
Practicals & Notes by CCDE #20240056
Practicals & Notes by CCDE #20240056
Cisco ISE is an application developed on top of Cisco ADE-OS (Application Development Engine). Because of that, it cannot be accessed through it's CLI. When we log in to the so called ISE CLI, it's actually the ADE-OS CLI where we can configure interface IPs, routing etc. Also we use that interface to see the status of the Cisco ISE application by the following famous command, show application status ise.
So the CLI admin account has nothing to do with the ISE application admin account.
This CLI admin account password is asked to change during the initial login to the device. If you want to change it later on, use the following command,
password
Confusion comes with the account name "admin" is being same for the ISE default application but with a password you need to set additionally with the following command,
application reset-passwd ise admin
Use this admin account/password to log in to the ISE through Web UI.
There are many policies we hear when we deal with Cisco FMC which makes it confusing where to find and where to apply. In this post, I'm going to make a brief note on all of them and and their interrelationship.
Policies are reusable set of rules/conditions. The different kinds of policies in FMC are Access Control Policy, Intrusion Policy, Malware & File Policy, DNS Policy, Identity Policy, SSL Policy, Prefilter Policy, Network Analysis Policy, Network Discovery Policy, NAT Policy, QoS Policy, Settings Policy, Correlation Policy and Health Policy. 😵 I think I named all..
Following are short descriptions for the above rules.
Access Control Policy - From all of above, the Access Control Policy (ACP) is the main type of policy which most of other policies are packaged in.
1 FTD can only have 1 Access Control Policy
Access Control Policy rules have it's legacy firewall rule functionality with added next-generation features which are defined in most of other types of polices.
Intrusion Policy - This defines set of intrusion detection and prevention configurations which inspect traffic for security violations and, in inline deployments, can block or alter malicious traffic.
Malware & File Policy - This is a set of configurations that the system uses to perform malware protection and file control, as part of your overall access control configuration.
DNS Policy - DNS based Security Intelligence allows you to whitelist or blacklist traffic based on the domain name requested by a client.
Identity Policy - Identity policies contain identity rules. Identity rules associate sets of traffic with a realm and an authentication method: passive authentication, active authentication, or no authentication.
This is a requirement when we plan to use the users or group in our Access Control Policy
SSL Policy - An SSL policy determines how the system handles encrypted SSL traffic (https etc) on your network.
Prefilter Policy - This is basically to drop traffic or bypass the firewall inspections totally which is unwanted even to go through the FTD.
Network Analysis Policy - These are for traffic preprocessing options. Cisco is saying that Network analysis-related preprocessing occurs after Security Intelligence blacklisting and SSL decryption, but before intrusion or file inspection begins.
Network Discovery Policy - This is there to identify what are attached to the network.
It is used to build Host Profiles of devices including information like OS, services, web apps, protocols, users, IOC tags, VLAN tags, malware events, vulnerabilities, scan results, hostname, mac address, scan results and much more..
NAT Policy - This is to configure the Network Address Translation settings of a FTD.
QoS Policy - This is to configure the QoS settings for a FTD.
Settings Policy - This is where you configure the basic settings of a FTD like ARP Inspection, Banner etc.
Correlation Policy - This is basically If This --> Then That functionality of the FMC. It can be used to respond in real-time to threats / specific event types/ specific hosts / specific users or network traffic conditions.
Health Policy - This is to monitor overall functionality and performance of the whole Firepower system. So this policy can apply to both FMC itself and to FTDs.
Now let's look the interrelationship of the above polices.
When you click on Policies tab, the 1st menu is the Access Control and the default selection is Access Control menu item. In line to Access Control, you can see Network Discovery and Correlation are there. Those 2 are also types of policies you can configure in FMC which is for FMC.
"in FMC which is for FMC" means the policies used in FMC itself, not to deploy in FTDs..
You can go through it from here. Anyhow I believe one more dedicated post is required to show how we can move back and forth from 3 CLIs.
The 3 CLIs in Cisco FTD are;
1. Converged FTD CLISH (Command Line Interface Shell)
2. Firepower Linux CLI (Snort CLI)
3. LINA (Linux on ASA)
Converged FTD CLISH inherits some Firepower Linux management plane commands and most of the data plane related Cisco ASA commands.
Firepower Linux CLI is just plain Linux access to the Firepower Engine. You will need this to view the Management Plane routing stuff for Cisco FMC.
LINA is just classic Cisco ASA privilege level commands without config mode. This is where the Data Plane routing stuff is in.
I have achieved the same result using Static NAT which can be also called Source NAT / One-to-One bidirectional NAT. Please click here to view that post.
This post is about how we can do the same thing using a destination NAT.
Diagram and IPs are same;
This time, the NAT rule is like the following. (click on the images to view in full size)
Go to Policies > NAT
Both the Source IP and the Destination IP (10.1.1.11) are from OUTSIDE and the Destination IP of the original packet (which the user tries to access) is the public IP for the server which will be translated to the local IP of the server.
The Security Policy is just same as in the Source NAT example.
Go to Policies > Security
Remember that the destination address of the Security Policy here is the public IP,
because:
Security Policy Hits first , then NAT Policy & then Routing..
Though this is a simple concept, I believe it needs a note because it is bit confusing which IP to use in the Firewall Policy. This is the method used in Palo Alto and other perimeter firewalls if you want to give access to an internal server via a public IP to the internet users.
Imagine 10.1.1.10 and 10.1.1.11 are public IPs and 10.1.1.10 is the ip address of the physical interface.
Keep in mind,Security Policy Hits first , then NAT Policy & then Routing..
I am using the following lab topology for configurations but it has very little to do with this discussion.
Converged FTD CLISH can be seen as '>' and it inherits Firepower Linux management plane commands and most of the data plane related Cisco ASA commands.Firepower Linux CLI is just plain Linux access to the Firepower Engine. You will need this to view the Management Plane routing stuff for Cisco FMC.LINA is just classic Cisco ASA privilege level commands without config mode. This is where the Data Plane routing stuff is in.
Well I am going to share my experience of FMC + FTD initial lab setup. You will have to have an EVE-NG server with a lot RAM otherwise it won't work.
If it seems FMC or FTD is booted up but not accepting the credentials all the time, just give it some time and try, it must be still booting.. If it is not connecting and showing database connecting error or something, reboot it and hit enter when the red screen appears..
All rights reserved. Copyright © 2025 by Roshan's Networking Lab powered by Goolgle Blogger
Created by OmTemplates | Distributed By Blogspot Themes