in the users database.
The maximum number of users you can store and use in access control depends on your device model. When
choosing which users and groups to include, make sure the total number of users is less than your model limit.
If your access control parameters are too broad, the ASA FirePOWER module obtains information on as many
users as it can and reports the number of users it failed to retrieve in the task queue.
Note If you remove a user that has been detected by the module from your LDAP servers, the ASA FirePOWER
module does not remove that user from its users database; you must manually delete it. However, your LDAP
changes are reflected in access control rules when the ASA FirePOWER module next updates its list of
authoritative users.
Server Type Supported for Supported for Supported for Supported for captive
user awareness User Agent ISE/ISE-PIC portal data retrieval?
data retrieval? data retrieval? data retrieval?
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
334
Realms and Identity Policies
Supported Server Field Names
• If you want to perform user control on user groups or on users within groups, you must configure user
groups on the server. The ASA FirePOWER module cannot perform user group control if the server
organizes the users in basic object hierarchy.
Cisco recommends that you limit the size of your LDAP or AD server groups to contain a maximum of 1500
users. Configuring realms to include or exclude oversized groups, or creating access control rules that target
oversized user groups may result in performance issues.
• By default, AD servers limit the number of users they report from secondary groups. You must customize
this limit so that all of the users in your secondary groups are reported to the ASA FirePOWER module.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
335
Realms and Identity Policies
Identity Policy Fundamentals
After you configure one or more identity policies, you must invoke one identity policy in your access control
policy. When traffic on your network matches the conditions in your identity rule and the authentication
method is passive or active, the module associates the traffic with the specified realm and authenticates the
users in the traffic using the specified identity source.
If you do not configure an identity policy, the module does not perform user authentication.
Creating a Realm
License: Control
To create a realm:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
336
Realms and Identity Policies
Realm Fields
Step 1 Select Configuration > ASA FirePOWER Configuration > Integration > .
Step 2 Click Realms.
Step 3 Click New Realm.
Step 4 Configure basic realm information as described in Configuring Basic Realm Information, on page 339
Step 5 Configure directories as described in Configuring a Realm Directory, on page 340
Step 6 Configure user and user group download (required for access control) as described in Configuring Automatic User
Download, on page 340
Step 7 Save the realm settings.
Step 8 Optionally, edit the realm and modify the default User Session Timeout settings as described in Configuring Realm User
Session Timeouts, on page 341
Step 9 Save the realm settings.
What to do next
What to Do Next
• Enable the realm as described in Enabling or Disabling a Realm, on page 350
• Optionally, monitor the task status; see the Task Status page (Monitoring > ASA FirePOWER
Monitoring > Task Status).
Realm Fields
License: Any
The following fields are used to configure a realm.
AD Primary Domain
For AD realms only, the domain for the Active Directory server where users should be authenticated.
Description
An optional description for the realm.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
337
Realms and Identity Policies
Realm Directory Fields
Base DN
The directory tree on the server where the ASA FirePOWER module should begin searching for user data.
Typically, the base DN has a basic structure indicating the company domain and operational unit. For example,
the Security organization of the Example company might have a base DN of ou=security,dc=example,dc=com.
Group DN
The directory tree on the server where the ASA FirePOWER module should search for users with the group
attribute.
Group Attribute
The group attribute for the server: Member, Unique Member, or Custom.
Name
A unique name for the realm.
Type
The type of realm, AD or LDAP.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
338
Realms and Identity Policies
User Download Fields
Encryption
The encryption method you want to use for the server connection. If you specify an Encryption method, you
must specify a host name in this field.
Hostname / IP Address
The hostname or IP address for the server.
Port
The port you want to use for the server connection.
SSL Certificate
The SSL certificate you want to use for authentication to the server. You must configure the Encryption type
in order to use an SSL certificate.
If you are using a certificate to authenticate, the name of the server in the certificate must match the server
Hostname / IP Address. For example, if you use 10.10.10.250 as the IP address but computer1.example.com
in the certificate, the connection fails.
Step 1 On the Add New Realm page, type a Name and, optionally, a Description.
Step 2 Select a Type from the drop-down list.
Step 3 If you are configuring an AD realm, enter an AD Primary Domain.
Step 4 If you are configuring an AD realm intended for Kerberos captive portal active authentication, enter a distinguished AD
Join Username and AD Join Password for a user with appropriate rights to join clients to the domain.
Step 5 Enter a distinguished Directory Username and Directory Password for a user with appropriate rights to the user
information you want to retrieve.
Step 6 Enter a Base DN for the directory.
Step 7 Enter a Group DN for the directory.
Step 8 Optionally, select a Group Attribute from the drop-down list.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
339
Realms and Identity Policies
Configuring a Realm Directory
What to do next
• Configure the realm directory as described in Configuring a Realm Directory, on page 340
Step 1 On the User Download tab, select the Download users and groups (required for user access control) check box.
Step 2 Select a time to Begin automatic download at from the drop-down lists.
Step 3 Select a download interval from the Repeat Every drop-down list.
Step 4 To include or exclude user groups from the download, select user groups from the Available Groups column and click
Add to Include or Add to Exclude.
Step 5 To include or exclude individual users, type the user into the field below Groups to Include or Groups to Exclude and
click Add.
Note Excluding users from download prevents you from writing an access control rule with that user as a condition.
Separate multiple users with commas. You can also use an asterisk (*) as a wildcard character in this field.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
340
Realms and Identity Policies
Configuring Realm User Session Timeouts
Note If the module is performing user timeouts at unexpected intervals, confirm that the time on your User Agent
or ISE/ISE-PIC device is synchronized with the time on the ASA FirePOWER module.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Identity Policy.
Step 2 Type a Name and, optionally, a Description.
Step 3 If you want to add a rule to the policy, click Add Rule as described in Creating an Identity Rule, on page 344
Step 4 If you want to add a rule category, click Add Category as described in Adding an Identity Rule Category, on page 351
Step 5 If you want to configure active authentication using captive portal, click Active Authentication as described in Configuring
Captive Portal (Active Authentication), on page 342
Server Certificate
The server certificate presented by the captive portal daemon.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
341
Realms and Identity Policies
Configuring Captive Portal (Active Authentication)
Port
The port number you want to use for the captive portal connection. The port number in this field must match
the port number you configured on the ASA FirePOWER device using the captive-portal CLI command.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Identity Policy and edit an identity policy.
Step 2 Click Active Authentication.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
342
Realms and Identity Policies
Excluding Applications From Active Authentication
Step 3 Select the appropriate Server Certificate from the drop-down list. Optionally, click the add icon ( )to create an object
on the fly.
Step 4 Type a Port and specify the Maximum login attempts.
Step 5 Optionally, to authenticate users through a HTTP response page, select an Active Authentication Response Page.
Step 6 Click Save.
Step 7 Configure an identity rule with Active Authentication as the Action as described in Creating an Identity Rule, on page
344 If you selected a response page in step 5, you must also select HTTP Response Page as the Authentication Type.
What to do next
• Deploy configuration changes; see Deploying Configuration Changes, on page 73
Step 1 On the Realm & Settings tab of the identity rule editor page, use Cisco-provided filters in the Application Filters list
to narrow the list of applications you want to add to the filter.
• Click the arrow next to each filter type to expand and collapse the list.
• Right-click a filter type and click Check All or Uncheck All. Note that the list indicates how many filters you have
selected of each type.
• To narrow the filters that appear, type a search string in the Search by name field; this is especially useful for
categories and tags. To clear the search, click the clear icon ( ).
• To refresh the filters list and clear any selected filters, click the reload icon ( ).
• To clear all filters and search fields, click Clear All Filters.
Step 2 Select the applications that you want to add to the filter from the Available Applications list:
• Select All apps matching the filter to add all the applications that meet the constraints you specified in the previous
step.
• To narrow the individual applications that appear, type a search string in the Search by name field. To clear the
search, click the clear icon ( )
.
• Use the paging icons at the bottom of the list to browse the list of individual available applications.
• To refresh the applications list and clear any selected applications, click the reload icon ( ).
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
343
Realms and Identity Policies
Associating an Identity Policy with an Access Control Policy
Step 3 Add the selected applications to exclude from external authentication. You can click and drag, or you can click Add to
Rule. The result is the combination of:
• the selected Application Filters
• either the selected individual Available Applications, or All apps matching the filter
What to do next
• Continue configuring the identity rule as described in Creating an Identity Rule, on page 344
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
Step 2 Select the Advanced tab.
Step 3 Click the edit icon ( ) next to Identity Policy Settings.
Step 4 Select an identity policy from the drop-down.
Step 5 Click OK.
Step 6 Click Store ASA FirePOWER Changes to save your changes.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Identity Policy.
Step 2 Click Add Rule.
Step 3 Configure basic identity rule information as described in Configuring Basic Identity Rule Information, on page 347
Step 4 Optionally, add a zone condition as described in Adding a Zone Condition to an Identity Rule, on page 348
Note If you are configuring the rule for captive portal and your captive portal device contains inline and routed
interfaces, you must configure a zone condition to target only the routed interfaces on the device.
Step 5 Optionally, add a network or geolocation condition as described in Adding a Network or Geolocation Condition to an
Identity Rule, on page 347
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
344
Realms and Identity Policies
Identity Rule Fields
Step 6 Optionally, add a port condition as described in Adding a Port Condition to an Identity Rule, on page 347
Step 7 Associate the rule with a realm as described in Associating a Realm and Configuring Active Authentication Settings in
an Identity Rule, on page 348
Step 8 Click Add.
Step 9 Click Store ASA FirePOWER Changes.
What to do next
• Deploy configuration changes; see Deploying Configuration Changes, on page 73
Enabled
Selecting this option enables the identity rule in the identity policy. Deselecting this option disables the identity
rule.
Action
The type of authentication you want to perform on the users in the specified Realm. You can select Passive
Authentication (User Agent or ISE/ISE-PIC), Active Authentication (captive portal), or No Authentication.
You must fully configure the authentication method, or identity source, before selecting it as the action in an
identity rule.
Realm
The realm containing the users you want to perform the specified Action on. You must fully configure a realm
before selecting it as the realm in an identity rule.
If you select Kerberos (or HTTP Negotiate, if you want Kerberos as an option) as the Authentication Type
in an identity rule, the Realm you select must be configured with an AD Join Username and AD Join
Password in order to perform Kerberos captive portal authentication.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
345
Realms and Identity Policies
Identity Rule Fields
Authentication Type
The method you want to use to perform active authentication. The selections vary depending on the type of
realm, LDAP or AD:
• Select HTTP Basic if you want to authenticate users using an unencrypted HTTP Basic Authentication
(BA) connection. Users log in to the network using their browser's default authentication popup window.
Most web browsers cache the credentials from HTTP Basic logins and use the credentials to seamlessly begin
a new session after an old session times out.
• Select NTLM if you want to authenticate users using a NT LAN Manager (NTLM) connection. This
selection is only available when you select an AD realm. Users log in to the network using their browser's
default authentication popup window. If you select NTLM as your identity rule Authentication Type,
you cannot use a 2003 Windows Server as your identity rule realm.
• Select Kerberos if you want to authenticate users using a Kerberos connection. This selection is available
only when you select an AD realm for a server with secure LDAP (LDAPS) enabled. If transparent
authentication is configured in a user’s browser, the user is automatically logged in. If transparent
authentication is not configured, users log in to the network using their browser’s default authentication
popup window.
The Realm you select must be configured with an AD Join Username and AD Join Password in order to
perform Kerberos captive portal authentication.
Note If you have DNS resolution configured and you create an identity rule to perform Kerberos (or HTTP Negotiate,
if you want Kerberos as an option) captive portal, you must configure your DNS server to resolve the fully
qualified domain name (FQDN) of the captive portal device. The FQDN must match the hostname you
provided when configuring DNS. For ASA with FirePOWER Services devices, the FQDN must resolve to
the IP address of the routed interface used for captive portal.
• Select HTTP Negotiate to allow the captive portal server to choose between HTTP Basic, Kerberos, or
NTLM for the authentication connection. This selection is only available when you select an AD realm.
Users log in to the network using their browser's default authentication popup window.
The Realm you select must be configured with an AD Join Username and AD Join Password in order to
perform Kerberos captive portal authentication.
If you are creating an identity rule to perform HTTP Negotiate captive portal and you have DNS resolution
configured, you must configure your DNS server to resolve the hostname of the captive portal device. The
hostname of the device you are using for captive portal must match the host name you provided when
configuring DNS.
• Select HTTP Response Page if you want to authenticate users using a ASA FirePOWER module-provided
or custom HTTP response page. Users log in to the network using the response page you configure.
The system-provided HTTP response page includes Username and Password fields, as well as a Login as
guest button to allow users to access the network as guests. If you want to display a single login method,
configure a custom HTTP response page.
Users who log in as guests appear in the web interface with the username Guest, and their realm is the realm
specified in the identity rule.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
346
Realms and Identity Policies
Configuring Basic Identity Rule Information
Step 1 On the identity rule editor page, select the Networks tab.
Step 2 Find the networks you want to add from the Available Networks, as follows:
• To add a network object on the fly, which you can then add to the condition, click the add icon ( ) above the
Available Networks list.
• To search for network or geolocation objects to add, select the appropriate tab, click the Search by name or value
prompt above the Available Networks list, then type an object name or the value of one of the object’s components.
The list updates as you type to display matching objects.
Step 3 To select an object, click it. To select all objects, right-click and then select Select All.
Step 4 Click Add to Source or Add to Destination.
Step 5 Add any source or destination IP addresses or address blocks that you want to specify manually. Click the Enter an IP
address prompt below the Source Networks or Destination Networks list; then type an IP address or address block and
click Add.
Step 6 Click Add or continue editing the rule.
Step 1 On the identity rule editor page, select the Ports tab.
Step 2 Find the TCP ports you want to add from the Available Ports, as follows:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
347
Realms and Identity Policies
Adding a Zone Condition to an Identity Rule
• To add a TCP port object on the fly, which you can then add to the condition, click the add icon ( ) above the
Available Ports list.
• To search for TCP-based port objects and groups to add, click the Search by name or value prompt above the
Available Ports list, then type either the name of the object, or the value of a port in the object. The list updates as
you type to display matching objects. For example, if you type 443, the ASA FirePOWER module displays the
provided HTTPS port object.
Step 3 To select a TCP-based port object, click it. To select all TCP-based port objects, right-click and then select Select All.
If the object includes non-TCP-based ports, you cannot add it to your port condition.
Step 4 Click Add to Source or Add to Destination.
Step 5 Enter a Port under the Selected Source Ports or Selected Destination Ports list to manually specify source or destination
ports. You can specify a single port with a value from 0 to 65535.
Step 6 Click Add.
Note The ASA FirePOWER module will not add a port to a rule condition that results in an invalid configuration.
Step 1 On the identity rule editor page, select the Zones tab.
Step 2 Find the zones you want to add from the Available Zones. To search for zones to add, click the Search by name prompt
above the Available Zones list, then type a zone name. The list updates as you type to display matching zones.
Step 3 Click to select a zone. To select all zones, right-click and then select Select All.
Step 4 Click Add to Source or Add to Destination.
Step 5 Click Add or continue editing the rule.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
348
Realms and Identity Policies
Managing Realms
Step 1 On the identity rule editor page, select the Realm & Settings tab.
Step 2 Select a Realm from the drop-down list.
Step 3 Optionally, select the Use active authentication if passive authentication cannot identify user check box. Note that
this check box appears only when configuring a Passive Authentication rule.
Step 4 If you selected the check box in step 3, or if this is an Active Authentication rule, continue with step 4. Otherwise, skip
to step 8.
Step 5 Optionally, select the Identify as Special Identities/Guest if authentication cannot identify user check box.
Step 6 Select an Authentication Type from the drop-down list.
Step 7 Optionally, Exclude HTTP User-Agents to exempt specific application traffic from active authentication as described
in Excluding Applications From Active Authentication, on page 343
Step 8 Click Add or continue editing the rule.
Managing Realms
License: Control
To manage a Realm:
Step 1 Select Configuration > ASA FirePOWER Configuration > Integration > Realms.
Step 2 If you want to delete a realm, click the delete icon ( ).
Step 3 If you want to edit a realm, click the edit icon ( ) next to the realm and make changes as described in Creating a Realm,
on page 336
Step 4 If you want to enable or disable a realm, click the State slider next to the realm you want to enable or disable as described
in Enabling or Disabling a Realm, on page 350.
Step 5 If you want to download users and user groups on demand, click the download icon ( ) as described in Downloading
Users and User Groups On-Demand, on page 350
Step 6 If you want to copy a realm, click the copy icon ( ).
Step 7 If you want to compare realms, see Comparing Realms, on page 349.
Comparing Realms
License: Control
To Compare Realms:
Step 1 Select Configuration > ASA FirePOWER Configuration > Integration > Realms.
Step 2 Click Compare Realms.
Step 3 Select Compare Realm from the Compare Against drop-down list.
Step 4 Select the realms you want to compare from the Realm A and Realm B drop-down lists.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
349
Realms and Identity Policies
Downloading Users and User Groups On-Demand
Step 1 Select Configuration > ASA FirePOWER Configuration > Integration > Realms.
Step 2 Click the download icon ( ) next to the realm where you want to download users and user groups.
What to do next
• Optionally, monitor the task status; see the Task Status page (Monitoring > ASA FirePOWER
Monitoring > Task Status).
Step 1 Select Configuration > ASA FirePOWER Configuration > Integration > Realms.
Step 2 Click the State slider next to the realm you want to enable or disable.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
350
Realms and Identity Policies
Managing the Identity Policy
What to do next
• Optionally, monitor the task status; see the Task Status page (Monitoring > ASA FirePOWER
Monitoring > Task Status).
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Identity Policy.
Step 2 If you want to copy a policy, click the copy icon ( ).
Step 3 If you want to generate a report for the policy, click the report icon ( ).
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Identity Policy.
Step 2 If you want to edit an identity rule, click the edit icon ( )and make changes as described in Creating an Identity Rule,
on page 344.
Step 3 If you want to delete an identity rule, click the delete icon ( ).
Step 4 Click Store ASA FirePOWER Changes.
What to do next
• Deploy configuration changes; see Deploying Configuration Changes, on page 73.
Step 1 On the identity rule editor page, you have the following choices:
• Select above Category from the first Insert drop-down list, then select the category above which you want to
position the rule from the second drop-down list.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
351
Realms and Identity Policies
Adding an Identity Rule Category
• Select below rule from the drop-down list, then enter an existing rule number. This option is valid only when at
least one rule exists in the policy.
• Select above rule from the drop-down list, then, enter an existing rule number. This option is valid only when at
least one rule exists in the policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
352
CHAPTER 26
User Identity Sources
The ASA FirePOWER module supports the following identity sources:
• Authoritative User Agent reporting collects user data for user awareness and user access control. If you
want to configure User Agents to monitor users when they log in and out of hosts or authenticate with
Active Directory credentials, see The User Agent Identity Source, on page 355.
• Authoritative Identity Services Engine (ISE) or ISE-PIC reporting collects user data for user awareness
and user access control. If you have an ISE/ISE-PIC deployment and you want to configure ISE/ISE-PIC
to monitor users as they authenticate via Active Directory domain controllers (DC), see The ISE/ISE-PIC
Identity Source, on page 356.
• Authoritative captive portal authentication actively authenticates users on your network and collects
user data for user awareness and user control. If you want to configure virtual routers or Firepower Threat
Defense devices to perform captive portal authentication, see The Captive Portal Active Authentication
Identity Source, on page 359.
Data from those identity sources is stored in the ASA FirePOWER module users database and the user activity
database.You can configure database-server queries to automatically download new data to your module.
For more information about user detection in the ASA FirePOWER module, see User Detection Fundamentals,
on page 329.
• Troubleshooting Issues with User Identity Sources, on page 353
• The User Agent Identity Source, on page 355
• The ISE/ISE-PIC Identity Source, on page 356
• The Captive Portal Active Authentication Identity Source, on page 359
User Agent
If you experience issues with the User Agent connection, see the Firepower User Agent Configuration Guide
.
If you experience issues with user data reported by the User Agent, note the following:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
353
User Identity Sources
Troubleshooting Issues with User Identity Sources
• After the system detects activity from a User Agent user whose data is not yet in the database, the system
retrieves information about them from the server. In some cases, the system requires up to 60 minutes
to successfully retrieve this information from Active Directory servers. Until the data retrieval succeeds,
activity seen by the User Agent user is handled by access control rules, and is not displayed in the web
interface.
ISE/ISE-PIC
If you experience issues with the ISE/ISE-PIC connection, check the following:
• The pxGrid Identity Mapping feature within ISE must be enabled before you can successfully integrate
ISE with the Firepower System.
• All ISE system certificates and Firepower Management Center certificates must include the serverAuth
and clientAuth extended key usage values.
• The time on your ISE device must be synchronized with the time on the Firepower Management Center.
If the appliances are not synchronized, the system may perform user timeouts at unexpected intervals.
• If your deployment includes a primary and a secondary pxGrid node, the certificates for both nodes must
be signed by the same certificate authority.
• If your deployment includes a primary and a secondary MNT node, the certificates for both nodes must
be signed by the same certificate authority.
If you experience issues with user data reported by ISE/ISE-PIC, note the following:
• After the system detects activity from an ISE user whose data is not yet in the database, the system
retrieves information about them from the server. In some cases, the system requires up to 60 minutes
to successfully retrieve this information from Active Directory servers. Until the data retrieval succeeds,
activity seen by the ISE user is handled by access control rules, and is not displayed in the web interface.
• You cannot perform user control on ISE users who were authenticated by an LDAP, RADIUS, or RSA
domain controller.
• The ASA FirePOWER module does not receive user data for ISE Guest Services users.
• Your ISE version and configuration impact how you can use ISE in the Firepower System. For more
information, see The ISE/ISE-PIC Identity Source, on page 356.
• ISE-PIC does not provide ISE attribute data.
Captive Portal
If you experience issues with captive portal authentication, note the following:
• The time on your captive portal server must be synchronized with the time on the ASA FirePOWER
module.
• If you have DNS resolution configured and you create an identity rule to perform Kerberos (or HTTP
Negotiate, if you want Kerberos as an option) captive portal, you must configure your DNS server to
resolve the fully qualified domain name (FQDN) of the captive portal device. The FQDN must match
the hostname you provided when configuring DNS.
For ASA with FirePOWER Services devices, the FQDN must resolve to the IP address of the routed interface
used for captive portal.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
354
User Identity Sources
The User Agent Identity Source
• If you select Kerberos (or HTTP Negotiate, if you want Kerberos as an option) as the Authentication
Type in an identity rule, the Realm you select must be configured with an AD Join Username and AD
Join Password in order to perform Kerberos captive portal active authentication.
• If you select HTTP Basic as the Authentication Type in an identity rule, users on your network may
not notice their sessions time out. Most web browsers cache the credentials from HTTP Basic logins and
use the credentials to seamlessly begin a new session after an old session times out.
• If the device you want to use for captive portal contains both inline and routed interfaces, you must
configure a zone condition in your captive portal identity rules to target only the routed interfaces on the
captive portal device.
For detailed information about the multi-step User Agent configuration and a complete discussion of the
server requirements, see the User Agent Configuration Guide .
The ASA FirePOWER module connection not only allows you to retrieve metadata for the users whose logins
and logoffs were detected by User Agents, but also is used to specify the users and groups you want to use in
access control rules. If the agent is configured to exclude specific user names, login data for those user names
are not reported to the ASA FirePOWER module. User agent data is stored in the user database and user
activity database on the device.
Note User Agents cannot transmit Active Directory user names ending with the $ character to the ASA FirePOWER
module. You must remove the final $ character if you want to monitor these users.
If multiple users are logged into a host using remote sessions, the agent may not detect logins from that host
properly. For information about how to prevent this, see the User Agent Configuration Guide .
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
355
User Identity Sources
Configuring a User Agent Connection
Step 1 Select Configuration > ASA FirePOWER Configuration Integration > Identity Sources.
Step 2 Select User Agent for the Service Type to enable the User Agent connection.
Note To disable the connection, select None.
Step 3 Click the Add New Agent button to add a new agent.
Step 4 Type the Hostname or Address of the computer where you plan to install the agent. You must use an IPv4 address; you
cannot configure the ASA FirePOWER module to connect to a User Agent using an IPv6 address.
Step 5 Click Add.
Step 6 To delete a connection, click the delete icon and confirm that you want to delete it.
What to do next
• Continue User Agent setup as described in the Firepower User Agent Configuration Guide .
Note The ASA FirePOWER module does not support 802.1x machine authentication alongside AD authentication,
because the system does not associate machine authentication with users. If you use 802.1x active logins,
configure ISE to report only 802.1x active logins (both machine and user). That way, a machine login is
reported only once to the system.
For more information on Cisco ISE/ISE-PIC, see the Cisco Identity Services Engine Administrator Guide and
the Identity Services Engine Passive Identity Connector (ISE-PIC) Installation and Administrator Guide .
Your ISE/ISE-PIC version and configuration affects its integration and interaction with the ASA FirePOWER
module, as follows:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
356
User Identity Sources
ISE/ISE-PIC Fields
• Synchronize the time on the ISE/ISE-PIC server and the ASA FirePOWER module. Otherwise, the
system may perform user timeouts at unexpected intervals.
• If you configure ISE/ISE-PIC to monitor a large number of user groups, the system may drop user
mappings based on groups, due to memory limitations. As a result, access control rules with realm or
user conditions may not fire as expected.
• Version 2.0 patch 4 of ISE includes support for IPv6-enabled endpoints.
• ISE-PIC does not provide ISE attribute data.
For the specific versions of ISE/ISE-PIC that are compatible with this version of the ASA FirePOWER module,
see the Cisco Firepower Compatibility Guide .
Configuring an ISE connection populates the ASA FirePOWER module database with ISE attribute data. You
can use the following ISE attributes for user awareness and user control. This is not supported with ISE-PIC.
ISE/ISE-PIC Fields
The following fields are used to configure a connection to ISE/ISE-PIC.
pxGrid Server CA
The certificate authority for the pxGrid framework. If your deployment includes a primary and a secondary
pxGrid node, the certificates for both nodes must be signed by the same certificate authority.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
357
User Identity Sources
Configuring an ISE/ISE-PIC Connection
MNT Server CA
The certificate authority for the ISE certificate when performing bulk downloads. If your deployment includes
a primary and a secondary MNT node, the certificates for both nodes must be signed by the same certificate
authority.
MC Server Certificate
The certificate and key that the ASA FirePOWER module should provide to ISE when connecting to ISE or
performing bulk downloads.
The MC Server Certificate must include the clientAuth extended key usage value, or it must not include
any extended key usage values.
Note This version of the Firepower System does not support filtering using IPv6 addresses, regardless of your ISE
version.
Note Configuring a realm is optional if you plan to configure SGT ISE attribute conditions but not user, group,
realm, Endpoint Location, or Endpoint Profile conditions.
Step 1 Select Configuration > ASA FirePOWER Configuration > Integration > Identity Sources.
Step 2 Select Identity Services Engine for the Service Type to enable the ISE/ISE-PIC connection.
Note To disable the connection, select None.
Step 3 Type a Primary Host Name/IP Address and, optionally, a Secondary Host Name/IP Address.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
358
User Identity Sources
The Captive Portal Active Authentication Identity Source
Step 4 Select the appropriate certificates from the pxGrid Server CA, MNT Server CA, and MC Server Certificate drop-down
lists. Optionally, click the add icon to create an object on the fly.
Step 5 Optionally, type an ISE Network Filter using CIDR block notation.
Step 6 If you want to test the connection, click Test.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
359
User Identity Sources
ASA FirePOWER Module-Server Downloads
• LDAP and AD users authenticated by captive portal or reported by a User Agent or ISE/ISE-PIC. This
metadata can be used for user awareness and user control.
• POP3 and IMAP user logins detected by traffic-based detection, if those users have the same email
address as an LDAP or AD user. This metadata can be used for user awareness.
You configure an ASA FirePOWER module user database-server connection as a directory within a realm.
You must select the Download users and user groups for access control check box to download a realm's
user and user group data for user awareness and user control.
The ASA FirePOWER module obtains the following information and metadata about each user:
• LDAP user name
• first and last names
• email address
• department
• telephone number
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
360
CHAPTER 27
DNS Policies
License: Any
DNS-based Security Intelligence allows you to whitelist or blacklist traffic based on the domain name requested
by a client. Cisco provides domain name intelligence you can use to filter your traffic; you can also configure
custom lists and feeds of domain names tailored to your deployment. DNS-based Security Intelligence filtering
takes place after hardware-level handling and traffic decryption, and before most other policy-based inspection,
analysis, or traffic handling.
Traffic blacklisted by a DNS policy is immediately blocked and therefore is not subject to any further
inspection—not for intrusions, exploits, malware, and so on. You can override blacklisting with whitelisting
to force access control rule evaluation, and, recommended in passive deployments, you can use a “monitor-only”
setting for Security Intelligence filtering. This allows the ASA FirePOWER module to analyze connections
that would have been blacklisted, but also logs the match to the blacklist and generates an end-of-connection
security intelligence event.
You configure DNS-based Security Intelligence using a DNS policy and associated DNS rules. To deploy it,
you must associate your DNS policy with an access control policy, then deploy your configuration.
• DNS Policy Components, on page 361
• DNS Rules, on page 362
• DNS Policy Deploy, on page 368
Rules
Rules provide a granular method of handling network traffic based on the domain name. Rules in a DNS
policy are numbered, starting at 1. The ASA FirePOWER module matches traffic to DNS rules in top-down
order by ascending rule number.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
361
DNS Policies
Editing a DNS Policy
When you create a DNS policy, the ASA FirePOWER module populates it with a default Global DNS Whitelist
rule, and a default Global DNS Blacklist rule. Each rule is fixed to the first position in their respective categories.
You cannot modify these rules, but you can disable them. The module evaluates rules in the following order:
• Global DNS Whitelist rule (if enabled)
• whitelist rules
• Global DNS Blacklist rule (if enabled)
• blacklist and monitor rules
Usually, the module handles domain name-based network traffic according to the first DNS rule where all
the rule’s conditions match the traffic. If no DNS rules match the traffic, the module continues evaluating the
traffic based on the associated access control policy's rules. DNS rule conditions can be simple or complex.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > DNS Policy.
Step 2 Edit your DNS policy:
• Name and Description - To change the name or description, click the field and type the new information.
• Rules - To add, categorize, enable, disable, or otherwise manage DNS rules, click the Rules tab and proceed as
described in Creating and Editing DNS Rules, on page 363.
What to do next
• Deploy configuration changes; see Deploying Configuration Changes, on page 73.
DNS Rules
License: Any
DNS rules handle traffic based on the domain name requested by a host. As part of Security Intelligence, this
evaluation happens after any traffic decryption, and before access control evaluation.
The ASA FirePOWER module matches traffic to DNS rules in the order you specify. In most cases, the module
handles network traffic according to the first DNS rule where all the rule’s conditions match the traffic. When
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
362
DNS Policies
Creating and Editing DNS Rules
you create DNS rules, the module places whitelist rules before monitor and blacklist rules, and evaluates
traffic against whitelist rules first.
In addition to its unique name, each DNS rule has the following basic components:
State
By default, rules are enabled. If you disable a rule, the ASA FirePOWER module does not use it to evaluate
network traffic, and stops generating warnings and errors for that rule.
Position
Rules in a DNS policy are numbered, starting at 1. The ASA FirePOWER module matches traffic to rules in
top-down order by ascending rule number. With the exception of Monitor rules, the first rule that traffic
matches is the rule that handles that traffic.
Conditions
Conditions specify the specific traffic the rule handles. A DNS rule must contain a DNS feed or list condition,
and can also match traffic by security zone or network.
Action
A rule’s action determines how the ASA FirePOWER module handles matching traffic:
• Whitelisted traffic is allowed, subject to further access control inspection.
• Monitored traffic is subject to further evaluation by remaining DNS blacklist rules. If the traffic does
not match a DNS blacklist rule, it is inspected with access control rules. The module logs a Security
Intelligence event for the traffic.
• Blacklisted traffic is dropped without further inspection. You can also return a Domain Not Found
response, or redirect the DNS query to a sinkhole server.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > DNS Policy.
Step 2 You have the following options:
• To add a new rule, click Add DNS Rule.
• To edit an existing rule, click the edit icon.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
363
DNS Policies
DNS Rule Management
• Conditions - Configure the rule’s conditions; see DNS Rule Conditions, on page 366.
• Enabled - Specify whether the rule is Enabled.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > DNS Policy.
Step 2 In the DNS policy editor that contains the rule you want to enable or disable, right-click the rule and choose a rule state.
Step 3 Click OK.
Step 4 Click Store ASA FirePOWER Changes.
What to do next
• Deploy configuration changes; see Deploying Configuration Changes, on page 73.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
364
DNS Policies
DNS Rule Actions
• For non-Monitor rules, the module does not continue to evaluate traffic against additional, lower-priority
DNS rules after that traffic matches a rule.
Note the following regarding rule order:
• The Global Whitelist is always first, and takes precedence over all other rules.
• The Whitelist section precedes the Blacklist section; whitelist rules always take precedence over other
rules.
• The Global Blacklist is always first in the Blacklist section, and takes precedence over all other Monitor
and blacklist rules.
• The Blacklist section contains Monitor and blacklist rules.
• When you first create a DNS rule, the module positions it last in the Whitelist section if you assign a
Whitelist action, or last in the Blacklist section if you assign any other action.
You can drag and drop rules to reorder them, and change the evaluation order.
Whitelist Action
The Whitelist action allows matching traffic to pass. When you whitelist traffic, it is subject to further
inspection either by a matching access control rule, or the access control policy's default action.
The module does not log whitelist matches. However, logging of whitelisted connections depends on their
eventual disposition.
Monitor Action
The Monitor action does not affect traffic flow; matching traffic is neither immediately whitelisted nor
blacklisted. Rather, traffic is matched against additional rules to determine whether to permit or deny it. The
first non-Monitor DNS rule matched determines whether the module blacklists the traffic. If there are no
additional matching rules, the traffic is subject to access control evaluation.
For connections monitored by a DNS policy, the ASA FirePOWER module logs end-of-connection Security
Intelligence and connection events.
Blacklist Actions
The blacklist actions blacklist traffic without further inspection of any kind:
• The Drop action drops the traffic.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
365
DNS Policies
DNS Rule Conditions
• The Domain Not Found action returns a non-existent internet domain response to the DNS query, which
prevents the client from resolving the DNS request.
• The Sinkhole action returns a sinkhole object's IPv4 or IPv6 address in response to the DNS query. The
sinkhole server can log, or log and block, follow-on connections to the IP address. If you configure a
Sinkhole action, you must also configure a sinkhole object.
For a connection blacklisted based on the Drop or Domain Not Found actions, the module logs
beginning-of-connection Security Intelligence and connection events. Because blacklisted traffic is immediately
denied without further inspection, there is no unique end of connection to log.
For a connection blacklisted based on the Sinkhole action, logging depends on the sinkhole object configuration.
If you configure your sinkhole object to only log sinkhole connections, the module logs end-of-connection
connection events for the follow-on connection. If you configure your sinkhole object to log and block sinkhole
connections, the module logs beginning-of-connection connection events for the follow-on connection, then
blocks that connection.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
366
DNS Policies
Controlling Traffic Based on DNS and Network
What to do next
• Deploy configuration changes; see Deploying Configuration Changes, on page 73.
Step 4 Add any source IP addresses or address blocks that you want to specify manually. Click the Enter an IP address prompt
below the Source Networks list; then type an IP address or address block and click Add.
Step 5 Save or continue editing the rule.
What to do next
• Deploy configuration changes; see Deploying Configuration Changes, on page 73.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
367
DNS Policies
DNS Policy Deploy
What to do next
• Deploy configuration changes; see Deploying Configuration Changes, on page 73.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
368
CHAPTER 28
Blocking Malware and Prohibited Files
Malicious software, or malware , can enter your organization’s network via multiple routes. To help you
identify and mitigate the effects of malware, the ASA FirePOWER module’s file control and advanced malware
protection components can detect, track, store, analyze, and optionally block the transmission of malware and
other types of files in network traffic.
You configure the system to perform malware protection and file control as part of your overall access control
configuration. File policies that you create and associate with access control rules handle network traffic that
matches the rules.
Although you can create file policies with any license, certain aspects of malware protection and file control
require that you enable specific licensed capabilities on the ASA FirePOWER module, as described in the
following table.
Table 65: License and Appliance Requirements for Intrusion and File Inspection
intrusion prevention detect and optionally block intrusions and exploits Protection
file control detect and optionally block the transmission of file Protection
types
advanced malware protection detect, track, and optionally block the transmission Malware
(AMP) of malware
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
369
Blocking Malware and Prohibited Files
Understanding Malware Protection and File Control
FirePOWER module then performs a malware cloud lookup using the file’s SHA-256 hash value. Based on
these results, the Cisco cloud returns a file disposition to the ASA FirePOWER module.
If a file has a disposition in the cloud that you know to be incorrect, you can add the file’s SHA-256 value to
a file list:
• To treat a file as if the cloud assigned a clean disposition, add the file to the clean list .
• To treat a file as if the cloud assigned a malware disposition, add the file to the custom detection list.
If the system detects a file’s SHA-256 value on a file list, it takes the appropriate action without performing
a malware lookup or checking the file disposition. Note that you must configure a rule in the file policy with
either a Malware Cloud Lookup or Block Malware action and a matching file type to calculate a file’s SHA
value. You can enable use of the clean list or custom detection list on a per-file-policy basis.
To inspect or block files, you must enable a Protection license on the ASA FirePOWER module. To add files
to a file list, you must also enable a Malware license.
Tip If you see several Unavailable malware events in quick succession, check your cloud connection and port
configuration. For more information, see Security, Internet Access, and Communication Ports, on page 521.
Based on the file disposition, the ASA FirePOWER module either blocks the file or blocks its upload or
download. To improve performance, if the system already knows the disposition for a file based on its SHA-256
value, your appliance uses the cached disposition rather than querying the Cisco cloud.
Note that file dispositions can change. For example, the cloud can determine that a file that was previously
thought to be clean is now identified as malware, or the reverse—that a malware-identified file is actually
clean. When the disposition changes for a file for which you performed a malware lookup in the last week,
the cloud notifies the ASA FirePOWER module so the system can take appropriate action the next time it
detects that file being transmitted. A changed file disposition is called a retrospective disposition.
File dispositions returned from a malware cloud lookup have a time-to-live (TTL) value. After a file disposition
has been held for the duration specified in the TTL value without update, the system purges the cached
information. Dispositions have the following TTL values:
• Clean—4 hours
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
370
Blocking Malware and Prohibited Files
Configuring Malware Protection and File Control
• Unknown—1 hour
• Malware—1 hour
If a malware cloud lookup against the cache identifies a cached disposition that timed out, the system performs
a fresh lookup to determine a file disposition.
In addition, the file policy can automatically treat a file as if it is clean or malware based on entries in the
clean list or custom detection list
As a simple example, you could implement a file policy that blocks your users from downloading executable
files. For detailed information on file policies and associating them with access control rules, see Understanding
and Creating File Policies, on page 372.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
371
Blocking Malware and Prohibited Files
Understanding and Creating File Policies
When the system generates a malware event based on detection or blocking of malware in network traffic, it
also generates a file event, because to detect malware in a file the system must first detect the file itself.
The policy has two access control rules, both of which use the Allow action and are associated with file
policies. The policy’s default action is also to allow traffic, but without file policy inspection. In this scenario,
traffic is handled as follows:
• Traffic that matches Rule 1 is inspected by File Policy A .
• Traffic that does not match Rule 1 is evaluated against Rule 2 . Traffic that matches Rule 2 is inspected
by File Policy B.
• Traffic that does not match either rule is allowed; you cannot associate a file policy with the default
action.
A file policy, like its parent access control policy, contains rules that determine how the system handles files
that match the conditions of each rule. You can configure separate file rules to take different actions for
different file types, application protocols, or directions of transfer.
Once a file matches a rule, the rule can:
• allow or block files based on simple file type matching
• block files based on Malware file disposition
In addition, the file policy can automatically treat a file as if it is clean or malware based on entries in the
clean list or custom detection list
You can associate a single file policy with an access control rule whose action is Allow, Interactive Block,
or Interactive Block with reset. The system then uses that file policy to inspect network traffic that meets
the conditions of the access control rule. By associating different file policies with different access control
rules, you have granular control over how you identify and block files transmitted on your network. Note,
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
372
Blocking Malware and Prohibited Files
Understanding and Creating File Policies
however, that you cannot use a file policy to inspect traffic handled by the access control default action. For
detailed information, see Inspecting Allowed Traffic For Intrusions and Malware, on page 138.
File Rules
You populate a file policy with file rules. The following table describes the components of a file rule.
application protocol The system can detect and inspect files transmitted via FTP, HTTP, SMTP, IMAP,
POP3, and NetBIOS-ssn (SMB). To improve performance, you can restrict file
detection to only one of those application protocols on a per-file rule basis.
direction of transfer You can inspect incoming FTP, HTTP, IMAP, POP3, and NetBIOS-ssn (SMB)
traffic for downloaded files; you can inspect outgoing FTP, HTTP, SMTP, and
NetBIOS-ssn (SMB) traffic for uploaded files.
file categories and The system can detect various types of files. These file types are grouped into basic
types categories, including multimedia (swf, mp3), executables (exe, torrent), and PDFs.
You can configure file rules that detect individual file types, or on entire categories
of file types.
For example, you could block all multimedia files, or just ShockWave Flash (swf)
files. Or, you could configure the system to alert you when a user downloads a
BitTorrent (torrent) file.
Caution Frequently triggered file rules can affect system performance. For example,
detecting multimedia files in HTTP traffic (YouTube, for example,
transmits significant Flash content) could generate an overwhelming
number of events.
file rule action A file rule’s action determines how the system handles traffic that matches the
conditions of the rule.
Note File rules are evaluated in rule-action, not numerical, order. For more
information, see the next section, File Rule Actions and Evaluation Order.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
373
Blocking Malware and Prohibited Files
Understanding and Creating File Policies
• Detect Files rules allow you to log the detection of specific file types while still allowing their
transmission.
For each file rule action, you can configure options to reset the connection when a file transfer is blocked.
The following table details the options available to each file action.
Detect Files no
File and Malware Detection, Capture, and Blocking Notes and Limitations
Note the following details and limitations on file and malware detection, capture, and blocking behavior:
• Until a file is detected and block in a session, packets from the session may be subject to intrusion
inspection.
• If an end-of-file marker is not detected for a file, regardless of transfer protocol, the file is not blocked
by a Block Malware rule or by the custom detection list. The system waits to block the file until the
entire file has been received, as indicated by the end-of-file marker, and blocks the file after the marker
is detected.
• If the end-of-file marker for an FTP file transfer is transmitted separately from the final data segment,
the marker is blocked and the FTP client indicates that the file transfer failed, but the file actually
completely transfers to disk.
• FTP transfers commands and data over different channels. In a passive deployment, the traffic from an
FTP data session and its control session may not be load-balanced to the same Snort.
• If a file matches a rule with an application protocol condition, file event generation occurs after the
system successfully identifies a file’s application protocol. Unidentified files do not generate file events.
• For an access control policy using a file policy with Block Malware rules for FTP, if you set the default
action to an intrusion policy with Drop when Inline disabled, the system generates events for detected
files or malware matching the rules, but does not drop the files. To block FTP fire transfers and use an
intrusion policy as the default action for the access control policy where you select the file policy, you
must select an intrusion policy with Drop when Inline enabled.
• File rules with Block Files and Block Malware actions block automatic resumption of file download
via HTTP by blocking new sessions with the same file, URL, server, and client application detected for
24 hours after the initial file transfer attempt occurs.
• In rare cases, if traffic from an HTTP upload session is out of order, the system cannot reassemble the
traffic correctly and therefore does not block it or generate a file event.
• If you transfer a file over NetBIOS-ssn (such as an SMB file transfer) that is blocked with a Block Files
rule, you may see a file on the destination host. However, the file is unusable because it is blocked after
the download starts, resulting in an incomplete file transfer.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
374
Blocking Malware and Prohibited Files
Understanding and Creating File Policies
• If you create file rules to detect or block files transferred over NetBIOS-ssn (such as an SMB file transfer),
the system does not inspect files transferred in an established TCP or SMB session started before you
apply an access control policy invoking the file policy, so those files will not be detected or blocked.
• A rule configured to block files in a passive deployment does not block matching files. Because the
connection continues to transmit the file, if you configure the rule to log the beginning of the connection,
you may see multiple events logged for this connection.
• If the total number of bytes for all file names for files in a POP3, POP, SMTP, or IMAP session exceeds
1024, file events from the session may not reflect the correct file names for files that were detected after
the file name buffer filled.
• When transmitting text-based files over SMTP, some mail clients convert newlines to the CRLF newline
character standard. Since Mac-based hosts use the carriage return (CR) character and Unix/Linux-based
hosts use the line feed (LF) character, newline conversion by the mail client may modify the size of the
file. Note that some mail clients default to newline conversion when processing an unrecognizable file
type.
• Cisco recommends that you enable Reset Connection for the Block Files and Block Malware actions
to prevent blocked application sessions from remaining open until the TCP connection resets. If you do
not reset connections, the client session remains open until the TCP connection resets itself.
• If a file rule is configured with a Malware Cloud Lookup or Block Malware action and the ASA
FirePOWER module cannot establish connectivity with the cloud, the system cannot perform any
configured rule action options until cloud connectivity is restored.
SMTP Upload Block Files Reset Blocks users from emailing PDF files and
Connection resets the connection.
FTP Download Block Malware Reset Blocks the download of malware PDF files
Connection via file transfer, and resets the connection.
POP3 Download Malware Cloud none Inspects PDF files received via email for
Lookup malware.
IMAP
Any Any Detect Files none Detects and logs, but allows the traffic,
when users view PDF files on the web
(that is, via HTTP).
The ASA FirePOWER module uses warning icons to designate conflicting file rules.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
375
Blocking Malware and Prohibited Files
Understanding and Creating File Policies
Note that you cannot perform malware analysis on all file types detected by the system. After you select values
from the Application Protocol, Direction of Transfer, and Action drop-down lists, the system constrains
the list of file types.
When a file policy generates a file or malware event, or captures a file, the system automatically logs the end
of the associated connection, regardless of the logging configuration of the invoking access control rule.
Note File events generated by inspecting NetBIOS-ssn (SMB) traffic do not immediately generate connection events
because the client and server establish a persistent connection. The system generates connection events after
the client or server ends the session.
• The Files field contains an icon that indicates the number of files (including malware files) detected
in the connection; click the icon to see a list of those files and, for malware files, their file dispositions.
• The Reason field indicates the reason the connection event was logged, which depends on the file rule
action:
• File Monitor for Detect Files and Malware Cloud Lookup file rules and for files on the clean list
• File Block for Block Files or Block Malware file rules
• File Custom Detection if the system encountered a file on the custom detection list
• File Resume Allow where file transmission was originally blocked by a Block Files or Block Malware
file rule. After a new access control policy was applied that allowed the file, the HTTP session
automatically resumed.
• File Resume Block where file transmission was originally allowed by a Detect Files or Malware
Cloud Lookup file rule. After a new access control policy was applied that blocked the file, the
HTTP session automatically stopped.
• For connections where a file or malware was blocked, the Action is Block.
As with any kind of event generated by the ASA FirePOWER module, you can view file and malware events.
You can also use malware events to alert you via SNMP or syslog.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
376
Blocking Malware and Prohibited Files
Creating a File Policy
Internet Access
The system uses port 443 to perform malware cloud lookups for network-based AMP. You must open that
port outbound on the ASA FirePOWER module.
Tip To make a copy of an existing file policy, click the copy icon, then type a unique name for the new policy in
the dialog box that appears. You can then modify the copy
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Files.
The File Policies page appears.
For a new policy, the module interface indicates that the policy is not in use. If you are editing an in-use file policy, the
module interface tells you how many access control policies use the file policy. In either case, you can click the text to
jump to the Access Control Policies page; see Getting Started with Access Control Policies, on page 63.
Step 2 Enter a Name and optional Description for your new policy, then click Save.
The File Policy Rules tab appears.
Step 4 Configure the advanced options. See Configuring Advanced File Policy General Options, on page 379 for more information.
Step 5 Click Store ASA FirePOWER Changes.
To use your new policy, you must add the file policy to an access control rule, then apply the access control policy. If
you are editing an existing file policy, you must reapply any access control policies that use the file policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
377
Blocking Malware and Prohibited Files
Working with File Rules
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Files.
The File Policies page appears.
Step 3 On the File Policy Rules page that appears, click Add File Rule.
The Add File Rule dialog box appears.
You can inspect the following types of outgoing traffic for uploaded files:
• HTTP
• FTP
• SMTP
• NetBIOS-ssn (SMB)
Use Any to detect files over multiple application protocols, regardless of whether users are sending or receiving.
Step 6 Select a file rule Action. See the File Rule Actions table for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
378
Blocking Malware and Prohibited Files
Configuring Advanced File Policy General Options
When you select either Block Files or Block Malware, Reset Connection is enabled by default. To not reset the
connection where a blocked file transfer occurs, clear the Reset Connection check box.
Note Cisco recommends that you leave Reset Connection enabled to prevent blocked application sessions from
remaining open until the TCP connection resets.
For detailed information on file rule actions, see File Rule Actions and Evaluation Order.
Step 7 Select one or more File Types. Use the Shift and Ctrl keys to select multiple file types. You can filter the list of file types
in the following ways:
• Select one or more File Type Categories.
• Search for a file type by its name or description. For example, type Windows in the Search name and description
field to display a list of Microsoft Windows-specific files.
The file types that you can use in a file rule vary depending on your selections for Application Protocol, Direction of
Transfer, and Action.
For example, selecting Download as the Direction of Transfer removes GIF , PNG , JPEG , TIFF , and ICO from the
Graphics category to prevent an excess of file events.
Step 8 Add the selected file types to the Selected Files Categories and Types list:
• Click Add to add selected file types to the rule.
• Drag and drop one or more file types into the Selected Files Categories and Types list.
• With a category selected, click All types in selected Categories, then either click Add or drag and drop that selection
to the Selected Files Categories and Types list.
Enable Custom Detection List Select this to block files on the custom detection list when enabled
detected.
Enable Clean List Select this to allow files on the clean list when detected. enabled
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
379
Blocking Malware and Prohibited Files
Comparing Two File Policies
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Files.
The File Policies page appears.
Step 2 Click the edit icon next to the policy you want to edit.
The File Policy Rule page appears.
Step 4 Modify the options as described in the Advanced File Policy General Optionstable.
Step 5 Click Store ASA FirePOWER Changes.
You must reapply any access control policies that use the file policy you edited.
You can navigate through the differences by clicking Previous and Next. The double-arrow icon centered
between the left and right sides moves, and the Difference number adjusts to identify which difference you
are viewing. Optionally, you can generate a file policy comparison report , which is a PDF version of the
comparison view.
To compare two file policies:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Files.
The File Policies page appears.
Step 3 From the Compare Against drop-down list, select the type of comparison you want to make:
• To compare two different policies, select either Running Configuration or Other Policy. The practical difference
between the two options is that if you select Running Configuration, the system limits one of your comparison
choices to the set of currently applied file policies.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
380
Blocking Malware and Prohibited Files
Comparing Two File Policies
Step 4 Depending on the comparison type you selected, you have the following choices:
• If you are comparing two different policies, select the policies you want to compare: Policy A or Target/Running
Configuration A, and Policy B.
• If you are comparing revisions of the same policy, select the Policy you want to use, then select the two revisions:
Revision A and Revision B. Revisions are listed by date and user name.
Step 6 Optionally, click Comparison Report to generate a file policy comparison report. You are prompted to save the report
to your computer.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
381
Blocking Malware and Prohibited Files
Comparing Two File Policies
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
382
CHAPTER 29
Logging Connections in Network Traffic
As devices monitor traffic generated by the hosts on your network, they can generate logs of the connections
they detect. Various settings in access control and SSL policies give you granular control over which
connections you log, when you log them, and where you store the data. An access control rule’s specific
logging configuration also determines whether you log file and malware events associated with the connection.
In most cases, you can log a connection at its beginning and its end. When you log a connection, the system
generates a connection event . You can also log a special kind of connection event, called a Security Intelligence
event , whenever a connection is blacklisted (blocked) by the reputation-based Security Intelligence feature.
Connection events contain data about the detected sessions.
You should log connections according to the security and compliance needs of your organization.
• Deciding Which Connections To Log, on page 383
• Logging Security Intelligence (Blacklisting) Decisions, on page 389
• Logging Connections Based on Access Control Handling, on page 391
• Logging URLs Detected in Connections, on page 394
• Logging Encrypted Connections, on page 395
Tip To perform detailed analysis of connection data using the ASA FirePOWER module, Cisco recommends you
log the ends of critical connections.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
383
Logging Connections in Network Traffic
Logging Critical Connections
Caution Logging blocked TCP connections during a Denial of Service (DoS) attack can overwhelm the system with
multiple similar events. Before you enable logging for an Block rule, consider whether the rule monitors
traffic on an Internet-facing interface or other interface vulnerable to DoS attack.
In addition to the logging that you configure, the system automatically logs most connections where the system
detects a prohibited file, malware, or intrusion attempt. The system saves these end-of-connection events for
further analysis. All connection events reflect why they were automatically logged using the Action and
Reason fields.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
384
Logging Connections in Network Traffic
Logging the Beginning and End of Connections
Note File events generated by inspecting NetBIOS-ssn (SMB) traffic do not immediately generate connection events
because the client and server establish a persistent connection. The system generates connection events after
the client or server ends the session.
For connections where a file was blocked, the action for the connection in the connection log is Block even
though to perform file and malware inspection you must use an Allow rule. The connection’s reason is either
File Monitor (a file type or malware was detected), or Malware Block or File Block (a file was blocked).
Note For a single non-blocked connection, the end-of-connection event contains all of the information in the
beginning-of-connection event, as well as information gathered over the duration of the session.
Note that monitoring a connection for any reason forces end-of-connection logging; see Understanding Logging
for Monitored Connections, on page 386.
The following table details the differences between beginning and end-of-connection events, including the
advantages to logging each.
Can be when the system detects the beginning of when the system:
generated... a connection (or, after the first few
• detects the close of a connection
packets if event generation depends on
application or URL identification) • does not detect the end of a connection after
a period of time
• can no longer track the session due to
memory constraints
Can be logged all connections evaluated by Security all connections are configurable, though the
for... Intelligence or access control rules system cannot log the end of blocked or
blacklisted connections
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
385
Logging Connections in Network Traffic
Logging Connections to the ASA FirePOWER Module or External Server
Contain... only information that can be determined all information in the beginning-of-connection
in the first packet (or the first few packets, event, plus information determined by examining
if event generation depends on application traffic over the duration of the session, for
or URL identification) example, the total amount of data transmitted or
the timestamp of the last packet in the connection
Understanding How Access Control and SSL Rule Actions Affect Logging
License: feature dependent
Every access control and SSL rule has an action that determines not only how the system inspects and handles
the traffic that matches the rule, but also when and how you can log details about matching traffic.
In other words, if a packet matches a Monitor rule or Security Intelligence monitored blacklist, the connection
is always logged, even if the packet matches no other rules and you do not enable logging on the default
action. Whenever the system logs a connection event as the result of Security Intelligence filtering, it also
logs a matching Security Intelligence event, which is a special kind of connection event that you can view
and analyze separately; see Logging Security Intelligence (Blacklisting) Decisions, on page 389.
Because monitored traffic is always later handled by another rule or by the default action, the action associated
with a connection logged due to a monitor rule is never Monitor . Rather, it reflects the action of the rule or
default action that later handles the connection.
The system does not generate a separate event each time a single connection matches an SSL or access control
Monitor rule. Because a single connection can match multiple Monitor rules, each connection event logged
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
386
Logging Connections in Network Traffic
Understanding Logging for Trusted Connections
to the ASA FirePOWER module can include and display information on the first eight Monitor access control
rules that the connection matches, as well as the first matching Monitor SSL rule.
Similarly, if you send connection events to an external syslog or SNMP trap server, the system does not send
a separate alert each time a single connection matches a Monitor rule. Rather, the alert that the system sends
at the end of the connection contains information on the Monitor rules the connection matched.
Note that only devices deployed inline can block traffic. Because blocked connections are not actually blocked
in passive deployments, the system may report multiple beginning-of-connection events for each blocked
connection.
Caution Logging blocked TCP connections during a Denial of Service (DoS) attack can overwhelm the system with
multiple similar events. Before you enable logging for an Block rule, consider whether the rule monitors
traffic on an Internet-facing interface or other interface vulnerable to DoS attack.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
387
Logging Connections in Network Traffic
Disabling File and Malware Event Logging for Allowed Connections
Decrypt SSL rules, Do not decrypt SSL rules, and Allow access control rules permit matching traffic to pass
to the next phase of inspection and traffic handling.
When you allow traffic with an access control rule, you can use an associated intrusion or file policy (or both)
to further inspect traffic and block intrusions, prohibited files, and malware before the traffic can reach its
final destination.
Connections for traffic matching an Allow access control rule are logged as follows:
• When an intrusion policy invoked by an access control rule detects an intrusion and generates an intrusion
event, the system automatically logs the end of the connection where the intrusion occurred to the ASA
FirePOWER module, regardless of the logging configuration of the rule.
• When a file policy invoked by an access control rule detects a prohibited file (including malware) and
generates a file or malware event, the system automatically logs the end of the connection where the file
was detected to the ASA FirePOWER module, regardless of the logging configuration of the access
control rule.
• Optionally, you can enable beginning- and end-of-connection logging for any allowed traffic, including
traffic that the system deems safe or that you do not inspect with an intrusion or file policy.
For all of the resulting connection events, the Action and Reason fields reflect why the events were logged.
Note that:
• An action of Allow represents explicitly allowed and user-bypassed interactively blocked connections
that reached their final destination.
• An action of Block represents a connection that was at first allowed by an access control rule, but where
an intrusion, prohibited file, or malware was detected.
If you do not want to log file or malware events, you can disable this logging on a per-access-control-rule
basis by clearing the Log Files check box on the Logging tab of the access control rule editor.
Note Cisco recommends you leave file and malware event logging enabled.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
388
Logging Connections in Network Traffic
License Requirements for Connection Logging
Regardless of whether you save file and malware events, when network traffic violates a file policy, the system
automatically logs the end of the associated connection to the ASA FirePOWER module, regardless of the
logging configuration of the invoking access control rule; see Connections Associated with File and Malware
Events (Automatic), on page 385.
Table 70: License Requirements for Connection Logging in Access Control Policies
for traffic handled using, network, port, or literal URL criteria Any
for traffic that the system filters using URL category and reputation data, and to display URL URL
category and URL reputation information for URLs requested by monitored hosts Filtering
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
389
Logging Connections in Network Traffic
Logging Security Intelligence (Blacklisting) Decisions
Enabling Security Intelligence logging logs all blocked and monitored connections handled by an access
control policy. However, the system does not log whitelist matches; logging of whitelisted connections depends
on their eventual disposition.
When the system logs a connection event as the result of Security Intelligence filtering, it also logs a matching
Security Intelligence event, which is a special kind of connection event that you can view and analyze separately.
Both types of events use the Action and Reason fields to reflect the blacklist match. Additionally, so that you
can identify the blacklisted IP address in the connection, host icons next to blacklisted and monitored IP
addresses look slightly different in the event viewer.
Logging Blocked Blacklisted Connections
For a blocked connection, the system logs beginning-of-connection Security Intelligence and connection
events. Because blacklisted traffic is immediately denied without further inspection, there is no unique end
of connection to log. For these events, the action is Block and the reason is IP Block .
IP Block connection events have a threshold of 15 seconds per unique initiator-responder pair. That is, once
the system generates an event when it blocks a connection, it does not generate another connection event for
additional blocked connections between those two hosts for the next 15 seconds, regardless of port or protocol.
Logging Monitored Blacklisted Connections
For connections monitored—rather than blocked—by Security Intelligence, the system logs end-of-connection
Security Intelligence and connection events to the ASA FirePOWER module. This logging occurs regardless
of how the connection is later handled by an SSL policy, access control rule, or the access control default
action.
For these connection events, the action depends on the connection’s eventual disposition. The Reason field
contains IP Monitor , as well as any other reason why the connection may have been logged.
Note that the system may also generate beginning-of-connection events for monitored connections, depending
on the logging settings in the access control rule or default action that later handles the connection.
To log blacklisted connections:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon next to the access control policy you want to configure.
The access control policy editor appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
390
Logging Connections in Network Traffic
Logging Connections Based on Access Control Handling
• To send events to an external syslog server, select Syslog, then select a syslog alert response from the drop-down
list. Optionally, you can add a syslog alert response by clicking the add icon; see Creating a Syslog Alert Response,
on page 415.
• To send connection events to an SNMP trap server, select SNMP Trap, then select an SNMP alert response from
the drop-down list. Optionally, you can add an SNMP alert response by clicking the add icon; see Creating an SNMP
Alert Response, on page 414.
You must send events to the Event Viewer if you want to set blacklisted objects to monitor-only, or perform any other
ASA FirePOWER module-based analysis on connection events generated by Security Intelligence filtering. For more
information, see Logging Connections to the ASA FirePOWER Module or External Server, on page 386.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
391
Logging Connections in Network Traffic
Logging Connections Matching an Access Control Rule
To configure an access control rule to log connection, file, and malware information:
Step 2 Click the edit icon next to the access control policy you want to modify.
The access control policy editor appears, focused on the Rules tab.
Step 3 Click the edit icon next to the rule where you want to configure logging.
The access control rule editor appears.
Step 5 Specify whether you want to Log at Beginning and End of Connection, Log at End of Connection, or you want No
Logging at Connection.
For a single non-blocked connection, the end-of-connection event contains all of the information in the
beginning-of-connection event, as well as information gathered over the duration of the session. Because blocked traffic
is immediately denied without further inspection, the system logs only beginning-of-connection events for Block rules.
For this reason, when you set the rule action to Block or Block with reset you are prompted Log at Beginning of
Connection.
Step 6 Use the Log Files check box to specify whether the system should log any file and malware events associated with the
connection.
The system automatically enables this option when you associate a file policy with the rule to perform either file control
or AMP. Cisco recommends you leave this option enabled; see Disabling File and Malware Event Logging for Allowed
Connections, on page 388.
Step 7 Specify where to send connection events. You have the following choices:
• To send connection events to the ASA FirePOWER module, select Event Viewer. You cannot disable this option
for Monitor rules.
• To send events to an external syslog server, select Syslog, then select a syslog alert response from the drop-down
list. Optionally, you can add a syslog alert response by clicking the add icon; see Creating a Syslog Alert Response,
on page 415.
• To send events to an SNMP trap server, select SNMP Trap, then select an SNMP alert response from the drop-down
list. Optionally, you can add an SNMP alert response by clicking the add icon; see Creating an SNMP Alert Response,
on page 414.
You must send events to the event viewer if you want to perform ASA FirePOWER module-based analysis on connection
events. For more information, see Logging Connections to the ASA FirePOWER Module or External Server, on page
386.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
392
Logging Connections in Network Traffic
Logging Connections Handled by the Access Control Default Action
Your rule is saved. You must apply the access control policy for your changes to take effect; see Deploying Configuration
Changes, on page 73.
Access Control: Block All Block rules Understanding Logging for Blocked and
Traffic Interactively Blocked Connections, on page
387
Access Control: Trust All Trust rules Understanding Logging for Trusted
Traffic Connections, on page 387
Intrusion Prevention Allow rules with associated Understanding Logging for Allowed
intrusion policies Connections, on page 387
However, there are some differences between logging connections handled by access control rules versus the
default action:
• The default action has no file logging options. You cannot perform file control or AMP using the default
action.
• When an intrusion policy associated with the access control default action generates an intrusion event,
the system does not automatically log the end of the associated connection. This is useful for intrusion
detection and prevention-only deployments, where you do not want to log any connection data.
An exception to this rule occurs if you enable beginning- and end-of-connection logging for the default action.
In that case, the system does log the end of the connection when an associated intrusion policy triggers, in
addition to logging the beginning of the connection.
Note that even if you disable logging for the default action, end-of-connection events for connections matching
that rule may still be logged to the ASA FirePOWER module if the connection previously matched at least
one access control Monitor rule, or was inspected and logged by an SSL policy.
To log connections in traffic handled by the access control default action:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
393
Logging Connections in Network Traffic
Logging URLs Detected in Connections
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon next to the access control policy you want to modify.
The access control policy editor appears, focused on the Rules tab.
Step 3 Click the logging icon next to the Default Action drop-down list.
The Logging pop-up window appears.
Step 4 Specify whether you want to Log at Beginning and End of Connection, Log at End of Connection, or you want No
Logging at Connection.
For a single non-blocked connection, the end-of-connection event contains all of the information in the
beginning-of-connection event, as well as information gathered over the duration of the session. Because blocked traffic
is immediately denied without further inspection, the system logs only beginning-of-connection events for the Block All
Traffic default action. For this reason, when you set the default action to Access Control: Block All Traffic you are
prompted Log at Beginning of Connection.
Step 5 Specify where to send connection events. You have the following choices:
• To send connection events to the ASA FirePOWER module, select Event Viewer. You cannot disable this option
for Monitor rules.
• To send events to an external syslog server, select Syslog, then select a syslog alert response from the drop-down
list. Optionally, you can add a syslog alert response by clicking the add icon; see Creating a Syslog Alert Response,
on page 415.
• To send events to an SNMP trap server, select SNMP Trap, then select an SNMP alert response from the drop-down
list. Optionally, you can add an SNMP alert response by clicking the add icon; see Creating an SNMP Alert Response,
on page 414.
You must send events to the event viewer if you want to perform ASA FirePOWER module-based analysis on connection
events. For more information, see Logging Connections to the ASA FirePOWER Module or External Server, on page
386.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
394
Logging Connections in Network Traffic
Logging Encrypted Connections
by monitored hosts. Or, if you are uninterested in the individual URLs visited, you can disable URL storage
entirely by storing zero characters. Depending on your network traffic, disabling or limiting the number of
stored URL characters may improve system performance.
Note that disabling URL logging does not affect URL filtering. Access control rules properly filter traffic
based on requested URLs, their categories, and reputations, even though the system does not record the
individual URLs requested in the traffic handled by those rules. For more information, see Blocking URLs,
on page 119.
To customize the number of URL characters you store:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Access Control Policy.
The Access Control Policy page appears.
Step 2 Click the edit icon next to the access control policy you want to configure.
The access control policy editor appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
395
Logging Connections in Network Traffic
Logging Decryptable Connections with SSL Rules
For more information, see Understanding How Access Control and SSL Rule Actions Affect Logging, on
page 386.
To log decryptable connections:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > SSL.
The SSL Policy page appears.
Step 2 Click the edit icon next to the rule where you want to configure logging.
The SSL rule editor appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
396
Logging Connections in Network Traffic
Setting Default Logging for Encrypted and Undecryptable Connections
Note that even if you disable logging for the SSL policy default action, end-of-connection events may still
be logged if the connection previously matched at least one SSL Monitor rule, or later matches an access
control rule or the access control policy default action.
To set the default handling for encrypted and undecryptable traffic:
Access: Admin/Access Admin/Network Admin/Security Approver
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > SSL.
The SSL Policy page appears.
Step 2 Click the logging icon next to the Default Action drop-down list.
The Logging pop-up window appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
397
Logging Connections in Network Traffic
Setting Default Logging for Encrypted and Undecryptable Connections
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
398
CHAPTER 30
Viewing Events
You can view real-time events logged against the traffic inspected by the ASA FirePOWER module.
Note The module only caches the most recent 100 events in memory.
Note The module only caches the most recent 100 events in memory.
Step 1 Select Monitoring > ASA FirePOWER Monitoring > Real-time Eventing.
Step 2 You have two choices:
• Click an existing tab for the type of event you want to view: connection events, security intelligence events, intrusion
events, file events, or malware events.
• Click the + icon to create a custom event view and select the event fields you want to include in the view.
For more information, see Understanding ASA FirePOWER Event Types, on page 400 and Event Fields in ASA FirePOWER
Events, on page 401.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
399
Viewing Events
Understanding ASA FirePOWER Event Types
Connection Events
Connection logs, called connection events , contain data about the detected sessions. The information available
for any individual connection event depends on several factors, but in general includes:
• basic connection properties: timestamp, source and destination IP address, ingress and egress zones, the
device that handled the connection, and so on
• additional connection properties discovered or inferred by the system: applications, requested URLs, or
users associated with the connection, and so on
• metadata about why the connection was logged: which access control rule (or other configuration) in
which policy handled the traffic, whether the connection was allowed or blocked, and so on
Various settings in access control give you granular control over which connections you log, when you log
them, and where you store the data. You can log any connection that your access control policies can
successfully handle. You can enable connection logging in the following situations:
• when a connection is blacklisted (blocked) or monitored by the reputation-based Security Intelligence
feature
• when a connection is handled by an access control rule or the access control default action
In addition to the logging that you configure, the system automatically logs most connections where the system
detects a prohibited file, malware, or intrusion attempt.
Tip General information about connection events also pertains to Security Intelligence events, unless otherwise
noted. For more information on Security Intelligence, see Controlling Traffic With Reputation-Based Rules,
on page 113.
Intrusion Events
The system examines the packets that traverse your network for malicious activity that could affect the
availability, integrity, and confidentiality of a host and its data. When the system identifies a possible intrusion,
it generates an intrusion event , which is a record of the date, time, type of exploit, and contextual information
about the source of the attack and its target.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
400
Viewing Events
Event Fields in ASA FirePOWER Events
File Events
File events represent files that the system detected, and optionally blocked, in network traffic.
The system logs the file events generated when a managed device detects or blocks a file in network traffic,
according to the rules in currently applied file policies.
Malware Events
Malware events represent malware files detected, and optionally blocked, in network traffic by the system.
With a Malware license, your ASA FirePOWER module can detect malware in network traffic as part of your
overall access control configuration; see Understanding and Creating File Policies, on page 372.
The following scenarios can lead to generating malware events:
• If a managed device detects one of a set of specific file types, the ASA FirePOWER module performs a
malware cloud lookup, which returns a file disposition to the ASA FirePOWER module of Malware ,
Clean , or Unknown .
• If the ASA FirePOWER module cannot establish a connection with the cloud, or the cloud is otherwise
unavailable, the file disposition is Unavailable . You may see a small percentage of events with this
disposition; this is expected behavior.
• If the managed device detects a file on the clean list, the ASA FirePOWER module assigns a file
disposition of Clean to the file.
The ASA FirePOWER module logs records of files’ detection and dispositions, along with other contextual
data, as malware events.
Files detected in network traffic and identified as malware by the ASA FirePOWER module generate both a
file event and a malware event. This is because to detect malware in a file, the system must first detect the
file itself.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
401
Viewing Events
Event Fields in ASA FirePOWER Events
• Default Action indicates the connection was handled by the default action.
• For Security Intelligence-monitored connections, the action is that of the first non-Monitor access control
rule triggered by the connection, or the default action. Similarly, because traffic matching a Monitor rule
is always handled by a subsequent rule or by the default action, the action associated with a connection
logged due to a monitor rule is never Monitor .
For file or malware events, the file rule action associated with the rule action for the rule the file matched,
and any associated file rule action options.
Allowed Connection
Whether the system allowed the traffic flow for the event.
Application
The application detected in the connection.
Application Categories
Categories that characterize the application to help you understand the application's function.
Application Risk
The risk associated with the application traffic detected in the connection: Very High , High , Medium , Low
, or Very Low . Each type of application detected in the connection has an associated risk; this field displays
the highest of those.
Application Tag
Tags that characterize the application to help you understand the application's function.
Block Type
The type of block specified in the access control rule matching the traffic flow in the event: block or interactive
block.
Client
The client application detected in the connection.
If the system cannot identify the specific client used in the connection, this field displays client appended to
the application protocol name to provide a generic name, for example, FTP client .
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
402
Viewing Events
Event Fields in ASA FirePOWER Events
Client Categories
Categories that characterize the client detected in the traffic to help you understand the client’s function.
Client Risk
The risk associated with the client traffic detected in the connection: Very High , High , Medium , Low , or
Very Low . Each type of client detected in the connection has an associated risk; this field displays the highest
of those.
Client Tag
Tags that characterize the client detected in the traffic to help you understand the client’s function.
Client Version
The version of the client detected in the connection.
Connection
The unique ID for the traffic flow, internally generated.
Connection Bytes
The total bytes for the connection.
Connection Time
The time for the beginning of the connection.
Connection Timestamp
The time the connection was detected.
Context
The metadata identifying the security context through which the traffic passed. Note that the system only
populates this field for devices in multiple context mode.
Denied Connection
Whether the system denied the traffic flow for the event.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
403
Viewing Events
Event Fields in ASA FirePOWER Events
Destination IP
The IP address used by the receiving host.
Direction
The direction of transmission for a file.
Disposition
One of the following file dispositions:
• Malware indicates that the cloud categorized the file as malware.
• Clean indicates that the cloud categorized the file as clean, or that a user added the file to the clean list.
• Unknown indicates that a malware cloud lookup occurred before the cloud assigned a disposition. The
file is uncategorized.
• Custom Detection indicates that a user added the file to the custom detection list.
• Unavailable indicates that the ASA FirePOWER module could not perform a malware cloud lookup.
You may see a small percentage of events with this disposition; this is expected behavior.
• N/A indicates a Detect Files or Block Files rule handled the file and the ASA FirePOWER module did
not perform a malware cloud lookup.
Egress Interface
The egress interface associated with the connection. Note that, if your deployment includes an asynchronous
routing configuration, the ingress and egress interface may belong to the same interface set.
Event
The event type.
Event Microseconds
The time, in microseconds, when the event was detected.
Event Seconds
The time, in seconds, when the event was detected.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
404
Viewing Events
Event Fields in ASA FirePOWER Events
Event Type
The type of event.
File Category
The general categories of file type, for example: Office Documents , Archive , Multimedia , Executables ,
PDF files , Encoded , Graphics , or System Files .
File Name
The name of the file or malware file.
File SHA256
The SHA-256 hash value of the file.
File Size
The size of the file or malware file, in kilobytes.
File Type
The file type of the file or malware file, for example, HTML or MSEXE .
File/Malware Policy
The file policy associated with the generation of the event.
Firewall Rule
The access control rule or default action that handled the connection, as well as up to eight Monitor rules
matched by that connection.
First Packet
The date and time the first packet of the session was seen.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
405
Viewing Events
Event Fields in ASA FirePOWER Events
HTTP Referrer
The HTTP referrer, which represents the referrer of a requested URL for HTTP traffic detected in the connection
(such as a website that provided a link to, or imported a link from, another URL).
IDS Classification
The classification where the rule that generated the event belongs. See the Table 72: Rule Classifications , on
page 411 table for a list of rule classification names and numbers.
Impact
The impact level in this field indicates the correlation between intrusion data, network discovery data, and
vulnerability information.
Impact Flag
See Impact.
Ingress Interface
The ingress interface associated with the connection. Note that, if your deployment includes an asynchronous
routing configuration, the ingress and egress interface may belong to the same interface set.
Initiator Bytes
The total number of bytes transmitted by the session initiator.
Initiator IP
The host IP address (and host name, if DNS resolution is enabled) that initiated the session responder.
Initiator Packets
The total number of packets transmitted by the session initiator.
Inline Result
One of the following:
• a black down arrow, indicating that the system dropped the packet that triggered the rule
• a gray down arrow, indicating that IPS would have dropped the packet if you enabled the Drop when
Inline intrusion policy option (in an inline deployment), or if a Drop and Generate rule generated the
event while the system was pruning
• blank, indicating that the triggered rule was not set to Drop and Generate Events
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
406
Viewing Events
Event Fields in ASA FirePOWER Events
• Note that the system does not drop packets in a passive deployment, including when an inline interface
is in tap mode, regardless of the rule state or the inline drop behavior of the intrusion policy.
Last Packet
The date and time the last packet of the session was seen.
MPLS Label
The Multiprotocol Label Switching label associated with the packet that triggered this intrusion event.
Message
The explanatory text for the event.
For rule-based intrusion events, the event message is pulled from the rule. For decoder- and preprocessor-based
events, the event message is hard coded.
For malware events, any additional information associated with the malware event. For network-based malware
events, this field is populated only for files whose disposition has changed.
Monitor Rules
Up to eight Monitor rules matched by that connection.
Netbios Domain
The NetBIOS domain used in the session.
Num Ioc
Whether the traffic that triggered the intrusion event also triggered an indication of compromise (IOC) for a
host involved in the connection.
Original Client IP
The original client IP address from an X-Forwarded-For (XFF), True-Client-IP, or custom-defined HTTP
header. To populate this field, you must enable an access control rule that handles proxied traffic based on its
original client.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
407
Viewing Events
Event Fields in ASA FirePOWER Events
Policy
The access control, intrusion, or network analysis policy (NAP), if any, associated with the generation of the
event.
Policy Revision
The revision of the access control, file, intrusion, or network analysis policy (NAP), if any, associated with
the generation of the event.
Priority
The event priority as determined by the Cisco VRT.
Protocol
The protocol detected in the connection.
Reason
The reason or reasons the connection was logged, in the following situations:
• User Bypass indicates that the system initially blocked a user’s HTTP request, but the user chose to
continue to the originally requested site by clicking through a warning page. A reason of User Bypass
is always paired with an action of Allow .
• IP Block indicates that the system denied the connection without inspection, based on Security Intelligence
data. A reason of IP Block is always paired with an action of Block .
• IP Monitor indicates that the system would have denied the connection based on Security Intelligence
data, but you configured the system to monitor, rather than deny, the connection.
• File Monitor indicates that the system detected a particular type of file in the connection.
• File Block indicates the connection contained a file or malware file that the system prevented from being
transmitted. A reason of File Block is always paired with an action of Block .
• File Custom Detection indicates the connection contained a file on the custom detection list that the
system prevented from being transmitted.
• File Resume Allow indicates that file transmission was originally blocked by a Block Files or Block
Malware file rule. After a new access control policy was applied that allowed the file, the HTTP session
automatically resumed. Note that this reason only appears in inline deployments.
• File Resume Block indicates that file transmission was originally allowed by a Detect Files or Malware
Cloud Lookup file rule. After a new access control policy was applied that blocked the file, the HTTP
session automatically stopped. Note that this reason only appears in inline deployments.
• Intrusion Block indicates the system blocked or would have blocked an exploit (intrusion policy violation)
detected in the connection. A reason of Intrusion Block is paired with an action of Block for blocked
exploits and Allow for would-have-blocked exploits.
• Intrusion Monitor indicates the system detected, but did not block, an exploit detected in the connection.
This occurs when the state of the triggered intrusion rule is set to Generate Events.
• Content Restriction indicates the system modified the packet to enforce content restrictions related to
either the Safe Search or YouTube EDU feature.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
408
Viewing Events
Event Fields in ASA FirePOWER Events
Receive Times
The time the destination host or responder responded to the event.
Referenced Host
If the protocol in the connection is DNS, HTTP, or HTTPS, this field displays the host name that the respective
protocol was using.
Responder Bytes
The total number of bytes transmitted by the session responder.
Responder Packets
The total number of packets transmitted by the session responder.
Responder IP
The host IP address (and host name, if DNS resolution is enabled) that responded to the session initiator.
Signature
The signature ID of the intrusion rule matching the traffic for the event.
Source IP
The IP address used by the sending host in an intrusion event.
Source or Destination
The host originating or receiving the connection for the event.
TCP Flags
The TCP flags detected in the connection.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
409
Viewing Events
Event Fields in ASA FirePOWER Events
URL
The URL requested by the monitored host during the session.
URL Category
The category associated with the URL requested by the monitored host during the session, if available.
URL Reputation
The reputation associated with the URL requested by the monitored host during the session, if available.
User
The user of the host (Receiving IP) where the event occurred.
User Agent
User agent application information extracted from HTTP traffic detected in the connection.
VLAN
The innermost VLAN ID associated with the packet that triggered the event.
Web Application
The web application detected in the traffic.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
410
Viewing Events
Intrusion Rule Classifications
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
411
Viewing Events
Intrusion Rule Classifications
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
412
CHAPTER 31
Configuring External Alerting
While the ASA FirePOWER module provides various views of events within the module interface, you may
want to configure external event notification to facilitate constant monitoring of critical systems. You can
configure the module to generate alerts that notify you using an SNMP trap or by writing to syslog when one
of the following is generated:
• A network-based malware event or retrospective malware event
• A connection event, triggered by a specific access control rule
To have the ASA FirePOWER module send these alerts, you must first create an alert response , which is a
set of configurations that allows the module to interact with the external system where you plan to send the
alert. Those configurations may specify, for example, SNMP alerting parameters or syslog facilities and
priorities.
After you create the alert response, you associate it with the event that you want to use to trigger the alert.
Note that the process for associating alert responses with events is different depending on the type of event:
• You associate alert responses with malware events using their own configuration pages.
• You associate SNMP and syslog alert responses with logged connections using access control rules and
policies.
There is another type of alerting you can perform in the ASA FirePOWER module, which is to configure
SNMP and syslog intrusion event notifications for individual intrusion events. You configure these notifications
in intrusion policies; see Configuring External Alerting for Intrusion Rules, on page 421 and Adding SNMP
Alerts, on page 320. The following table explains the licenses you must have to generate alerts.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
413
Configuring External Alerting
Working with Alert Responses
Note If you want to monitor 64-bit values with SNMP, you must use SNMPv2 or SNMPv3. SNMPv1 does not
support 64-bit monitoring.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Actions Alerts.
The Alerts page appears.
Step 2 From the Create Alert drop-down menu, select Create SNMP Alert.
The Create SNMP Alert Configuration pop-up window appears.
Step 3 In the Name field, type the name that you want to use to identify the SNMP response.
Step 4 In the Trap Server field, type the hostname or IP address of the SNMP trap server, using alphanumeric characters.
Note that the system does not warn you if you enter an invalid IPv4 address (such as 192.169.1.456) in this field.
Instead, the invalid address is treated as a hostname.
Step 5 From the Version drop-down list, select the SNMP version you want to use.
SNMP v3 is the default. If you select SNMP v1 or SNMP v2, different options appear.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
414
Configuring External Alerting
Creating a Syslog Alert Response
• For SNMP v1 or SNMP v2, type the SNMP community name, using alphanumeric characters or the special
characters * or $, in the Community String field and skip to step 12.
• For SNMP v3, type the name of the user that you want to authenticate with the SNMP server in the User Name
field and continue with the next step.
Step 7 From the Authentication Protocol drop-down list, select the protocol you want to use for authentication.
Step 8 In the Authentication Password field, type the password required for authentication with the SNMP server.
Step 9 From the Privacy Protocol list, select None to use no privacy protocol or DES to use Data Encryption Standard as the
privacy protocol.
Step 10 In the Privacy Password field, type the privacy password required by the SNMP server.
Step 11 In the Engine ID field, type an identifier for the SNMP engine, in hexadecimal notation, using an even number of
digits.
When you use SNMPv3, the system uses an Engine ID value to encode the message. Your SNMP server requires this
value to decode the message.
Cisco recommends that you use the hexadecimal version of the ASA FirePOWER module’s IP address. For example,
if the ASA FirePOWER module has an IP address of 10.1.1.77 , use 0a01014D0 .
Tip For more detailed information about how syslog works and how to configure it, refer to the documentation
for your system. On UNIX systems, the man pages for syslog and syslog.conf provide conceptual information
and configuration instructions.
Although you can select any type of facility when creating a syslog alert response, you should select one that
makes sense based on your syslog server; not all syslog servers support all facilities. For UNIX syslog servers,
the syslog.conf file should indicate which facilities are saved to which log files on the server.
The following table lists the syslog facilities you can select.
Facility Description
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
415
Configuring External Alerting
Creating a Syslog Alert Response
Facility Description
AUTHPRIV A restricted access message associated with security and authorization. On many systems,
these messages are forwarded to a secure file.
KERN A message generated by the kernel. On many systems, these messages are printed to
the console when they appear.
The following table lists the standard syslog severity levels you can select.
Level Description
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
416
Configuring External Alerting
Modifying an Alert Response
Level Description
NOTICE Conditions that are not error conditions, but require attention.
Before you start sending syslog alerts, make sure that the syslog server can accept remote messages.
To create a syslog alert:
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Actions Alerts.
The Alerts page appears.From the Create Alert drop-down menu, select Create Syslog Alert.
The Create Syslog Alert Configuration pop-up window appears.
Step 2 In the Name field, type the name you want to use to identify the saved response.
Step 3 In the Host field, type the hostname or IP address of your syslog server.
Note that the system does not warn you if you enter an invalid IPv4 address (such as 192.168.1.456) in this field. Instead,
the invalid address is treated as a hostname.
Step 4 In the Port field, type the port the server uses for syslog messages.
By default, this value is 514.
Step 7 In the Tag field, type the tag name that you want to appear with the syslog message.
Use only alphanumeric characters in tag names. You cannot use spaces or underscores.
As an example, if you wanted all messages sent to the syslog to be preceded with From MC, type From MC in the field.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
417
Configuring External Alerting
Deleting an Alert Response
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Actions Alerts.
The Alerts page appears.
Step 2 Next to the alert response you want to edit, click the edit icon.
A configuration pop-up window for that alert response appears.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Actions Alerts.
The Alerts page appears.
Step 2 Next to the alert response you want to delete, click the delete icon.
Step 3 Confirm that you want to delete the alert response.
The alert response is deleted.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies > Actions Alerts.
The Alerts page appears.
Step 2 Next to the alert response you want to enable or disable, click the enable/disable slider.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
418
Configuring External Alerting
Enabling and Disabling Alert Responses
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
419
Configuring External Alerting
Enabling and Disabling Alert Responses
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
420
CHAPTER 32
Configuring External Alerting for Intrusion Rules
While the ASA FirePOWER module provides various views of intrusion events within the user interface,
some enterprises prefer to define external intrusion event notification to facilitate constant monitoring of
critical systems. You can enable logging to syslog facilities or send event data to an SNMP trap server.
Within each intrusion policy, you can specify intrusion event notification limits, set up intrusion event
notification to external logging facilities, and configure external responses to intrusion events.
Tip Some analysts prefer not to receive multiple alerts for the same intrusion event, but want to control how often
they are notified of a given intrusion event occurrence. See Filtering Intrusion Event Notification Per Policy,
on page 310 for more information.
There is another type of alerting you can perform in the ASA FirePOWER module, outside of your intrusion
policies. You can configure SNMP and syslog alert responses for other types of events, including connection
events logged by specific access control rules. For more information, see Configuring External Alerting, on
page 413.
See the following sections for more information on external intrusion event notification:
• The Using SNMP Responses section describes the options you can configure to send event data to
specified SNMP trap servers and provides the procedure for specifying the SNMP alerting options.
• The Using Syslog Responses section describes the options you can configure to send event data to an
external syslog and provides the procedure for specifying the syslog alerting options.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
421
Configuring External Alerting for Intrusion Rules
Using SNMP Responses
You can set a variety of SNMP alerting parameters. Available parameters vary depending on the version of
SNMP you use. For details on enabling and disabling SNMP alerting, see Configuring Advanced Settings in
an Intrusion Policy, on page 284.
Tip If your network management system requires a management information base file (MIB), you can obtain it
from the ASA FirePOWER module at /etc/sf/DCEALERT.MIB .
SNMP v2 Options
For SNMP v2, you can specify the options described in the following table.
Option Description
Trap Type The trap type to use for IP addresses that appear in the alerts.
If your network management system correctly renders the INET_IPV4 address type, then
you can select as Binary. Otherwise, select as String. For example, HP Openview
requires the string type.
Trap Server The server that will receive SNMP traps notification.
You can specify a single IP address or hostname.
Sensor ID The user-defined integer representing the managed device sending intrusion events as
SNMP traps.
SNMP v3 Options
For SNMP v3, you can specify the options described in the following table.
Note When using SNMP v3, the appliance uses an Engine ID value to encode the message. Your SNMP server
requires this value to decode the message. Currently, this Engine ID value will always be the hexadecimal
version of the appliance’s IP address with 01 at the end of the string. For example, if the appliance sending
the SNMP alert has an IP address of 172.16.1.50 , the Engine ID is 0xAC10013201 or, if the appliance has
an IP address of 10.1.1.77 , 0x0a01014D01 is used as the Engine ID.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
422
Configuring External Alerting for Intrusion Rules
Configuring SNMP Responses
Option Description
Trap Type The trap type to use for IP addresses that appear in the alerts.
If your network management system correctly renders the INET_IPV4 address
type, then you can select as Binary. Otherwise, select as String. For example, HP
Openview requires the string type.
Trap Server The server that will receive SNMP traps notification.
You can specify a single IP address or hostname.
Authentication Password The password required for authentication. SNMP v3 uses either the Message Digest
5 (MD5) hash function or the Secure Hash Algorithm (SHA) hash function to
encrypt this password, depending on configuration.
If you specify an authentication password, authentication is enabled.
Private Password The SNMP key for privacy. SNMP v3 uses the Data Encryption Standard (DES)
block cipher to encrypt this password.
If you specify a private password, privacy is enabled. If you specify a private
password, you must also specify an authentication password.
For information about configuring SNMP Alerting, see Using SNMP Responses, on page 421.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies> Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 You have two choices, depending on whether SNMP Alerting under External Responses is enabled:
• If the configuration is enabled, click Edit.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
423
Configuring External Alerting for Intrusion Rules
Using Syslog Responses
Step 5 Specify the trap type format that you want to use for IP addresses that appear in the alerts, as Binary or as String.
Note If your network management system correctly renders the INET_IPV4 address type, then you can use the as
Binary option. Otherwise, use the as String option. For example, HP OpenView requires the as String option.
Step 7 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. See Resolving Conflicts and Committing Policy Changes, on
page 257 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
424
Configuring External Alerting for Intrusion Rules
Using Syslog Responses
In an intrusion policy, you can turn on syslog alerting and specify the syslog priority and facility associated
with intrusion event notifications in the syslog. When you apply the intrusion policy as part of an access
control policy, the system then sends syslog alerts for the intrusion events it detects to the syslog facility on
the local host or on the logging host specified in the policy. The host receiving the alerts uses the facility and
priority information you set when configuring syslog alerting to categorize the alerts.
The following table lists the facilities you can select when configuring syslog alerting. Be sure to configure
a facility that makes sense based on the configuration of the remote syslog server you use. The syslog.conf
file located on the remote system (if you are logging syslog messages to a UNIX- or Linux-based system)
indicates which facilities are saved to which log files on the server.
Facility Description
AUTHPRIV A restricted access message associated with security and authorization. On many systems,
these messages are forwarded to a secure file.
KERN A message generated by the kernel. On many systems, these messages are printed to
the console when they appear.
Select one of the following standard syslog priority levels to display on all notifications generated by this
alert:
Level Description
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
425
Configuring External Alerting for Intrusion Rules
Configuring Syslog Responses
Level Description
NOTICE Conditions that are not error conditions, but require attention
For more detailed information about how syslog works and how to configure it, refer to the documentation
that accompanies your system. If you are logging to a UNIX- or Linux-based system’s syslog, the syslog.conf
man file (type man syslog.conf at the command line) and syslog man file (type man syslog at the command
line) provide information about how syslog works and how to configure it.
Step 1 Select Configuration > ASA FirePOWER Configuration > Policies> Intrusion Policy.
The Intrusion Policy page appears.
Step 2 Click the edit icon ( ) next to the policy you want to edit.
If you have unsaved changes in another policy, click OK to discard those changes and continue. See Resolving Conflicts
and Committing Policy Changes, on page 257 for information on saving unsaved changes in another policy.
The Policy Information page appears.
Step 4 You have two choices, depending on whether Syslog Alerting under External Responses is enabled:
• If the configuration is enabled, click Edit.
• If the configuration is disabled, click Enabled, then click Edit.
Step 5 Optionally, in the Logging Hosts field, enter the remote access IP address you want to specify as logging host. Separate
multiple hosts with commas.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
426
Configuring External Alerting for Intrusion Rules
Configuring Syslog Responses
Step 6 Select facility and priority levels from the drop-down lists.
See Using Syslog Responses, on page 424 for details on facility and priority options.
Step 7 Save your policy, continue editing, discard your changes, revert to the default configuration settings in the base policy,
or exit while leaving your changes in the system cache. See Resolving Conflicts and Committing Policy Changes, on
page 257 for more information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
427
Configuring External Alerting for Intrusion Rules
Configuring Syslog Responses
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
428
CHAPTER 33
Using the ASA FirePOWER Dashboard
The ASA FirePOWER module dashboard provides you with at-a-glance views of current system status. The
dashboard displays widgets in a three-column layout. Widgets are small, self-contained components that
provide insight into different aspects of the ASA FirePOWER module. Your system is delivered with several
predefined widgets. For example, the Appliance Information widget tells you the appliance name, model, and
currently running version of the ASA FirePOWER module software.
The dashboard has a time range that constrains its widgets. You can change the time range to reflect a period
as short as the last hour or as long as the last year.
Each appliance is delivered with a default dashboard. This dashboard provides the user with general system
status information for your ASA FirePOWER module deployment.
• Understanding Dashboard Widgets, on page 429
• Understanding the Predefined Widgets, on page 430
• Working with the Dashboard, on page 433
Step 1 On the title bar of the widget whose preferences you want to change, click the show preferences icon.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
429
Using the ASA FirePOWER Dashboard
Understanding the Predefined Widgets
Step 3 On the widget title bar, click the hide preferences icon to hide the preferences section.
You can configure the widget to display more or less information by modifying the widget preferences to
display a simple or an advanced view; the preferences also control how often the widget updates. For more
information, see Understanding Widget Preferences, on page 429.
The color of the ball representing link state indicates the current status, as follows:
• green: link is up and at full speed
• yellow: link is up but not at full speed
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
430
Using the ASA FirePOWER Dashboard
Understanding the Disk Usage Widget
The widget preferences control how often the widget updates. For more information, see Understanding
Widget Preferences, on page 429.
Updates all files related to updates, such as rule updates and system updates
You can configure the widget to display only the By Category stacked bar, or you can show the stacked bar
plus the admin (/), /Volume, and /boot partition usage, as well as the /var/storage partition if the malware
storage pack is installed, by modifying the widget preferences.
The widget preferences also control how often the widget updates, as well as whether it displays the current
disk usage or collected disk usage statistics over the dashboard time range. For more information, see
Understanding Widget Preferences, on page 429.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
431
Using the ASA FirePOWER Dashboard
Understanding the Product Updates Widget
The Product Licensing widget shows the device and feature licenses currently installed. It also indicates the
number of items (such as hosts or users) licensed and the number of remaining licensed items allowed.
The top section of the widget displays all device and feature licenses installed, including temporary licenses,
while the Expiring Licenses section displays only temporary and expired licenses.
The bars in the widget background show the percentage of each type of license that is being used; you should
read the bars from right to left. Expired licenses are marked with a strikethrough.
You can configure the widget to display either the features that are currently licensed, or all the features that
you can license, by modifying the widget preferences. The preferences also control how often the widget
updates. For more information, see Understanding Widget Preferences, on page 429.
You can click any of the license types to go to the License page of the local configuration and add or delete
feature licenses. For more information, see Licensing the ASA FirePOWER Module, on page 471.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
432
Using the ASA FirePOWER Dashboard
Understanding the System Time Widget
You can configure the widget to show or hide the load average by modifying the widget preferences. The
preferences also control how often the widget updates. For more information, see Understanding Widget
Preferences, on page 429.
You can configure the widget to hide the boot time by modifying the widget preferences. The preferences
also control how often the widget synchronizes with the appliance’s clock. For more information, see
Understanding Widget Preferences, on page 429.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
433
Using the ASA FirePOWER Dashboard
Modifying the Dashboard
At any time, to view the dashboard for your ASA FirePOWER module, select Home > ASA FirePOWER
Dashboard.
The dashboard has a time range that constrains its widgets. You can change the time range to reflect a period
as short as the last hour (the default) or as long as the last year. When you change the time range, the widgets
that can be constrained by time automatically update to reflect the new time range.
Note that not all widgets can be constrained by time. For example, the dashboard time range has no effect on
the Appliance Information widget, which provides information that includes the appliance name, model, and
current version of the ASA FirePOWER module software.
All appropriate widgets on the page update to reflect the new time range.
Rearranging Widgets
License: Any
You can change the location of any widget.
To move a widget:
Click the title bar of the widget you want to move, then drag it to its new location.
To minimize a widget:
Click the minimize icon in a widget’s title bar.
To maximize a widget:
Click the maximize icon in a minimized widget’s title bar.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
434
CHAPTER 34
Using ASA FirePOWER Reporting
You can view reports on various time periods to analyze the traffic on your network. Reports aggregate
information on various aspects of your network traffic. In most cases, you can drill down from general
information to specific information. For example, you can view a report on all users, then view details about
specific users.
Overview and detail reports include multiple report components such as top policies and web categories.
These reports show the most often occurring items of that type for the report you are viewing. For example,
if you are viewing the detail report for a specific user, the top policies show the policy hits most associated
with that user.
• Understanding Available Reports, on page 435
• Report Basics, on page 437
• Example Report, on page 440
Network Overview
This report shows summary information about the traffic in the network. Use this information to help identify
areas that need deeper analysis, or to verify that the network is behaving within general expectations.
Users
This report shows the top users of your network. Users who fail active authentication are represented in user
reports under the username ANONYMOUS, unless you enabled guest access, in which case the username is
Guest. Users who do not have a mapping because they were not required to authenticate are shown as their
IP address. Use this information to help identify anomalous activity for a user.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
435
Using ASA FirePOWER Reporting
Understanding Available Reports
Tip User names are available only when user identity information is associated with traffic flows. If you want to
ensure that user identity is available in reports for the majority of traffic, the access control policy should use
active authentication.
Applications
This report displays applications, which represent the content or requested URL for HTTP traffic detected in
the traffic that triggered an intrusion event. Note that if the module detects an application protocol of HTTP,
but cannot detect a specific web application, the module supplies a generic web browsing designation here.
Web categories
This report shows which categories of web sites, such as gambling, advertisements, or search engines and
portals are being used in the network based on the categorization of web sites visited. Use this information
to help identify the top categories visited by users and to determine whether your access control policies are
sufficiently blocking undesired categories.
Policies
This report shows how your access control policies have been applied to traffic in the network. If you deleted
the policy, the name is appended with "- DELETED." Use this information to help evaluate policy efficacy.
Ingress zones
This report displays the ingress security zone of the packet that triggered an event. Only this security zone
field is populated in a passive deployment.
Egress zones
This report displays, for an inline deployment, the egress security zone of the packet that triggered the event.
This security zone field is not populated in a passive deployment.
Destinations
This report shows which applications, such as Facebook, are being used in the network based on the analysis
of the traffic in the network. Use this information to help identify the top applications used in the network
and to determine whether additional access control policies are needed to reduce the usage of unwanted
applications.
Attackers
This report displays the source IP addresses, used by the sending hosts, that triggered an event.
Targets
This report displays the destination IP addresses, used by the receiving hosts, that triggered an event.
Threats
This report displays the unique identifying number and explanatory text assigned to each detected threat to
your network.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
436
Using ASA FirePOWER Reporting
Report Basics
Files logs
This report displays the type of files detected, for example, HTML or MSEXE.
Report Basics
License: Any
The following sections explain the basics of using reports. These topics apply to reports in general and not to
any single specific report.
.
Following is an example of the Network Overview report. Click any underlined text to get more information
about it
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
437
Using ASA FirePOWER Reporting
Drilling into Reports
• Data is collected for traffic that matches an access control policy applied to your ASA FirePOWER
module.
• Data is aggregated into 5 minute buckets, and 30 minute and one hour graphs show data points in 5
minute increments. At the end of the hour, the 5 minute buckets are aggregated into one hour buckets,
which are subsequently aggregated into day and week buckets. The 5 minute buckets are kept for 7 days,
the one hour buckets for 31 days, and the day buckets for up to 365 days. The farther back you look, the
more aggregated the data. When you query for old data, you get the best results if you align your queries
to the availability of these data buckets. All day calculations are based on UTC time; the time on the
server or your client is ignored.
Note If a data point is missing, for example, because the device was unreachable for longer than 5 minutes, there
will be gaps in line charts.
Tip The module bases time on the time zone defined on the device, not the zone configured on your workstation.
Last 30 30 complete minutes in five minute intervals, plus up to five additional minutes.
minutes
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
438
Using ASA FirePOWER Reporting
Controlling the Data Displayed in Reports
Last hour 60 complete minutes in five minute intervals, plus up to five additional minutes.
Last 24 hours One hour intervals for the last 24 hours rounded to the previous hour boundary. For example, if the current time is
13:45, the Last 24 Hour period is from 13:00 yesterday to 13:00 today.
Last 7 days One hour intervals for the last seven days rounded to the previous hour boundary.
Last 30 days One day intervals for the last 30 days starting from the previous midnight.
Custom Range The time range you define. Edit boxes are displayed for start date, start time, end date, and end time; click in each
box and select the desired value. Click Apply to update the report when you are finished.
When constructing a custom time range, you should align your range with the availability of data buckets. For
ranges 7-31 days in the past, align your query on the hour. For older ranges, align them on the day; for ranges over
a year, align them on the week.In all cases, use UTC time to determine the day boundaries; the time zone of the
query, server, and client do not relate to the data bucket. For example, if the time zone is Pacific Daylight Time
(PDT), and you are querying data from 40 days ago, use 4PM on day 1 and 4PM on day 2 to align with UTC (8
hour offset to PDT).
View More
Click the View More link to go to the report for the item you are viewing. For example, clicking View More
in the Web Categories chart of the Destinations report takes you to the Web Categories report. If you are
viewing the report in a detailed report, you go to the detailed Web Categories report for the item you are
viewing details about.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
439
Using ASA FirePOWER Reporting
Example Report
• The meaning of many columns is modified by the report in which they are included. For example, the
transactions column shows the number of transactions for the type of item reported on. You can also
toggle the values between raw numbers and as a percentage of the total reported raw values for the item
by clicking Values or Percentages.
• You can change the sort order of the columns by clicking the column heading.
The following table explains the standard columns that you can find in the various reports. The standard
columns are in all reports, the variable columns appear in the reports for those items only.
Column Description
Transactions The total number of transactions for the reported item. In top-level reports, the number is a link; click it to
open the Event Viewer with the events table filtered based on the item you are viewing.The number of events
shown can differ from the transaction count, especially for queries of older time periods, because events are
removed from storage as disk space is depleted and new events arrive. Queries of time periods over 30 days
ago might return no matching events. Conversely, you might see more events than transactions, if the item
was not one of the top N in each 5 minute bucket covered by the time range, because transaction counts do
not include these periods.
Transactions allowed The number of transactions that were allowed for the reported item.
Transactions denied The number of transactions that were blocked (based on policy) for the reported item.
Total bytes The sum of bytes sent and received for the reported item.
Bytes received The number of bytes received for the reported item.
Total Bytes Sent The number of bytes sent for the reported item.
Example Report
This section discusses how to run the Policies report. You can use the tasks discussed in this procedure to run
any other reports you wish.
To run reports:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
440
Using ASA FirePOWER Reporting
Example Report
Step 3 Many reports enable you to view details about categories contained in the report. For example, click Network
w.ivrev
eO
Step 4 In the Network Overview report results, click the name of any Top Destinations to get more information about destinations.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
441
Using ASA FirePOWER Reporting
Example Report
The results display summary information and details about the destinations.
(Optional.) Click View More to view additional details.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
442
CHAPTER 35
Scheduling Tasks
You can schedule many different types of administrative tasks to run at designated times, either once or on a
recurring basis.
Note Some tasks (such as those involving automated software updates) may place a significant load on networks
with low bandwidths. You should schedule tasks like these to run during periods of low network use.
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Tools > Scheduling.
The Scheduling page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
443
Scheduling Tasks
Automating Backup Jobs
Step 3 From the Job Type list, select the type of task that you want to schedule.
Each of the types of tasks you can schedule is explained in its own section.
Step 5 In the Start On field, specify the date when you want to start your recurring task. You can use the drop-down list to
select the month, day, and year.
Step 6 In the Repeat Every field, specify how often you want the task to recur. You can specify a number of hours, days, weeks,
or months.
You can either type a number or click the up icon ( ) and the down icon ( ) to specify the interval. For example, type 2
and select Days to run the task every two days.
Step 7 In the Run At field, specify the time when you want to start your recurring task.
Step 8 If you selected Weeks for Repeat Every, a Repeat On field appears. Select the check boxes next to the days of the week
when you want to run the task.
Step 9 If you selected Months for Repeat Every, a Repeat On field appears. Use the drop-down list to select the day of the
month when you want to run the task.
The remaining options on the New Task page are determined by the task you are creating.
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Tools > Scheduling.
The Scheduling page appears.
Step 4 Specify how you want to schedule the backup, Once or Recurring:
• For one-time tasks, use the drop-down lists to specify the start date and time. The Current Time field indicates the
current time on the appliance.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
444
Scheduling Tasks
Automating Applying an Intrusion Policy
• For recurring tasks, you have several options for setting the interval between instances of the task. See Configuring
a Recurring Task, on page 443 for details.
Step 5 In the Job Name field, type a name using up to 255 alphanumeric characters, spaces, or dashes.
Step 6 From the Backup Profile list, select the appropriate backup profile.
For more information on creating new backup profiles, see Creating Backup Profiles, on page 507.
Step 7 Optionally, in the Comment field, type a comment using up to 255 alphanumeric characters, spaces, or periods.
Tip The comment field appears in the View Tasks section of the page, so you should try to keep it relatively short.
Step 8 Optionally, in the Email Status To: field, type the email address (or multiple email addresses separated by commas)
where you want task status messages sent.
You must have a valid email relay server configured to send status messages. See Configuring a Mail Relay Host and
Notification Address, on page 460 for more information about configuring a relay host.
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Tools > Scheduling.
The schedule calendar page for the current month appears.
Step 3 From the Job Type list, select Queue Intrusion Policy Apply.
The page reloads to show the options for queuing a policy apply.
Step 4 Specify how you want to schedule the task, Once or Recurring:
• For one-time tasks, use the drop-down lists to specify the start date and time. The Current Time field indicates
the current time on the ASA FirePOWER module.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
445
Scheduling Tasks
Automating Geolocation Database Updates
• For recurring tasks, you have several options for setting the interval between instances of the task. See Configuring
a Recurring Task, on page 443 for details.
Step 5 In the Job Name field, type a name using up to 255 alphanumeric characters, spaces, or dashes.
Step 6 In the Intrusion Policy field, you have the following options:
• Select an intrusion policy to apply to the ASA FirePOWER module.
• Select All intrusion policies to apply all intrusion policies already applied to the ASA FirePOWER module.
Step 7 Optionally, in the Comment field, type a comment using up to 255 alphanumeric characters, spaces, or periods.
Tip The comment field appears in the Tasks Details section at the bottom of the schedule calendar page, so you
should limit the size of your comment.
Step 8 Optionally, in the Email Status To: field, type the email address (or multiple email addresses separated by commas)
where you want task status messages sent.
You must have a valid email relay server configured to send status messages. See Configuring a Mail Relay Host and
Notification Address, on page 460 for more information about configuring a relay host.
Step 10 To edit your saved task, click the task anywhere it appears on the schedule calendar page.
The Task Details section appears at the bottom of the page. To make any changes, click the edit icon ( ) .
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Updates.
The Product Updates page appears.
Step 3 Under Recurring Geolocation Updates, select the Enable Recurring Weekly Updates check box.
The Update Start Time field appears.
Step 4 In the Update Start Time field, specify the time and day of the week when you want weekly GeoDB updates to occur.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
446
Scheduling Tasks
Automating Software Updates
Note You must manually upload and install updates in two situations. First, you cannot schedule major updates to
the ASA FirePOWER module. Second, you cannot schedule updates for or pushes from appliances that cannot
access the Support Site. For information on manually updating the ASA FirePOWER module, see Updating
ASA FirePOWER Module Software, on page 477.
If you want to have more control over this process, you can use the Once option to download and install
updates during off-peak hours after you learn that an update has been released.
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Tools > Scheduling.
The Scheduling page appears.
Step 3 From the Job Type list, select Download Latest Update.
The New Task page reloads to show the update options.
Step 4 Specify how you want to schedule the task, Once or Recurring:
• For one-time tasks, use the drop-down lists to specify the start date and time. The Current Time field indicates the
current time on the appliance.
• For recurring tasks, you have several options for setting the interval between instances of the task. See Configuring
a Recurring Task, on page 443 for details.
Step 5 In the Job Name field, type a name using up to 255 alphanumeric characters, spaces, or dashes.
Step 6 In the Update Items section, select Software.
Step 7 Optionally, in the Comment field, type a comment using up to 255 alphanumeric characters, spaces, or periods.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
447
Scheduling Tasks
Automating Software Installs
Tip The comment field appears in the View Tasks section of the page, so you should try to keep it relatively short.
Step 8 Optionally, in the Email Status To: field, type the email address (or multiple email addresses separated by commas)
where you want task status messages sent.
You must have a valid email relay server configured to send status messages. See Configuring a Mail Relay Host and
Notification Address, on page 460 for more information about configuring a relay host.
Caution Depending on the update being installed, the appliance may reboot after the software is installed.
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Tools > Scheduling.
The Scheduling page appears.
Step 3 From the Job Type list, select Install Latest Update.
The page reloads to show the options for installing updates.
Step 4 Specify how you want to schedule the task, Once or Recurring:
• For one-time tasks, use the drop-down lists to specify the start date and time. The Current Time field indicates the
current time on the appliance.
• For recurring tasks, you have several options for setting the interval between instances of the task. See Configuring
a Recurring Task, on page 443 for details.
Step 5 In the Job Name field, type a name using up to 255 alphanumeric characters, spaces, or dashes.
Step 6 Optionally, in the Comment field, type a comment using up to 255 alphanumeric characters, spaces, or periods.
Tip The comment field appears in the View Tasks section of the page, so you should try to keep it relatively short.
Step 7 Optionally, in the Email Status To: field, type the email address (or multiple email addresses separated by commas)
where you want task status messages sent.
You must have a valid email relay server configured to send status messages. See Configuring a Mail Relay Host and
Notification Address, on page 460 for more information about configuring a relay host.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
448
Scheduling Tasks
Automating URL Filtering Updates
The task is added. You can check the status of a running task on the Task Status page; see Viewing the Status of
Long-Running Tasks, on page 519.
Note that when you enable URL filtering, you can also enable automatic updates. This forces the ASA
FirePOWER module to contact the cloud every 30 minutes for URL filtering data updates. If you have enabled
automatic updates, you should not create a scheduled task to update URL filtering data.
Although daily updates tend to be small, if it has been more than five days since your last update, new URL
filtering data may take up to 20 minutes to download, depending on your bandwidth. Then, it may take up to
30 minutes to perform the update itself.
To automate URL filtering data tasks:
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Tools > Scheduling.
The Scheduling page appears.
Step 3 From the Job Type list, select Update URL Filtering Database.
The page reloads to show the URL filtering update options.
Step 4 Specify how you want to schedule the update, Once or Recurring:
• For one-time tasks, use the drop-down lists to specify the start date and time. The Current Time field indicates the
current time on the appliance.
• For recurring tasks, you have several options for setting the interval between instances of the task. See Configuring
a Recurring Task, on page 443 for details.
Step 5 In the Job Name field, type a name using up to 255 alphanumeric characters, spaces, or dashes.
Step 6 Optionally, in the Comment field, type a comment using up to 255 alphanumeric characters, spaces, or periods.
Tip The comment field appears in the View Tasks section of the page, so you should try to keep it relatively short.
Step 7 Optionally, in the Email Status To field, type the email address (or multiple email addresses separated by commas)
where you want task status messages sent.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
449
Scheduling Tasks
Viewing Tasks
You must have a valid email relay server configured to send status messages. See Configuring a Mail Relay Host and
Notification Address, on page 460 for more information about configuring a relay host.
Viewing Tasks
After adding scheduled tasks, you can view them and evaluate their status. The View Options section of the
page allows you to view scheduled tasks using a calendar and a list of scheduled tasks.
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Tools > Scheduling.
The Scheduling page appears.
Step 2 You can perform the following tasks using the calendar view:
• Click the double left arrow icon to move back one year.
• Click the single left arrow icon to move back one month.
• Click the single right arrow icon to move forward one month.
• Click the double right arrow icon to move forward one year.
• Click Today to return to the current month and year.
• Click Add Task to schedule a new task.
• Click a date to view all scheduled tasks for the specific date in a task list table below the calendar.
• Click a specific task on a date to view the task in a task list table below the calendar.
Note For more information about using the task list, see Using the Task List, on page 450.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
450
Scheduling Tasks
Editing Scheduled Tasks
Column Description
Name Displays the name of the scheduled task and the comment associated with it.
Creator Displays the name of the user that created the scheduled task.
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Tools > Scheduling.
The Scheduling page appears.
Step 2 Click either the task that you want to edit or the day on which the task appears.
The Task Details table containing the selected task or tasks appears.
Step 3 Locate the task you want to edit in the table and click the edit icon ( )
The Edit Task page appears, showing the details of the task you selected.
Step 4 Edit the task to meet your needs, including the start time, the job name, the comment, and how often the task runs, once
or recurring. You cannot change the type of job.
The remaining options are determined by the task you are editing.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
451
Scheduling Tasks
Deleting Scheduled Tasks
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Tools > Scheduling.
The Scheduling page appears.
Step 2 On the calendar, select an instance of the recurring task you want to delete.
The page reloads to display a table of tasks below the calendar.
Step 3 Locate an instance of the recurring task you want to delete in the table and click the delete icon ( ) .
All instances of the recurring task are deleted.
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Tools > Scheduling.
The Scheduling page appears.
Step 2 Click the task that you want to delete or the day on which the task appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
452
Scheduling Tasks
Deleting a One-Time Task
Step 3 Locate the task you want to delete in the table and click the delete icon ( ) .
The instance of the task you selected is deleted.
What to do next
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
453
Scheduling Tasks
Deleting a One-Time Task
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
454
CHAPTER 36
Managing System Policies
A system policy allows you to manage the following on your ASA FirePOWER module:
• audit log settings
• the mail relay host and notification address
• SNMP polling settings
• STIG compliance
Step 1 Select Configuration > ASA FirePOWER Configuration > Local > System Policy.
The System Policy page appears.
Step 2 From the drop-down list, select an existing policy to use as a template for your new system policy.
Step 3 Type a name for your new policy in the Policy Name field.
Step 4 Type a description for your new policy in the Policy Description field.
Step 5 Click Create.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
455
Managing System Policies
Editing a System Policy
Your system policy is saved and the Edit System Policy page appears.
Step 1 Select Configuration > ASA FirePOWER Configuration > Local > System Policy.
The System Policy page appears, including a list of the existing system policies.
Step 3 Click Save Policy and Exit to save your changes. The changes are saved, and the System Policy page appears.
Step 1 Select Configuration > ASA FirePOWER Configuration > Local > System Policy.
The System Policy page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
456
Managing System Policies
Deleting System Policy Rules
Step 1 Select Configuration > ASA FirePOWER Configuration > Local > System Policy.
The System Policy page appears.
Step 2 Click the delete icon ( ) next to a system policy rule. To delete the rule, click OK.
The System Policy page appears. A pop-up message appears, confirming the policy deletion.
Caution By default, access to the appliance is not restricted. To operate the appliance in a more secure environment,
consider adding access to the appliance for specific IP addresses and then deleting the default any option.
Note After a user makes three consecutive failed attempts to log into the CLI or shell using SSH, the system
terminates the SSH connection.
The access list is part of the system policy. You can specify the access list either by creating a new system
policy or by editing an existing system policy. In either case, the access list does not take effect until you
apply the system policy.
To configure the access list:
Access: Admin
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
457
Managing System Policies
Configuring Audit Log Settings
Step 1 Select Configuration > ASA FirePOWER Configuration > Local > System Policy .
The System Policy page appears.
Step 4 Optionally, to add access for one or more IP addresses, click Add Rules.
The Add IP Address page appears.
Step 5 In the IP Address field, you have the following options, depending on the IP addresses you want to add:
• an exact IP address (for example, 192.168.1.101)
• an IP address block using CIDR notation (for example, 192.168.1.1/24)
Step 6 Select SSH, HTTPS, SNMP, or a combination of these options to specify which ports you want to enable for these IP
addresses.
Step 7 Click Add.
The Access List page appears again, reflecting the changes you made.
Note You must ensure that the external host is functional and accessible from the ASA FirePOWER module sending
the audit log.
The sending host name is part of the information sent. You can further identify the audit log stream with a
facility, a severity, and an optional tag. The ASA FirePOWER module does not send the audit log until you
apply the system policy.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
458
Managing System Policies
Configuring Audit Log Settings
After you apply a policy with this feature enabled, and your destination host is configured to accept the audit
log, the syslog messages are sent. The following is an example of the output structure:
Date Time Host [Tag] Sender: [User_Name]@[User_IP], [Subsystem], [Action
where the local date, time, and hostname precede the bracketed optional tag, and the sending device name
precedes the audit log message.
For example:
Mar 01 14:45:24 localhost [TAG] Dev-DC3000: [email protected], Operations > Monitoring, Page View
To configure the audit log settings:
Step 1 Select Configuration > ASA FirePOWER Configuration > Local > System Policy.
The System Policy page appears.
Step 4 Select Enabled from the Send Audit Log to Syslog drop-down menu. (The default setting is Disabled.)
Step 5 Designate the destination host for the audit information by using the IP address or the fully qualified name of the host
in the Host field. The default port (514) is used.
Caution If the computer you configure to receive an audit log is not set up to accept remote messages, the host will
not accept the audit log.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
459
Managing System Policies
Configuring a Mail Relay Host and Notification Address
Caution To allow encrypted posts, you must use an HTTPS URL. Note that sending audit information to an external
URL may affect system performance.
You can select an encryption method for the communication between appliance and mail relay host, and can
supply authentication credentials for the mail server if needed. After configuring settings, you can test the
connection between the appliance and the mail server using the supplied settings.
To configure a mail relay host:
Step 1 Select Configuration > ASA FirePOWER Configuration > Local > System Policy.
The System Policy page appears.
Step 4 In the Mail Relay Host field, type the hostname or IP address of the mail server you want to use.
Note The mail host you enter must allow access from the appliance.
Step 5 Enter the port number to use on the email server in the Port Number field. Typical ports include 25, when using no
encryption, 465, when using SSLv3, and 587, when using TLS.
Step 6 To select an encryption method, you have the following options:
• To encrypt communications between the appliance and the mail server using Transport Layer Security, select TLS
from the Encryption Method drop-down list.
• To encrypt communications between the appliance and the mail server using Secure Socket Layers, select SSLv3
from the Encryption Method drop-down list.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
460
Managing System Policies
Configuring SNMP Polling
• To allow unencrypted communication between the appliance and the mail server, select None from the Encryption
Method drop-down list.
Note that certificate validation is not required for encrypted communication between the appliance and mail server.
Step 7 Enter a valid email address in the From Address field for use as the source email address for messages sent by the
appliance.
Step 8 Optionally, to supply a user name and password when connecting to the mail server, select Use Authentication. Enter
a user name in the Username field. Enter a password in the Password field.
Step 9 To send a test email using the configured mail server, click Test Mail Server Settings.
A message appears next to the button indicating the success or failure of the test.
Note You must add SNMP access for any computer you plan to use to poll the appliance. For more information,
see Configuring the Access List for Your Appliance, on page 457. Note that the SNMP MIB contains information
that could be used to attack your appliance. Cisco recommends that you restrict your access list for SNMP
access to the specific hosts that will be used to poll for the MIB. Cisco also recommends you use SNMPv3
and use strong passwords for network management access.
Step 1 Select Configuration > ASA FirePOWER Configuration > Local > System Policy.
The System Policy page appears.
Step 5 From the SNMP Version drop-down list, select the SNMP version you want to use.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
461
Managing System Policies
Enabling STIG Compliance
The user is added. You can repeat steps 6 through 13 to add additional users. Click the delete icon ( ) to delete a user.
Caution You cannot disable this setting without assistance from Support. In addition, this setting may substantially
impact the performance of your system. Cisco does not recommend enabling STIG compliance except to
comply with Department of Defense security requirements.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
462
Managing System Policies
Enabling STIG Compliance
Step 1 Select Configuration > ASA FirePOWER Configuration > Local > System Policy.
The System Policy page appears.
Step 4 If you want to permanently enable STIG compliance on the appliance, select Enable STIG Compliance.
Caution You cannot disable STIG compliance on an appliance after you apply a policy with STIG compliance enabled.
If you need to disable compliance, contact Support.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
463
Managing System Policies
Enabling STIG Compliance
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
464
CHAPTER 37
Configuring ASA FirePOWER Module Settings
The following table summarizes an ASA FirePOWER module’s local configuration.
Option Description
Information Allows you to view current information about the appliance. You can also change the appliance name.
Cloud Allows you to download URL filtering data from the Collective Security Intelligence Cloud, perform lookups for
Services uncategorized URLs, and send diagnostic information on detected files to Cisco.
Field Description
Name A name you assign to the appliance. Note that this name is only used within the
context of the ASA FirePOWER module. Although you can use the hostname
as the name of the appliance, entering a different name in this field does not
change the hostname.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
465
Configuring ASA FirePOWER Module Settings
Cloud Communications Options for URL Filtering and Malware Detection
Field Description
Operating System Version The version of the operating system currently running on the appliance.
IPv4 Address The IPv4 address of the default ( eth0 ) management interface of the appliance.
If IPv4 management is disabled for the appliance, this field indicates that.
IPv6 Address The IPv6 address of the default ( eth0 ) management interface of the appliance.
If IPv6 management is disabled for the appliance, this field indicates that.
Current Policies The appliance-level policies currently applied. If a policy has been updated since
it was last applied, the name of the policy appears in italics.
Model Number The model number for the appliance. This number may be important for
troubleshooting.
Step 1 Select Configuration > ASA FirePOWER Configuration > Local > Configuration.
The Information page appears.
Step 2 To change the appliance name, type a new name in the Name field.
The name must be alphanumeric characters and cannot be composed of numeric characters only.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
466
Configuring ASA FirePOWER Module Settings
Cloud Communications Options for URL Filtering and Malware Detection
quickly create URL conditions for access control rules; see Blocking URLs Based on URL Category and
Reputation, on page 120.
Use the ASA FirePOWER module’s local configuration to specify the following options:
Note Cisco recommends that you either enable automatic updates or use the scheduler to schedule updates. Although
you can manually perform on-demand updates, allowing the system to automatically contact the cloud on a
regular basis provides you with the most up-to-date, relevant URL data.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
467
Configuring ASA FirePOWER Module Settings
Enabling Cloud Communications
Licensing
Performing category and reputation-based URL filtering and device-based malware detection require that you
enable the appropriate licenses on your ASA FirePOWER module; see Licensing the ASA FirePOWER
Module, on page 471.
You cannot configure cloud connection options if you have no URL Filtering license on the ASA FirePOWER
module. The Cloud Services local configuration page displays only the options for which you are licensed.
ASA FirePOWER modules with expired licenses cannot contact the cloud.
Note that, in addition to causing the URL Filtering configuration options to appear, adding a URL Filtering
license to your ASA FirePOWER module automatically enables Enable URL Filtering and Enable Automatic
Updates. You can manually disable the options if needed.
Internet Access
The system uses ports 80/HTTP and 443/HTTPS to contact the Cisco cloud.
The following procedures explain how to enable communications the Cisco cloud, and how to perform an
on-demand update of URL data. Note that you cannot start an on-demand update if an update is already in
progress.
Step 1 Ensure that your appliance can communicate with the Cisco cloud at all of the following URLs:
database.brightcloud.com
service.brightcloud.com
Step 2 Select Configuration > ASA FirePOWER Configuration > Integration > Cloud Services.
The Information page appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
468
Configuring ASA FirePOWER Module Settings
System Information
What to do next
• To perform an on-demand update of the system’s URL data:
1. Select Configuration > ASA FirePOWER Configuration > Local > Configuration.
The Information page appears.
2. Click URL Filtering.
The URL Filtering page appears.
3. Click Update Now.
The ASA FirePOWER module contacts the cloud and updates its URL filtering data if an update is
available.
System Information
Time
You can view the current time and time source on the ASA FirePOWER module using the Time page.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
469
Configuring ASA FirePOWER Module Settings
Time
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
470
CHAPTER 38
Licensing the ASA FirePOWER Module
• Understanding Licensing, on page 471
• Viewing Your Licenses, on page 474
• Adding a License to the ASA FirePOWER module, on page 474
• Deleting a License, on page 475
Understanding Licensing
License: Any
You can license a variety of features to create an optimal ASA FirePOWER deployment for your organization.
Licenses allow your device to perform a variety of functions including:
• intrusion detection and prevention
• Security Intelligence filtering
• file control and advanced malware protection
• application, user, and URL control
There are a few ways you may lose access to licensed features in the ASA FirePOWER module. You can
remove licensed capabilities. Though there are some exceptions, you cannot use the features associated with
an expired or deleted license.
This section describes the types of licenses available in an ASA FirePOWER module deployment. The licenses
you can enable on an appliance can depend the other licenses enabled.
The following table summarizes ASA FirePOWER module licenses.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
471
Licensing the ASA FirePOWER Module
Protection
Malware advanced malware protection (network-based malware detection and blocking) Protection
Protection
License: Protection
A Protection license allows you to perform intrusion detection and prevention, file control, and Security
Intelligence filtering:
• Intrusion detection and prevention allows you to analyze network traffic for intrusions and exploits and,
optionally, drop offending packets.
• File control allows you to detect and, optionally, block users from uploading (sending) or downloading
(receiving) files of specific types over specific application protocols. With a Malware license (see Malware,
on page 473), you can also inspect and block a restricted set of those file types based on their malware
dispositions.
• Security Intelligence filtering allows you to blacklist—deny traffic to and from—specific IP addresses,
before the traffic is subjected to analysis by access control rules. Dynamic feeds allow you to immediately
blacklist connections based on the latest intelligence. Optionally, you can use a “monitor-only” setting
for Security Intelligence filtering.
Although you can configure an access control policy to perform Protection-related inspection without a license,
you cannot apply the policy until you first add a Protection license to the ASA FirePOWER module.
If you delete your Protection license from the ASA FirePOWER module, the ASA FirePOWER module stops
detecting intrusion and file events. Additionally, the ASA FirePOWER module will not contact the internet
for either Cisco-provided or third-party Security Intelligence information. You cannot reapply existing policies
until you re-enable Protection.
Because a Protection license is required for URL Filtering, Malware, and Control licenses, deleting or disabling
a Protection license has the same effect as deleting or disabling your URL Filtering, Malware, or Control
license.
Control
License: Control
A Control license allows you to implement user and application control by adding user and application
conditions to access control rules. To enable Control, you must also enable Protection.
Although you can add user and application conditions to access control rules without a Control license, you
cannot apply the policy until you first add a Control license to the ASA FirePOWER module.
If you delete your Control license, you cannot reapply existing access control policies if they include rules
with user or application conditions.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
472
Licensing the ASA FirePOWER Module
URL Filtering
URL Filtering
License: URL Filtering
URL filtering allows you to write access control rules that determine the traffic that can traverse your network
based on URLs requested by monitored hosts, correlated with information about those URLs, which is obtained
from the Cisco cloud by the ASA FirePOWER module. To enable URL Filtering, you must also enable a
Protection license.
Tip Without a URL Filtering license, you can specify individual URLs or groups of URLs to allow or block. This
gives you granular, custom control over web traffic, but does not allow you to use URL category and reputation
data to filter network traffic.
URL filtering requires a subscription-based URL Filtering license. Although you can add category and
reputation-based URL conditions to access control rules without a URL Filtering license, the ASA FirePOWER
module will not contact the cloud for URL information. You cannot apply the access control policy until you
first add a URL Filtering license to the ASA FirePOWER module.
You may lose access to URL filtering if you delete the license from the ASA FirePOWER module. Also,
URL Filtering licenses may expire. If your license expires or if you delete it, access control rules with URL
conditions immediately stop filtering URLs, and your ASA FirePOWER module can no longer contact the
cloud. You cannot reapply existing access control policies if they include rules with category and
reputation-based URL conditions.
Malware
License: Malware
A Malware license allows you to perform advanced malware protection, that is, use devices to detect and
block malware in files transmitted over your network. To enable Malware on a device, you must also enable
Protection.
You configure malware detection as part of a file policy, which you then associate with one or more access
control rules. File policies can detect your users uploading or downloading files of specific types over specific
application protocols. The Malware license allows you to inspect a restricted set of those file types for malware.
The Malware license also allows you to add specific files to a file list and enable the file list within a file
policy, allowing those files to be automatically allowed or blocked on detection.
Although you can add a malware-detecting file policy to an access control rule without a Malware license,
the file policy is marked with a warning icon in the access control rule editor. Within the file policy, Malware
Cloud Lookup rules are also marked with the warning icon. Before you can apply an access control policy
that includes a malware-detecting file policy, you must add a Malware license. If you later delete the license,
you cannot reapply an existing access control policy to those devices if it includes file policies that perform
malware detection.
If you delete your Malware license or it expires, the ASA FirePOWER module stops performing malware
cloud lookups, and also stops acknowledging retrospective events sent from the Cisco cloud. You cannot
reapply existing access control policies if they include file policies that perform malware detection. Note that
for a very brief time after a Malware license expires or is deleted, the system can use cached dispositions for
files detected by Malware Cloud Lookup file rules. After the time window expires, the system assigns a
disposition of Unavailable to those files, rather than performing a lookup.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
473
Licensing the ASA FirePOWER Module
Viewing Your Licenses
Note If you add licenses after a backup has completed, these licenses will not be removed or overwritten if this
backup is restored. To prevent a conflict on restore, remove those licenses before restoring the backup, noting
where the licenses were used, and add and reconfigure them after restoring the backup. If a conflict occurs,
contact Support.
To add a license:
If the license is correct, the license is added. Skip the rest of the procedure.
• If no, click Get License.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
474
Licensing the ASA FirePOWER Module
Deleting a License
The Product License Registration portal appears. If you cannot access the Internet, switch to a computer that can. Note
the license key at the bottom of the page and browse to https://www.cisco.com/go/license .
Step 4 Follow the on-screen instructions to obtain your license, which will be sent to you in an email.
Tip You can also request a license on the Licenses tab after you log into the Support Site.
Step 5 Copy the license from the email, paste it into the License field in the ASA FirePOWER module’s web user interface,
and click Submit License.
If the license is valid, it is added.
Deleting a License
License: Any
Use the following procedure if you need to delete a license for any reason. Keep in mind that because Cisco
generates licenses based on each ASA FirePOWER module’s unique license key, you cannot delete a license
from one ASA FirePOWER module and then reuse it on a different ASA FirePOWER module.
In most cases, deleting a license removes your ability to use features enabled by that license. For more
information, see Understanding Licensing, on page 471.
To delete a license:
Step 2 Next to the license you want to delete, click the delete icon ( ).
Step 3 Confirm that you want to delete the license.
The license is deleted.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
475
Licensing the ASA FirePOWER Module
Deleting a License
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
476
CHAPTER 39
Updating ASA FirePOWER Module Software
Cisco electronically distributes several different types of updates, including major and minor updates to the
ASA FirePOWER module software itself, as well as rule updates, geolocation database (GeoDB) updates,
and Vulnerability Database (VDB) updates.
Caution This section contains general information on updating the ASA FirePOWER module. Before you update,
including the VDB, GeoDB, or intrusion rules, you must read the release notes or advisory text that accompanies
the update. The release notes provide important information, including prerequisites, warnings, and specific
installation and uninstallation instructions.
Unless otherwise documented in the release notes or advisory text, updating does not modify configurations;
the settings remain intact.
• Understanding Update Types, on page 477
• Performing Software Updates, on page 478
• Uninstalling Software Updates, on page 483
• Updating the Vulnerability Database, on page 484
• Importing Rule Updates and Local Rule Files, on page 485
patches Patches include a limited range of fixes (and usually change the fourth digit in yes yes
the version number; for example, 5.4.0.1).
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
477
Updating ASA FirePOWER Module Software
Performing Software Updates
feature updates Feature updates are more comprehensive than patches and generally include new yes yes
features (and usually change the third digit in the version number; for example,
5.4.1).
major updates (major and Major updates, sometimes referred to as upgrades, include new features and no no
minor version releases) functionality and may entail large-scale changes (and usually change the first or
second digit in the version number; for example, 5.3 or 5.4).
VDB VDB updates affect the database of known vulnerabilities to which hosts may yes no
be susceptible.
intrusion rules Intrusion rule updates provide new and updated intrusion rules and preprocessor yes no
rules, modified states for existing rules, and modified default intrusion policy
settings. Rule updates may also delete rules, provide new rule categories and
default variables, and modify default variable values.
geolocation database GeoDB updates provide updated information on physical locations, connection yes no
(GeoDB) types, and so on that your system can associate with detected routable IP
addresses. You can use geolocation data as a condition in access control rules.
You must install the GeoDB to view geolocation details.
Note that while you can uninstall patches and other minor updates, you cannot uninstall major updates or
return to previous versions of the VDB, GeoDB, or intrusion rules. If you updated to a new major version and
you need to revert to an older version, contact Cisco TAC.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
478
Updating ASA FirePOWER Module Software
Understanding the Update Process
Tip For patches and feature updates, you can take advantage of the automated update feature; see Automating
Software Updates, on page 447.
The Data Correlator does not run during system updates. It resumes when the update is complete.
The manner and duration of network traffic interruption depends on how yourASA FirePOWER module is
configured and deployed, and whether the update reboots the ASA FirePOWER module. For specific
information on how and when network traffic is affected for a particular update, see the release notes.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
479
Updating ASA FirePOWER Module Software
Updating the ASA FirePOWER Module Software
To prevent you from using the ASA FirePOWER module during a major update, and to allow you to easily
monitor a major update’s progress, the system streamlines the ASA FirePOWER module interface. You can
monitor a minor update's progress in the task queue (Monitoring > ASA FirePOWER Monitoring > Task
Status). Although you are not prohibited from using the ASA FirePOWER module during a minor update,
Cisco recommends against it.
Even for minor updates, the ASA FirePOWER module may become unavailable during the update process.
This is expected behavior. If this occurs, wait until you can again access the ASA FirePOWER module. If
the update is still running, you must continue to refrain from using the ASA FirePOWER module until the
update has completed. Note that while updating, the ASA FirePOWER module may reboot a second time;
this is also expected behavior.
Caution If you encounter issues with the update (for example, if the update has failed or if a manual refresh of the
Update Status page shows no progress), do not restart the update. Instead, contact Support.
For major updates, updating the ASA FirePOWER module removes uninstallers for previous updates.
• To update the ASA FirePOWER Module Software:
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
480
Updating ASA FirePOWER Module Software
Updating the ASA FirePOWER Module Software
Step 1 Read the release notes and complete any required pre-update tasks.
Pre-update tasks may include making sure that: the ASA FirePOWER module is running the correct version of the Cisco
software, you have enough free disk space to perform the update, you set aside adequate time to perform the update, you
backed up configuration data, and so on.
Step 2 Upload the update. You have two options, depending on the type of update and whether your ASA FirePOWER module
has access to the Internet:
• For all except major updates, and if your ASA FirePOWER module has access to the Internet, select Configuration
> ASA FirePOWER Configuration > Updates, then click Download Updates to check for the latest updates on
either of the following Support Sites:
• Sourcefire: (https://support.sourcefire.com/)
• Cisco:
(http://www.cisco.com/cisco/web/support/index.html)
• For major updates, or if your ASA FirePOWER module does not have access to the Internet, you must first manually
download the update from either of the following Support Sites:
• Sourcefire: (https://support.sourcefire.com/)
• Cisco: (http://www.cisco.com/cisco/web/support/index.html)
• Select Configuration > ASA FirePOWER Configuration > Updates, then click Upload Update. Click Choose
File to navigate to and select the update and click Upload.
Note Download the update directly from the Support Site, either manually or by clicking Download Updates on the
Product Updates tab. If you transfer an update file by email, it may become corrupted.
The update is uploaded.
Step 3 Select Monitoring > ASA FirePOWER Monitoring > Task Status to view the task queue and make sure that there are
no jobs in process.
Tasks that are running when the update begins are stopped and cannot be resumed; you must manually delete them from
the task queue after the update completes. The task queue automatically refreshes every 10 seconds. You must wait until
any long-running tasks are complete before you begin the update.
Step 5 Click the install icon next to the update you uploaded.
The update process begins. How you monitor the update depends on whether the update is a major or minor update. See
the Table 86: ASA FirePOWER Module Update Types, on page 477 table and the release notes to determine your update
type:
• For minor updates, you can monitor the update's progress in the task queue (Monitoring > ASA FirePOWER>
Monitoring > Task Status).
• For major updates, you can begin monitoring the update’s progress in the task queue. However, after the ASA
FirePOWER module completes its necessary pre-update checks, you are locked out of the module interface. When
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
481
Updating ASA FirePOWER Module Software
Monitoring the Status of Major Updates
you regain access, the Upgrade Status page appears. See Monitoring the Status of Major Updates, on page 482for
information.
Caution Regardless of the update type, do not use the ASA FirePOWER module to perform tasks other than monitoring
the update until the update has completed and, if necessary, the ASA FirePOWER module reboots. For more
information, seeUsing the ASA FirePOWER Module During the Update, on page 479
Step 6 After the update finishes, access the ASA FirePOWER module interface and refresh the page. Otherwise, the interface
may exhibit unexpected behavior. If you are the first user to access the interface after a major update, the End User License
Agreement (EULA) may appear. You must review and accept the EULA to continue.
Step 7 If the rule update available on the Support Site is newer than the rules on your ASA FirePOWER module, import the
newer rules.
For more information, see Importing Rule Updates and Local Rule Files, on page 485.
Step 9 If the VDB available on the Support Site is newer than the most recently installed VDB, install the latest VDB.
Installing a VDB update causes a short pause in traffic flow and processing, and may also cause a few packets to pass
uninspected. For more information, see Updating the Vulnerability Database, on page 484.
Tip Click show log for current script to see the update log. Click hide log for current script to hide the log
again.
If the update fails for any reason, the page displays an error message indicating the time and date of the failure,
which script was running when the update failed, and instructions on how to contact Support. Do not restart
the update.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
482
Updating ASA FirePOWER Module Software
Uninstalling Software Updates
Caution If you encounter any other issue with the update (for example, if a manual refresh of the page shows no
progress for an extended period of time), do not restart the update. Instead, contact Support.
When the update completes, the ASA FirePOWER module displays a success message and reboots. After the
ASA FirePOWER module finishes rebooting, complete any required post-update steps.
Note Uninstalling is not supported for major updates. If you updated to a new major version and you need to revert
to an older version, contact Support.
Step 2 Click the install icon next to the uninstaller for the update you want to remove.
If prompted, confirm that you want to uninstall the update and reboot the ASA FirePOWER module.
The uninstall process begins. You can monitor its progress in the task queue (MonitoringASA > FirePOWER Monitoring
> Task Status).
Caution Do not use the ASA FirePOWER module interface to perform tasks until the uninstall has completed and, if
necessary, the ASA FirePOWER module reboots. For more information, see Understanding the Update Process,
on page 479.
Step 3 Refresh the page. Otherwise, the interface might exhibit unexpected behavior.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
483
Updating ASA FirePOWER Module Software
Updating the Vulnerability Database
Note Installing a VDB update with detection updates may cause a short pause in traffic flow and processing, and
may also cause a few packets to pass uninspected.You may want to schedule the update during low system
usage times to minimize the impact of any system downtime.
Note After you complete a VDB update, reapply any out-of-date access control policy. Keep in mind that installing
a VDB or reapplying an access control policy can cause a short pause in traffic flow and processing, and may
also cause a few packets to pass uninspected. For more information, see Deploying Configuration Changes,
on page 73.
This section explains how to plan for and perform manual VDB updates.
To update the vulnerability database:
Step 1 Read the VDB Update Advisory Text for the update.
The advisory text includes information about the changes to the VDB made in the update.
Note Download the update directly from the Support Site either manually or by clicking Download Updates. If you
transfer an update file by email, it may become corrupted.
The update is uploaded.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
484
Updating ASA FirePOWER Module Software
Importing Rule Updates and Local Rule Files
Note Rule updates may contain new binaries, so make sure your process for downloading and installing them
complies with your security policies. In addition, rule updates may be large, so import rules during periods
of low network use.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
485
Updating ASA FirePOWER Module Software
Using One-Time Rule Updates
Note that importing a rule update discards all cached changes to network analysis and intrusion policies. For
your convenience, the Rule Updates page lists policies with cached changes. For more information, see
Resolving Conflicts and Committing Policy Changes, on page 257.
Reapplying Policies
For changes made by a rule update to take affect, you must reapply any modified policies. When importing
a rule update, you can configure the system to automatically reapply intrusion or access control policies. This
is especially useful if you allow the rule update to modify system-provided base policies.
• Reapplying an access control policy also reapplies associated SSL, network analysis, and file policies,
but does not reapply intrusion policies. It also updates the default values for any modified advanced
settings. Because you cannot apply a network analysis policy independently, you must reapply access
control policies if you want to update preprocessor settings in network analysis policies.
• Reapplying intrusion policies allows you to update rules and other changed intrusion policy settings.
You can reapply intrusion policies in conjunction with access control policies, or you can apply only
intrusion policies to update intrusion rules without updating any other access control configurations.
When a rule update includes shared object rules, applying an access control or intrusion policy for the first
time after the import causes a short pause in traffic flow and processing, and may also cause a few packets to
pass uninspected. For more information on applying access control and intrusion policies, including
requirements, other effects, and recommendations, see Deploying Configuration Changes, on page 73.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
486
Updating ASA FirePOWER Module Software
Using Manual One-Time Rule Updates
Step 1 From a computer that can access the Internet, access either of the following sites:
• Sourcefire:(https://support.sourcefire.com/)
• Cisco: (http://www.cisco.com/cisco/web/support/index.html)
Step 4 Click the rule update file that you want to download and save it to your computer.
Step 5 Select Configuration > ASA FirePOWER Configuration > Updates, then select the Rule Updates tab.
The Rule Updates page appears.
Tip You can also click Import Rules on the Rule Editor page (Configuration > ASA FirePOWER Configuration
> Policies > Intrusion Policy > Rule Editor).
Step 6 Optionally, click Delete All Local Rules, then click OK to move all user-defined rules that you have created or imported
to the deleted folder.
Step 7 Select Rule Update or text rule file to upload and install and click Choose File to navigate to and select the rule update
file.
Step 8 Optionally, reapply policies after the update completes:
• Select Reapply intrusion policies after the rule update import completes to automatically reapply intrusion
policies. Choose only this option to update rules and other changed intrusion policy settings without having to update
any other access control configurations you may have made. You must select this option to reapply intrusion policies
in conjunction with access control policies; reapplying access control policies in this case does not perform a complete
apply.
• Select Reapply access control policies after the rule update import completes to automatically reapply access
control policies and their associated SSL, network analysis, and file policies, but not intrusion policies. Selecting
this option also updates the default values for any modified access control advanced settings. Because you cannot
apply a network analysis policy independently of its parent access control policy, you must reapply access control
policies if you want to update preprocessor settings in network analysis policies.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
487
Updating ASA FirePOWER Module Software
Using Automatic One-Time Rule Updates
Note Contact Support if you receive an error message while installing the rule update.
Step 1 Select Configuration > ASA FirePOWER Configuration > Updates, then select the Rule Updates tab.
The Rule Updates page appears.
Tip You can also click Import Rules on the Rule Editor page (Configuration > ASA FirePOWER Configuration
> Policies > Intrusion Policy > Rule Editor.
Step 2 Optionally, click Delete All Local Rules, then click OK to move all user-defined rules that you have created or imported
to the deleted folder.
Step 3 Select Download new Rule Update from the Support Site.
Step 4 Optionally, reapply policies after the update completes:
• Select Reapply intrusion policies after the rule update import completes to automatically reapply intrusion
policies. Choose only this option to update rules and other changed intrusion policy settings without having to update
any other access control configurations you may have made. You must select this option to reapply intrusion policies
in conjunction with access control policies; reapplying access control policies in this case does not perform a complete
apply.
• Select Reapply access control policies after the rule update import completes to automatically reapply access
control, network analysis, and file policies, but not intrusion policies. Selecting this option also updates the default
values for any modified access control advanced settings. Because you cannot apply a network analysis policy
independently of its parent access control policy, you must reapply access control policies if you want to update
preprocessor settings in network analysis policies.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
488
Updating ASA FirePOWER Module Software
Using Recurring Rule Updates
Applicable subtasks in the rule update import occur in the following order: download, install, base policy
update, and policy reapply. When one subtask completes, the next subtask begins. Note that you can only
apply policies previously applied by the ASA FirePOWER module where the recurring import is configured.
To schedule recurring rule updates:
Step 1 Select Configuration > ASA FirePOWER Configuration > Updates, then select the Rule Updates tab.
The Rule Updates page appears.
Tip You can also click Import Rules on the Rule Editor page (Configuration > ASA FirePOWER Configuration
> Policies > Intrusion Policy > Rule Editor.
Step 2 Optionally, click Delete All Local Rules, then click OK to move all user-defined rules that you have created or imported
to the deleted folder.
Step 3 Select Enable Recurring Rule Update Imports.
The page expands to display options for configuring recurring imports. Import status messages appear beneath the
Recurring Rule Update Imports section heading. Recurring imports are enabled when you save your settings.
Tip To disable recurring imports, clear the Enable Recurring Rule Update Imports check box and click Save.
Step 4 In the Import Frequency field, select Daily, Weekly, or Monthly from the drop-down list.
If you selected a weekly or monthly import frequency, use the drop-down lists that appear to select the day of the week
or month when you want to import rule updates. Select from a recurring task drop-down list either by clicking or by
typing the first letter or number of your selection one or more times and pressing Enter.
Step 5 In the Import Frequency field, specify the time when you want to start your recurring rule update import.
Step 6 Optionally, reapply policies after the update completes:
• Select Reapply intrusion policies after the rule update import completes to automatically reapply intrusion
policies. Choose only this option to update rules and other changed intrusion policy settings without having to update
any other access control configurations you may have made. You must select this option to reapply intrusion policies
in conjunction with access control policies; reapplying access control policies in this case does not perform a complete
apply.
• Select Reapply access control policies after the rule update import completes to automatically reapply access
control policies and their associated SSL, network analysis, and file policies, but not intrusion policies. Selecting
this option also updates the default values for any modified access control advanced settings. Because you cannot
apply a network analysis policy independently of its parent access control policy, you must reapply access control
policies if you want to update preprocessor settings in network analysis policies.
Step 7 Click Save to enable recurring rule update imports using your settings.
The status message under the Recurring Rule Update Imports section heading changes to indicate that the rule update
has not yet run. At the scheduled time, the system installs the rule update and applies policies as you specified in the
previous step; see Deploying Configuration Changes, on page 73 and Applying an Intrusion Policy, on page 285.
You can log off or perform other tasks before or during the import. When accessed during an import, the Rule Update
Log displays a red status icon , and you can view messages as they occur in the Rule Update Log detailed view.
Depending on the rule update size and content, several minutes may pass before status messages appear. For more
information, see Viewing the Rule Update Log, on page 491.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
489
Updating ASA FirePOWER Module Software
Importing Local Rule Files
Note Contact Support if you receive an error message while installing the rule update.
The system will automatically assign the rule the next available custom rule SID of 1000000 or greater, and
a revision number of 1.
• You must include the SID assigned by the system and a revision number greater than the current revision
number when importing an updated version of a local rule that you have previously imported.
To view the revision number for a current local rule, display the Rule Editor page (Policies > Intrusion Policy
> Rule Editor), click on the local rule category to expand the folder, then click Edit next to the rule.
• You can reinstate a local rule that you have deleted by importing the rule using the SID assigned by the
system and a revision number greater than the current revision number. Note that the system automatically
increments the revision number when you delete a local rule; this is a device that allows you to reinstate
local rules.
To view the revision number for a deleted local rule, display the Rule Editor page (Policies > Intrusion Policy
> Rule Editor), click on the deleted rule category to expand the folder, then click Edit next to the rule.
• You cannot import a rule file that includes a rule with a SID greater than 2147483647; the import will
fail.
• If you import a rule that includes a list of source or destination ports that is longer than 64 characters,
the import will fail.
• The system always sets local rules that you import to the disabled rule state; you must manually set the
state of local rules before you can use them in your intrusion policy. See Setting Rule States, on page
308 for more information.
• You must make sure that the rules in the file do not contain any escape characters.
• The rules importer requires that all custom rules are imported in ASCII or UTF-8 encoding.
• All imported local rules are automatically saved in the local rule category.
• All deleted local rules are moved from the local rule category to the deleted rule category.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
490
Updating ASA FirePOWER Module Software
Viewing the Rule Update Log
• The system imports local rules preceded with a single pound character (#).
• The system ignores local rules preceded with two pound characters (##) and does not import them.
• Policy validation fails if you enable an imported local rule that uses the deprecated threshold keyword
in combination with the intrusion event thresholding feature in an intrusion policy. See Configuring
Event Thresholding, on page 311 for more information.
Step 3 Select Rule Update or text rule file to upload and install and click Choose File to navigate to the rule file. Note that
all rules uploaded in this manner are saved in the local rule category.
Tip You can import only plain text files with ASCII or UTF-8 encoding.
learn more about the contents of the columns in find more information in Understanding the Rule Update
the table Log Table, on page 492.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
491
Updating ASA FirePOWER Module Software
Understanding the Rule Update Log Table
delete an import file record from the import log, click the delete icon ( ) next to the file name for the
including detailed records for all objects included import file.
with the file
Note Deleting the file from the log does not delete
any object imported in the import file, but only
deletes the import log records.
view details for each object imported in a rule click the view icon ( ) next to the file name for the import
update or local rule file file.
Step 1 Select Configuration > ASA FirePOWER Configuration > Updates, then select the Rule Updates tab.
The Rule Updates page appears.
Tip You can also click Import Rules on the Rule Editor page (Configuration > ASA FirePOWER Configuration
> Policies > Intrusion Policy > Rule Editor).
Field Description
Summary The name of the import file. If the import fails, a brief statement of the reason for the failure
appears under the file name.
User ID The user name of the user that triggered the import.
• succeeded
Tip The red status icon indicating an unsuccessful or incomplete import appears on the
Rule Update Log page during the import and is replaced by the green icon only when
the import has successfully completed.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
492
Updating ASA FirePOWER Module Software
Viewing Rule Update Import Log Details
Click the view icon ( ) next to the rule update or file name to view the Rule Update Log detailed page for
the rule update or local rule file, or click the delete icon ( ) to delete the file record and all detailed object
records imported with the file.
Tip You can view import details as they appear while a rule update import is in progress.
learn more about the contents of the columns find more information in Understanding the Rule Update
in the table Import Log Detailed View, on page 493.
Step 1 Select Configuration > ASA FirePOWER Configuration > Updates, then select the Rule Updates tab.
The Rule Updates page appears.
Tip You can also click Import Rules on the Rule Editor page (Configuration > ASA FirePOWER Configuration
> Policies > Intrusion Policy > Rule Editor.
Step 3 Click the view icon ( ) next to the file whose detailed records you want to view.
The table view of detailed records appears.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
493
Updating ASA FirePOWER Module Software
Understanding the Rule Update Import Log Detailed View
Field Description
Name The name of the imported object, which for rules corresponds to the rule Message field, and for rule update components
is the component name.
Type The type of imported object, which can be one of the following:
• rule update component (an imported component such as a rule pack or policy pack)
• rule (for rules, a new or updated rule; note that in Version 5.0.1 this value replaced the update value, which is
deprecated)
• policy apply (the Reapply intrusion policies after the Rule Update import completes option was enabled
for the import)
Action An indication that one of the following has occurred for the object type:
• new (for a rule, this is the first time the rule has been stored on this ASA FirePOWER module)
• changed (for a rule update component or rule, the rule update component has been modified, or the rule has a
higher revision number and the same GID and SID)
• collision (for a rule update component or rule, import was skipped because its revision conflicts with an existing
component or rule)
• deleted (for rules, the rule has been deleted from the rule update)
• enabled (for a rule update edit, a preprocessor, rule, or other feature has been enabled in a system-provided
policy)
• disabled (for rules, the rule has been disabled in a system-provided policy)
• drop (for rules, the rule has been set to Drop and Generate Events in a system-provided policy)
• error (for a rule update or local rule file, the import failed)
• apply (the Reapply intrusion policies after the Rule Update import completes option was enabled for the
import)
Default The default action defined by the rule update. When the imported object type is rule , the default action is Pass ,
Action Alert , or Drop . For all other imported object types, there is no default action.
GID The generator ID for a rule. For example, 1 (standard text rule) or 3 (shared object rule).
Policy For imported rules, this field displays All , which indicates that the imported rule was included in all system-provided
intrusion policies. For other types of imported objects, this field is blank.
Details A string unique to the component or rule. For rules, the GID, SID, and previous revision number for a changed rule,
displayed as previously (GID:SID:Rev) . This field is blank for a rule that has not changed.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
494
Updating ASA FirePOWER Module Software
Updating the Geolocation Database
Field Description
Count The count ( 1 ) for each record. The Count field appears in a table view when the table is constrained, and the Rule
Update Log detailed view is constrained by default to rule update records.
Note Download the update directly from the Support Site, either manually or by clicking Download and install
geolocation update from the Support Site on the Geolocation Updates page. If you transfer an update file by
email, it may become corrupted.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
495
Updating ASA FirePOWER Module Software
Updating the Geolocation Database
The update process begins. The average duration of update installation is 30 to 40 minutes. You can monitor the update’s
progress in the task queue (Monitoring > ASA FirePOWER Monitoring > Task Status).
Step 4 After the update finishes, return to the Geolocation Updates page to confirm that the GeoDB build number matches the
update you installed.
The GeoDB update overrides any previous versions of the GeoDB and is effective immediately. Although it may take a
few minutes for a GeoDB update to take effect throughout your deployment, you do not have to reapply access control
policies after you update.
What to do next
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
496
CHAPTER 40
Monitoring the System
The ASA FirePOWER module provides many useful monitoring features to assist you in the daily administration
of your system, all on a single page. For example, on the Host Statistics page you can monitor basic host
statistics.
• Viewing Host Statistics, on page 497
• Monitoring System Status and Disk Space Usage, on page 498
• About System Process Status, on page 498
• Viewing System Process Status, on page 499
• Understanding Running Processes, on page 500
The following table describes the host statistics listed on the Statistics page.
Category Description
Uptime The number of days (if applicable), hours, and minutes since the system was last started.
Load Average The average number of processes in the CPU queue for the past 1 minute, 5 minutes, and
15 minutes.
Disk Usage The percentage of the disk that is being used. Click the arrow to view more detailed host
statistics. See Monitoring System Status and Disk Space Usage, on page 498 for more
information.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
497
Monitoring the System
Monitoring System Status and Disk Space Usage
Category Description
Processes A summary of the processes running on the system. See Monitoring System Status and
Disk Space Usage, on page 498 for more information.
Column Description
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
498
Monitoring the System
Viewing System Process Status
Column Description
Nice The nice value, which is a value that indicates the scheduling priority of a process. Values range
between -20 (highest priority) and 19 (lowest priority)
Size The memory size used by the process (in kilobytes unless the value is followed by m , which
indicates megabytes)
Res The amount of resident paging files in memory (in kilobytes unless the value is followed by m
, which indicates megabytes)
Time The amount of time (in hours:minutes:seconds) that the process has been running
Command
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
499
Monitoring the System
Understanding Running Processes
The process list expands, listing general process status information that includes the number and types of running tasks,
the current time, the current system uptime, the system load average, CPU, memory, and swap information, and specific
information about each running process.
Cpu(s) lists the following CPU usage information:
• user process usage percentage
• system process usage percentage
• nice usage percentage (CPU usage of processes that have a negative nice value, indicating a higher priority)
Nice values indicate the scheduled priority for system processes and can range between -20 (highest priority) and 19
(lowest priority).
• idle usage percentage
Note For more information about the types of processes that run on the appliance, see Understanding Executables
and System Utilities, on page 502.
What to do next
To collapse the process list:
Click the up arrow next to Processes.
The process list collapses.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
500
Monitoring the System
Understanding System Daemons
Note The table below is not an exhaustive list of all processes that may run on an appliance.
Daemon Description
httpsd Manages the HTTPS (Apache web server with SSL) service, and checks for working SSL and valid certificate
authentication; runs in the background to provide secure web access to the appliance
kupdated Manages the Linux kernel update process, which performs disk synchronization
pm Manages all Cisco processes, starts required processes, restarts any process that fails unexpectedly
safe_mysqld Manages safe mode operation of the database; restarts the database daemon if an error occurs and logs runtime
information to a file
sfmgr Provides the RPC service for remotely managing and configuring an appliance using an sftunnel connection to the
appliance
sftroughd Listens for connections on incoming sockets and then invokes the correct executable (typically the Cisco message
broker, sfmb) to handle the request
sftunnel Provides the secure communication channel for all processes requiring communication with a remote appliance
sshd Manages the Secure Shell (SSH) process; runs in the background to provide SSH access to the appliance
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
501
Monitoring the System
Understanding Executables and System Utilities
Executable Description
awk Utility that executes programs written in the awk programming language
cat Utility that reads files and writes content to standard output
egrep Utility that searches files and folders for specified input; supports extended set of
regular expressions not supported in standard grep
grep Utility that searches files and directories for specified input
ifconfig Indicates the network configuration executable. Ensures that the MAC address
stays constant
iptables Handles access restriction based on changes made to the Access List page. See
Configuring the Access List for Your Appliance, on page 457 for more information
about access configuration.
killall Utility that can be used to end all sessions and processes
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
502
Monitoring the System
Understanding Executables and System Utilities
Executable Description
logger Utility that provides a way to access the syslog daemon from the command line
md5sum Utility that prints checksums and block counts for specified files
smtpclient Mail client that handles email transmission when email event notification
functionality is enabled
snmptrap Forwards SNMP trap data to the SNMP trap server specified when SNMP
notification functionality is enabled
sudo Indicates a sudo process, which allows users other than admin to run executables
top Utility that displays information about the top CPU processes
touch Utility that can be used to change the access and modification times of specified
files
wc Utility that performs line, word, and byte counts on specified files
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
503
Monitoring the System
Understanding Executables and System Utilities
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
504
CHAPTER 41
Using Backup and Restore
Backup and restoration is an essential part of any system maintenance plan. While each organization’s backup
plan is highly individualized, the ASA FirePOWER module provides a mechanism for archiving data so that
data can be restored in case of disaster.
The following are backed up:
• Access, intrusion, and identity policies
• Local database
• Events
Caution Do not use the backup and restore process to copy the configuration files between ASA FirePOWER modules.
The configuration files include information that uniquely identifies an ASA FirePOWER module and cannot
be shared.
Caution If you applied any intrusion rule updates, those updates are not backed up. You need to apply the latest rule
update after you restore.
You can save backup files to the appliance or to your local computer.
• Creating Backup Files, on page 506
• Creating Backup Profiles, on page 507
• Uploading Backups from a Local Host, on page 508
• Restoring the Appliance from a Backup File, on page 508
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
505
Using Backup and Restore
Creating Backup Files
Caution If you configured any interface associations with security zones, these associations are not backed up. You
must reconfigure them after you restore. For more information, see Working with Security Zones, on page
49 .
Step 1 Select Configuration > ASA FirePOWER Configuration > Tools > Backup/Restore.
The Backup Management page appears.
Step 3 In the Name field, type a name for the backup file. You can use alphanumeric characters, punctuation, and spaces.
Step 4 Optionally, to be notified when the backup is complete, select the Email check box and type your email address in the
accompanying text box.
Note To receive email notifications, you must configure a relay host as described in Configuring a Mail Relay Host
and Notification Address, on page 460.
Step 5 Optionally, to use secure copy protocol (SCP) to copy the backup archive to a different machine, select the Copy when
complete check box, then type the following information in the accompanying text boxes:
• In the Host field, the hostname or IP address of the machine where you want to copy the backup
• In the Path field, the path to the directory where you want to copy the backup
• In the User field, the user name you want to use to log into the remote machine
• In the Password field, the password for that user nameIf you prefer to access your remote machine with an SSH
public key instead of a password, you must copy the contents of the SSH Public Key field to the specified user’s
authorized_keys file on that machine.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
506
Using Backup and Restore
Creating Backup Profiles
With this option cleared, the system stores temporary files used during the backup on the remote server; temporary files
are not stored on the remote server when this option is selected.
Tip Cisco recommends that you periodically save backups to a remote location so the appliance can be restored in
case of system failure.
You can modify or delete the backup profile by selecting Configuration > ASA FirePOWER Configuration > Tools
> Backup/Restore, then clicking Backup Profiles. See Creating Backup Profiles, on page 507 for more information.
Tip When you create a backup file as described in Creating Backup Files, on page 506, a backup profile is
automatically created.
Step 1 Select Configuration > ASA FirePOWER Configuration > Tools > Backup/Restore.
The Backup Management page appears.
Step 4 Type a name for the backup profile. You can use alphanumeric characters, punctuation, and spaces.
Step 5 Configure the backup profile according to your needs.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
507
Using Backup and Restore
Uploading Backups from a Local Host
See Creating Backup Files, on page 506 for more information about the options on this page.
Tip You cannot upload a backup larger than 4GB from your local host. As an alternative, copy the backup via
SCP to a remote host and retrieve it from there.
Step 1 Select Configuration > ASA FirePOWER Configuration > Tools > Backup/Restore.
The Backup Management page appears.
Step 3 Click Choose File and navigate to the backup file you want to upload.
After you select the file to upload, click Upload Backup.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
508
Using Backup and Restore
Restoring the Appliance from a Backup File
Caution Do not restore backups created on virtual Firepower Management Centers to physical Firepower Management
Centers — this may stress system resources. If you must restore a virtual backup on a physical Firepower
Management Center, contact Support.
If your backup file contains PKI objects, private keys associated with internal CA and internal certificate
objects are reencrypted on upload with a randomly generated key.
If you use local storage, backup files are saved to /var/sf/backup , which is listed with the amount of disk
space used in the /var partition at the bottom of the Backup Management page.
Note If you add licenses after a backup has completed, these licenses will not be removed or overwritten if this
backup is restored. To prevent a conflict on restore, remove those licenses before restoring the backup, noting
where the licenses were used, and add and reconfigure them after restoring the backup. If a conflict occurs,
contact Support.
The following table describes each column and icon on the Backup Management page.
Functionality Description
System Information The originating appliance name, type, and version. Note that you can only restore a
backup to an identical appliance type and version.
Date Created The date and time that the backup file was created
VDB Version The build of the vulnerability database (VDB) running on the appliance at the time of
backup.
View Click the name of the backup file to view a list of the files included in the compressed
backup file.
Restore Click with the backup file selected to restore it on the appliance. If your VDB version
does not match the VDB version in the backup file, this option is disabled.
Download Click with the backup file selected to save it to your local computer.
Move When you have a previously created local backup selected, click to send the backup to
the designated remote backup location.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
509
Using Backup and Restore
Restoring the Appliance from a Backup File
Step 1 Select Configuration > ASA FirePOWER Configuration > Tools > Backup/Restore.
The Backup Management page appears.
Step 2 To view the contents of a backup file, click the name of the file.
The manifest appears, listing the name of each file, its owner and permissions, and its file size and date.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
510
APPENDIX A
Generating Troubleshooting Files
In some cases, if you have a problem with your appliance, Support may ask you to generate troubleshooting
files to help them diagnose the problem. You can select any of the options listed in the following table to
customize the troubleshooting data that the ASA FirePOWER module reports.
Snort Performance and Configuration data and configuration settings related to Snort on the appliance
Hardware Performance and Logs data and logs related to the performance of the appliance hardware
System Configuration, Policy, and Logs configuration settings, data, and logs related to the current system configuration of
the appliance
Detection Configuration, Policy, and Logs configuration settings, data, and logs related to detection on the appliance
Interface and Network Related Data configuration settings, data, and logs related to inline sets and network configuration
of the appliance
Discovery, Awareness, VDB Data, and Logs configuration settings, data, and logs related to the current discovery and awareness
configuration on the appliance
Upgrade Data and Logs data and logs related to prior upgrades of the appliance
All Database Data all database-related data that is included in a troubleshoot report
Note that some options overlap in terms of the data they report, but the troubleshooting files will not contain
redundant copies, regardless of what options you select.
• Generating Appliance Troubleshooting Files, on page 512
• Downloading Troubleshooting Files, on page 512
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
511
Generating Troubleshooting Files
Generating Appliance Troubleshooting Files
Step 1 In ASDM, select Configuration > ASA FirePOWER Configuration > Tools > Troubleshooting.
Step 2 Click Generate Troubleshooting Files.
The Troubleshooting Options pop-up window appears.
Step 3 Select All Data to generate all possible troubleshooting data, or select individual check boxes to customize your report.
For more information, see the Table 96: Selectable Troubleshoot Options , on page 511 table.
Step 4 Click OK.
The ASA FirePOWER module generates the troubleshooting files. You can monitor the file generation process in the
task queue (Monitoring > ASA FirePOWER Monitoring > Task Status).
Step 5 Continue with the procedure in the next section, Downloading Troubleshooting Files, on page 512.
Step 1 In ASDM, select Monitoring > ASA FirePOWER Monitoring > Task Status.
The Task Status page appears.
Step 2 Find the task that corresponds to the troubleshooting files you generated.
Step 3 After the appliance generates the troubleshooting files and the task status changes to Completed , click Click to retrieve
generated files.
Step 4 Follow your browser’s prompts to download the files.
The files are downloaded in a single .tar.gz file.
Step 5 Follow the directions from Support to send the troubleshooting files to Cisco.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
512
APPENDIX B
Importing and Exporting Configurations
You can use the Import/Export feature to copy several types of configurations, including policies, from one
appliance to another appliance of the same type. Configuration import and export is not intended as a backup
tool, but can be used to simplify the process of adding new ASA FirePOWER modules.
You can import and export the following configurations:
• Access control policies and their associated network analysis, SSL, and file policies
• Intrusion policies
• System policies
• Alert responses
To import an exported configuration, both ASA FirePOWER modules must be running the same software
version. To import an exported intrusion or access control policy, the rule update versions on both appliances
must also match.
Note You can import policies exported from an ASA with FirePOWER services device managed by ASDM into
a device managed by Firepower Management Center, provided the versions match.
Exporting Configurations
License: Any
You can export a single configuration, or you can export a set of configurations (of the same type or of different
types) at once. When you later import the package onto another appliance, you can choose which configurations
in the package to import.
When you export a configuration, the appliance also exports revision information for that configuration. The
ASA FirePOWER module uses that information to determine whether you can import that configuration onto
another appliance; you cannot import a configuration revision that already exists on an appliance.
In addition, when you export a configuration, the appliance also exports system configurations that the
configuration depends on.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
513
Importing and Exporting Configurations
Importing and Exporting Configurations
Tip Many list pages in the ASA FirePOWER module include an export icon next to list items. Where this icon is
present, you can use it as a quick alternative to the export procedure that follows.
If an access control policy that you export, or the SSL policy it invokes, contains rules that reference geolocation
data, the importing module’s geolocation database (GeoDB) update version is used.
• Intrusion policies — Intrusion policies include a variety of components that you can configure to inspect
your network traffic for intrusions and policy violations. These components are intrusion rules that inspect
the protocol header values, payload content, and certain packet size characteristics, and other advanced
settings.
Exporting an intrusion policy exports all settings for the policy. For example, if you choose to set a rule to
generate events, or if you set SNMP alerting for a rule, or if you turn on the sensitive data preprocessor in a
policy, those settings remain in place in the exported policy. Custom rules, custom rule classifications, and
user-defined variables are also exported with the policy.
Note that if you export an intrusion policy that uses a layer that is shared by a second intrusion policy, that
shared layer is copied into the policy you are exporting and the sharing relationship is broken. When you
import the intrusion policy on another appliance, you can edit the imported policy to suit your needs, including
deleting, adding, and sharing layers.
If you export an intrusion policy from one ASA FirePOWER module to another, the imported policy may
behave differently if the second ASA FirePOWER module has differently configured default variables.
Note You cannot use the Import/Export feature to update rules created by the Vulnerability Research Team (VRT).
Instead, download and apply the latest rule update version; see Importing Rule Updates and Local Rule Files,
on page 485.
• System policies — A system policy controls the aspects of an ASA FirePOWER module that are likely
to be similar to other ASA FirePOWER modules in your deployment, including time settings, SNMP
settings, and so on.
Note Depending on the number of configurations being exported and the number of objects those configurations
reference, the export process may take several minutes.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
514
Importing and Exporting Configurations
Importing Configurations
Step 1 Make sure that the ASA FirePOWER module where you are exporting the configurations and the ASA FirePOWER
module where you plan to import the configurations are running the same version. If you are exporting an intrusion or
access control policy, make sure that the rule update versions match.
If the versions of the ASA FirePOWER module (and, if applicable, the rule update versions) do not match, the import
will fail.
Step 2 Select Configuration > ASA FirePOWER Configuration > Tools > Import Export.
The Import/Export page appears, including a list of the configurations on the ASA FirePOWER module. Note that
configuration categories with no configurations to export do not appear in this list.
Tip You can click the collapse icon next to a configuration type to collapse the list of configurations. Click the
expand folder icon next to an configuration type to reveal configurations.
Step 3 Select the check boxes next to the configurations you want to export and click Export.
Step 4 Follow the prompts to save the exported package to your computer.
Importing Configurations
License: Any
After you export a configuration from an ASA FirePOWER module, you can import it onto a different module
as long as that module supports it.
Depending on the type of configuration you are importing, you should keep the following points in mind:
• You must make sure that the ASA FirePOWER module where you import a configuration is running the
same version as the ASA FirePOWER module you used to export the configuration. If you are importing
an intrusion or access control policy, the rule update versions on both appliances must also match. If the
versions do not match, the import will fail.
Note You can import policies exported from an ASA with FirePOWER services device managed by ASDM into
a device managed by Firepower Management Center, provided the versions match.
• If you import an access control policy that evaluates traffic based on zones, you must map the zones in
the imported policy to zones on the importing ASA FirePOWER module. When you map zones, their
types must match. Therefore, you must create any zone types you need on the importing ASA FirePOWER
module before you begin the import. For more information about security zones, see Working with
Security Zones, on page 49.
• If you import an access control policy that includes an object or object group that has an identical name
to an existing object or group, you must rename the object or group.
• If you import an access control policy or an intrusion policy, the import process replaces existing default
variables in the default variable set with the imported default variables. If your existing default variable
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
515
Importing and Exporting Configurations
Importing and Exporting Configurations
set contains a custom variable not present in the imported default variable set, the unique variable is
preserved.
• If you import an intrusion policy that used a shared layer from a second intrusion policy, the export
process breaks the sharing relationship and the previously shared layer is copied into the package. In
other words, imported intrusion policies do not contain shared layers.
Note You cannot use the Import/Export feature to update rules created by the Vulnerability Research Team (VRT).
Instead, download and apply the latest rule update version; see Importing Rule Updates and Local Rule Files,
on page 485.
Because you can export several configurations in a single package, when you import the package you must
choose which configurations in the package to import.
When you attempt to import a configuration, your ASA FirePOWER module determines whether that
configuration already exists on the appliance. If a conflict exists, you can:
• keep the existing configuration,
• replace the existing configuration with a new configuration,
• keep the newest configuration, or
• import the configuration as a new configuration.
If you import a configuration and then later make a modification to the configuration on the destination system,
and then re-import the configuration, you must choose which version of the configuration to keep.
Depending on the number of configurations being imported and the number of objects those configurations
reference, the import process may take several minutes.
To import one or more configurations:
Step 1 Make sure that the ASA FirePOWER module where you are exporting the configurations and the module where you
plan to import the configurations are running the same version. If you want to import an intrusion or access control
policy, you must also make sure that the rule update versions match.
If the versions of the ASA FirePOWER module (and, if applicable, the rule update versions) do not match, the import
will fail.
Step 2 Export the configurations you want to import; see Exporting Configurations, on page 513.
Step 3 On the appliance where you want to import the configurations, select Configuration > ASA FirePOWER
Configuration > Tools > Import Export.
The Import Export page appears.
Tip Click the collapse icon next to a configuration type to collapse the list of configurations. Click the expand
folder icon next to a configuration type to reveal configurations.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
516
Importing and Exporting Configurations
Importing and Exporting Configurations
Step 7 Select the configurations you want to import and click Import.
The import process resolves, with the following results:
• If the configurations you import do not have previous revisions on your ASA FirePOWER module, the import
completes automatically and a success message appears. Skip the rest of the procedure.
• If you are importing an access control policy that includes security zones, the Access Control Import Resolution
page appears. Continue with step 8.
• If the configurations you import do have previous revisions on your appliance, the Import Resolution page appears.
Continue with step 9.
Step 8 Next to each incoming security zone, select an existing local security zone of a matching type to map to and click
Import.
Return to step 7.
If you are importing an access control policy that includes a file policy with either the clean list or custom detection
list enabled, the Import as new option is not available.
• If you are importing an access control policy or saved search that includes a dependent object, either accept the
suggested name or rename the object. The system always imports these dependent objects as new. You do not
have the option to keep or to replace existing objects. Note that the system treats objects and object groups in the
same manner.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
517
Importing and Exporting Configurations
Importing and Exporting Configurations
What to do next
After importing an access control policy with Security Intelligence feeds, you must update the Security
Intelligence feeds and wait for the latest data to be downloaded before deploying the policy. Feed contents
are not part of the export or import process, and this ensures that the latest feeds are always used.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
518
APPENDIX C
Viewing the Status of Long-Running Tasks
Some tasks that you can perform on the ASA FirePOWER module, such as applying a policy or installing
updates, do not complete instantly and require some time to run.
You can check the progress of these long-running tasks in the task queue. The task queue also reports when
they are successfully or unsuccessfully resolved.
• Viewing the Task Queue, on page 519
• Managing the Task Queue, on page 520
Waiting The number of tasks waiting for an in-progress task to complete before running.
Retrying The number of tasks that are automatically retrying. Note that not all tasks are permitted to try
again.
Stopped The number of tasks that were interrupted due to a system update. Stopped tasks cannot be
resumed; you must manually delete them from the task queue.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
519
Viewing the Status of Long-Running Tasks
Managing the Task Queue
The Jobs section provides information about each task, including a brief description, when the task was
launched, the current status of the task, and when the status last changed. Tasks of the same type appear
together in a task group.
To make sure that the Task Status page loads quickly, once per week, the ASA FirePOWER module removes
from the queue all completed, failed, and stopped tasks that are over a month old, as well the oldest tasks from
any task group that contains over 1000 tasks. You can also manually remove tasks from the queue; see
Managing the Task Queue, on page 520 for directions.
To view the task queue:
remove all completed tasks from the task queue click Remove Completed Jobs.
remove all failed tasks from the task queue click Remove Failed Jobs.
remove a single task from the task queue click the delete icon ( ) next to the task you want to delete.
Note that you cannot delete a running task. If you need to delete a running task (for
example, if a task repeatedly fails), contact Support.
collapse a task group and hide tasks click the open folder icon ( ) next to the expanded task group.
expand a task group and view tasks click the closed folder icon ( ) next to the collapsed task group.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
520
APPENDIX D
Security, Internet Access, and Communication
Ports
To safeguard the ASA FirePOWER module, you should install it on a protected internal network. Although
the ASA FirePOWER module is configured to have only the necessary services and ports available, you must
make sure that attacks cannot reach it from outside the firewall.
Also note that specific features of the ASA FirePOWER module require an Internet connection. By default,
the ASA FirePOWER module is configured to directly connect to the Internet. Additionally, the system
requires certain ports remain open for secure appliance access and so that specific system features can access
the local or Internet resources to operate correctly.
• Internet Access Requirements, on page 521
• Communication Ports Requirements, on page 522
intrusion rule, VDB, and GeoDB download or schedule the download of a intrusion rule, GeoDB, or
updates VDB update directly to an appliance.
Security Intelligence filtering download Security Intelligence feed data from an external source,
including the Intelligence Feed.
system software updates download or schedule the download of a system update directly to an
appliance.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
521
Security, Internet Access, and Communication Ports
Communication Ports Requirements
URL filtering download cloud-based URL category and reputation data for access
control, and perform lookups for uncategorized URLs.
database.brightcloud.com
service.brightcloud.com
In general, feature-related ports remain closed until you enable or configure the associated feature.
Caution Do not close an open port until you understand how this action will affect your deployment.
For example, closing port 25/tcp (SMTP) outbound on a manage device blocks the device from sending email
notifications for individual intrusion events (see Configuring External Alerting for Intrusion Rules, on page
421).
The following table lists the open ports required so that you can take full advantage of ASA FirePOWER
module features.
Table 100: Default Communication Ports for ASA FirePOWER module Features and Operations
25/tcp SMTP Outbound send email notices and alerts from the appliance.
161/udp SNMP Bidirectional allow access to an appliance’s MIBs via SNMP polling.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
522
Security, Internet Access, and Communication Ports
Security, Internet Access, and Communication Ports
389/tcp LDAP Outbound communicate with an LDAP server for external authentication.
636/tcp
8307/tcp host input client Bidirectional communicate with a host input client.
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
523
Security, Internet Access, and Communication Ports
Security, Internet Access, and Communication Ports
Cisco ASA with FirePOWER Services Local Management Configuration Guide, Version 6.7
524