Logging into the Firepower System

Similar documents
User Accounts for Management Access

Using the Command Line Interface (CLI)

Platform Settings for Classic Devices

System Configuration. The following topics explain how to configure system configuration settings on Firepower Management Centers and managed devices:

The following topics explain how to get started configuring Firepower Threat Defense. Table 1: Firepower Device Manager Supported Models

Device Management Basics

Device Management Basics

User Identity Sources

Configuration Import and Export

Realms and Identity Policies

Clientless SSL VPN End User Set-up

Configuration Import and Export

Licensing the Firepower System

Updating to Version 6.2.2

AAA and the Local Database

Realms and Identity Policies

Firepower extensible Operating System (FXOS) 2.2: Chassis Authentication and Authorization for remote management with ACS using RADIUS

Managing GSS Devices from the GUI

User Identity Sources

Device Management Basics

Administration of Cisco WLC

Administration of Cisco WLC

Manage Administrators and Admin Access Policies

Backup and Restore Introduction

Security, Internet Access, and Communication Ports

Security, Internet Access, and Communication Ports

Security, Internet Access, and Communication Ports

Realms and Identity Policies

Licensing the Firepower System

Connection Logging. About Connection Logging

The following topics describe how to use backup and restore features in the Firepower System:

Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2

Licensing the Firepower System

Manage Administrators and Admin Access Policies

Getting Started with Access Control Policies

The following topics describe how to manage various policies on the Firepower Management Center:

The following topics describe how to work with reports in the Firepower System:

The following topics describe how to use dashboards in the Firepower System:

Management Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections:

Connection Logging. Introduction to Connection Logging

Task Scheduling. Introduction to Task Scheduling. Configuring a Recurring Task

NBAR2 HTTP-Based Visibility Dashboard

The following topics describe how to audit activity on your system:

Working with Reports

Setting Up the Sensor

Remote Access VPN. Remote Access VPN Overview. Licensing Requirements for Remote Access VPN

Security, Internet Access, and Communication Ports

Host Identity Sources

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Getting Started. Access the Console for the Command-Line Interface. Access the Appliance Console

Clientless SSL VPN Remote Users

Configuring Management Access

Cisco Threat Intelligence Director (TID)

Overview of the Cisco NCS Command-Line Interface

Cisco Firepower Troubleshoot File Generation Procedures

Manage Administrators and Admin Access Policies

Getting Started. Task Flow. Initial Configuration. Task Flow, on page 1 Initial Configuration, on page 1 Accessing the FXOS CLI, on page 4

Cisco NAC Profiler UI User Administration

Prefiltering and Prefilter Policies

Configuring Security Features on an External AAA Server

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)

Cisco Threat Intelligence Director (TID)

Classic Device Management Basics

New Features and Functionality

Configuring Local Authentication and Authorization

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Getting Started. About the ASA for Firepower How the ASA Works with the Firepower 2100

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

Command Line Reference

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

DNS Policies. DNS Policy Overview. The following topics explain DNS policies, DNS rules, and how to deploy DNS policies to managed devices.

ISE TACACS+ Configuration Guide for Cisco ASA. Secure Access How-to User Series

Remote Access VPN. Remote Access VPN Overview. Maximum Concurrent VPN Sessions By Device Model

External Alerting for Intrusion Events

Persistent Data Transfer Procedure

Deploy the ExtraHop Trace 6150 Appliance

System Software Updates

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Before You Update: Important Notes

Licensing the Application CHAPTER

DoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel

The following topics describe how to configure correlation policies and rules.

File Reputation Filtering and File Analysis

Searching for Events. Event Searches. The following topics describe how to search for events within a workflow:

FortiDeceptor - Administration Guide. Version 1.0.1

Deployment of FireSIGHT Management Center on VMware ESXi

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Contents. Introduction

CLI users are not listed on the Cisco Prime Collaboration User Management page.

Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers

File Policies and AMP for Firepower

Managing CX Devices in Multiple Device Mode

Firepower Threat Defense Remote Access VPNs

Monitoring the Device

Configuring Authentication, Authorization, and Accounting

Notify End-Users of Proxy Actions

SAS Viya 3.3 Administration: Identity Management

Firepower Management Center High Availability

Transcription:

The following topics describe how to log into the Firepower System: Firepower System User Accounts, on page 1 User Interfaces in Firepower Management Center Deployments, on page 3 Logging Into the Firepower Management Center Web Interface, on page 6 Logging Into the Web Interface of a 7000 or 8000 Series Device, on page 7 Logging Into the Firepower Management Center with CAC Credentials, on page 7 Logging Into a 7000 or 8000 Series Device with CAC Credentials, on page 8 Logging Into the Command Line Interface on Classic Devices, on page 9 Logging Into the Command Line Interface on Firepower Threat Defense Devices, on page 10 Viewing Basic System Information in the Web Interface, on page 11 Switching Domains on the Firepower Management Center, on page 11 Logging Out of a Firepower System Web Interface, on page 12 The Context Menu, on page 12 Firepower System User Accounts You must provide a username and password to obtain local access to the web interface, shell, or CLI on an appliance. The features you can access on login are controlled by the privileges granted to your user account. Some appliances can be configured to use external authorization, storing user credentials on an external LDAP or RADIUS server. Note Because the system audits user activity based on user, make sure that users log into the system with the correct account. Caution On all devices, users with shell access (whether obtained through external authentication or through using the CLI expert command) have sudoers privileges in the shell, which can present a security risk. If you establish external authentication, make sure that you restrict the list of users with shell access appropriately. Similarly, when granting CLI access privileges, restrict the list of users with Configuration level access. 1

Firepower System User Accounts Caution We strongly recommend that you do not access Firepower devices using the shell or CLI expert mode, unless directed by Cisco TAC. Different devices support different types of user, each with different capabilities. Firepower Management Centers Firepower Management Centers support the following user account types: A pre-defined admin account for web interface access, which has the administrator role and can be managed through the web interface. A pre-defined admin account for shell access, which has sudoers priviliges. Custom user, which admin users and users with the administrator role can create and manage. Caution For system security reasons, Cisco strongly recommends that you not establish additional shell users on the Firepower Management Center. If you accept that risk, you can use external authentication to grant any user shell access to the Firepower Management Center. You cannot enable shell access for internal users. 7000 & 8000 Series Devices 7000 & 8000 Series devices support the following user account types: A pre-defined admin account which can be used for all forms of access to the device. Custom user, which admin users and users with the administrator role can create and manage. The 7000 & 8000 Series supports external authentication for users. NGIPSv Devices NGIPSv devices support the following user account types: A pre-defined admin account which can be used for all forms of access to the device. Custom user, which admin users and users with Configuration access can create and manage. The NGIPSv does not support external authentication for users. Firepower Threat Defense and Firepower Threat Defense Virtual Devices Firepower Threat Defense and Firepower Threat Defense Virtual devices support the following user account types: A pre-defined admin account which can be used for all forms of access to the device. Custom user, which admin users and users with Configuration access can create and manage. The Firepower Threat Defense does not support external authentication for SSH or HTTP users. 2

User Interfaces in Firepower Management Center Deployments ASA FirePOWER Devices The ASA FirePOWER module supports the following user account type: A pre-defined admin account. Custom user, which admin users and users with Configuration access can create and manage. The ASA FirePOWER module does not support external authentication for users. ing ASA devices via the ASA CLI and ASDM is described in the Cisco ASA Series General Operations CLI Configuration Guide and the Cisco ASA Series General Operations ASDM Configuration Guide. User Interfaces in Firepower Management Center Deployments Depending on type, you can access Firepower appliances using a web-based GUI, auxiliary CLI, or the Linux shell. In a Firepower Management Center deployment, you perform most configuration tasks from the Firepower Management Center's GUI. Only a few tasks require that you access the device directly. For information on browser requirements, see the Firepower Release Notes. Appliance Web-Based GUI Auxiliary CLI Linux Shell Firepower Management Center Can be used for administrative, management, and analysis tasks None user and custom external user ible using a serial or keyboard and monitor connection Should be used only for administration and troubleshooting directed by Cisco TAC 3

User Interfaces in Firepower Management Center Deployments Appliance Web-Based GUI Auxiliary CLI Linux Shell 7000 & 8000 Series devices Can be used for initial setup, basic analysis, and configuration tasks only ible using an SSH connection Can be used for setup and troubleshooting directed by Cisco TAC ible by CLI users with Configuration access using the expert command Should be used only for administration and troubleshooting directed by Cisco TAC Firepower Threat Defense Firepower Threat Defense Virtual None ible using an SSH connection Can be used for setup and troubleshooting directed by Cisco TAC ible by CLI users with Configuration access using the expert command Should be used only for administration and troubleshooting directed by Cisco TAC NGIPSv None ible using an SSH connection Can be used for setup and troubleshooting directed by Cisco TAC ible by CLI users with Configuration access using the expert command Should be used only for administration and troubleshooting directed by Cisco TAC 4

Web Interface Considerations Appliance Web-Based GUI Auxiliary CLI Linux Shell ASA FirePOWER module None None ible using an SSH connection Can be used for configuration and management tasks Web Interface Considerations Session Timeout If your organization uses Common Cards (CACs) for authentication, you can use your CAC credentials to obtain access to the web interface of an appliance. The first time you visit the appliance home page during a web session, you can view information about your last login session for that appliance. You can see the following information about your last login: the day of the week, month, date, and year of the login the appliance-local time of the login in 24-hour notation the host and domain name last used to access the appliance The menus and menu options listed at the top of the default home page are based on the privileges for your user account. However, the links on the default home page include options that span the range of user account privileges. If you click a link that requires different privileges from those granted to your account, the system displays a warning message and logs the activity. Some processes that take a significant amount of time may cause your web browser to display a message that a script has become unresponsive. If this occurs, make sure you allow the script to continue until it finishes. Specifying Your Home Page By default, the Firepower System automatically logs you out of a session after 1 hour of inactivity, unless you are otherwise configured to be exempt from session timeout. Users with the Administrator role can change the session timeout interval for an appliance via the following settings: Appliance Firepower Management Center 7000 & 8000 Series devices Setting System > Configuration > Shell Timeout Devices > Platform Settings > Shell Timeout 5

Logging Into the Firepower Management Center Web Interface Configuring Session Timeouts Logging Into the Firepower Management Center Web Interface Management Center Users are restricted to a single active session. If you try to log in with a user account that already has an active session, the system prompts you to terminate the other session or log in as a different user. Before you begin If you do not have access to the web interface, contact your system administrator to modify your account privileges, or log in as a user with Administrator access and modify the privileges for the account. Create user as described in Creating a User Account. Step 1 Step 2 Direct your browser to https://hostname/, where hostname corresponds to the host name of the Firepower Management Center. In the Username and Password fields, enter your user name and password. Pay attention to the following guidelines: User names are not case-sensitive. In a multidomain deployment, prepend the user name with the domain where your user account was created. You are not required to prepend any ancestor domains. For example, if your user account was created in SubdomainB, which has an ancestor DomainA, enter your user name in the following format: SubdomainB\username If your organization uses SecurID tokens when logging in, append the token to your SecurID PIN and use that as your password to log in. For example, if your PIN is 1111 and the SecurID token is 222222, enter 1111222222. You must have already generated your SecurID PIN before you can log into the Firepower System. Step 3 Click Login. Session Timeout, on page 5 6

Logging Into the Web Interface of a 7000 or 8000 Series Device Logging Into the Web Interface of a 7000 or 8000 Series Device 7000 & 8000 Series Users are restricted to a single active session. If you try to log in with a user account that already has an active session, the system prompts you to terminate the other session or log in as a different user. Before you begin If you do not have access to the web interface, contact your system administrator to modify your account privileges, or log in as a user with Administrator access and modify the privileges for the account. Complete the initial setup process and create user as described in the Firepower getting started guide appropriate to the device, and Creating a User Account. Step 1 Step 2 Direct your browser to https://hostname/, where hostname corresponds to the host name of the managed device you want to access. In the Username and Password fields, enter your user name and password. Pay attention to the following guidelines: User names are not case-sensitive. If your organization uses SecurID tokens when logging in, append the token to your SecurID PIN and use that as your password to log in. For example, if your PIN is 1111 and the SecurID token is 222222, enter 1111222222. You must have already generated your SecurID PIN before you can log into the Firepower System. Step 3 Click Login. Session Timeout, on page 5 Logging Into the Firepower Management Center with CAC Credentials Management Center Users are restricted to a single active session. 7

Logging Into a 7000 or 8000 Series Device with CAC Credentials Caution Do not remove a CAC during an active browsing session. If you remove or replace a CAC during a session, your web browser terminates the session and the system logs you out of the web interface. Before you begin If you do not have access to the web interface, contact your system administrator to modify your account privileges, or log in as a user with Administrator access and modify the privileges for the account. Create user as described in the Creating a User Account. Configure CAC authentication and authorization as described in Configuring CAC Authentication. Step 1 Step 2 Insert a CAC as instructed by your organization. Direct your browser to https://hostname/, where hostname corresponds to the host name of the Firepower Management Center. Step 3 If prompted, enter the PIN associated with the CAC you inserted in step 1. Step 4 Step 5 If prompted, choose the appropriate certificate from the drop-down list. Click Continue. CAC Authentication Session Timeout, on page 5 Logging Into a 7000 or 8000 Series Device with CAC Credentials 7000 & 8000 Series Users are restricted to a single active session. Caution Do not remove a CAC during an active browsing session. If you remove or replace a CAC during a session, your web browser terminates the session and the system logs you out of the web interface. Before you begin If you do not have access to the web interface, contact your system administrator to modify your account privileges, or log in as a user with Administrator access and modify the privileges for the account. Create user as described in Creating a User Account. 8

Logging Into the Command Line Interface on Classic Devices Configure CAC authentication and authorization as described in Configuring CAC Authentication. Step 1 Step 2 Insert a CAC as instructed by your organization. Direct your browser to https://hostname/, where hostname corresponds to the host name of the appliance you want to access. Step 3 If prompted, enter the PIN associated with the CAC you inserted in step 1. Step 4 Step 5 If prompted, choose the appropriate certificate from the drop-down list. Click Continue. CAC Authentication Session Timeout, on page 5 Logging Into the Command Line Interface on Classic Devices 7000 and 8000 Series CLI Basic Configuration ASA FirePOWER NGIPSv You can log directly into the command line interface on Classic managed devices (7000 & 8000 Series, NGIPSv, and ASA FirePOWER). Before you begin Complete the initial setup process using the default admin user for the initial login. For the 7000 & 8000 Series devices, create user at the web interface as described in Creating a User Account. For all devices, create additional user that can log into the CLI using the configure user add command. Step 1 Step 2 Step 3 Use SSH to connect to the hostname or IP address of the management interface. Alternatively, you can connect to the console port. At the login as: command prompt, enter your user name and press Enter. At the Password: prompt, enter your password and press Enter. 9

Logging Into the Command Line Interface on Firepower Threat Defense Devices If your organization uses SecurID tokens when logging in, append the token to your SecurID PIN and use that as your password to log in. For example, if your PIN is 1111 and the SecurID token is 222222, enter 1111222222. You must have already generated your SecurID PIN before you can log into the Firepower System. Step 4 At the CLI prompt, use any of the commands allowed by your level of command line access. Logging Into the Command Line Interface on Firepower Threat Defense Devices Firepower Threat Defense CLI Basic Configuration You can log directly into the command line interface on Firepower Threat Defense managed devices. Before you begin Complete the initial setup process using the default admin user for the initial login. Create additional user that can log into the CLI using the configure user add command. Step 1 Connect to the Firepower Threat Defense CLI, either from the console port or using SSH. You can SSH to the management interface of the Firepower Threat Defense device. You can also connect to the address on a data interface if you open the interface for SSH connections. SSH access to data interfaces is disabled by default. See Configure Secure Shell to allow SSH connections to specific data interfaces. You can directly connect to the Console port on the device. Use the console cable included with the device to connect your PC to the console using a terminal emulator set for 9600 baud, 8 data bits, no parity, 1 stop bit, no flow control. See the hardware guide for your device for more information about the console cable. The initial CLI you access on the Console port differs by device type. ASA Series devices The CLI on the Console port is the regular Firepower Threat Defense CLI. Firepower Series devices The CLI on the Console port is FXOS. You can get to the Firepower Threat Defense CLI using the connect ftd command. Use the FXOS CLI for chassis-level configuration and troubleshooting only. Use the Firepower Threat Defense CLI for basic configuration, monitoring, and normal system troubleshooting. See the FXOS documentation for information on FXOS commands. Step 2 Step 3 Step 4 Log in with the Admin username and password. At the CLI prompt (>), use any of the commands allowed by your level of command line access. (Optional) the diagnostic CLI: system support diagnostic-cli 10

Viewing Basic System Information in the Web Interface Use this CLI for advanced troubleshooting. This CLI includes additional show and other commands, including the session wlan console command needed to enter the CLI for the wireless access point on an ASA 5506W-X. This CLI has two sub-modes: user EXEC and privileged EXEC mode. More commands are available in privileged EXEC mode. To enter privileged EXEC mode, enter the enable command; press enter without entering a password when prompted. Example: > system support diagnostic-cli firepower> enable Password: firepower# To return to the regular CLI, type Ctrl-a, d. Viewing Basic System Information in the Web Interface The About page displays information about your appliance, including the model, serial number, and version information for various components of the Firepower System. It also includes Cisco copyright information. Step 1 Step 2 Click Help in the toolbar at the top of the page. Choose About. Switching Domains on the Firepower Management Center Supported Device Management Center In a multidomain deployment, user role privileges determine which domains a user can access and which privileges the user has within each of those domains. You can associate a single user account with multiple domains and assign different privileges for that user in each domain. For example, you can assign a user read-only privileges in the Global domain, but Administrator privileges in a descendant domain. Users associated with multiple domains can switch between domains within the same web interface session. Under your user name in the toolbar, the system displays a tree of available domains. The tree: 11

Logging Out of a Firepower System Web Interface Displays ancestor domains, but may disable access to them based on the privileges assigned to your user account. Hides any other domain your user account cannot access, including sibling and descendant domains. When you switch to a domain, the system displays: Data that is relevant to that domain only. Menu options determined by the user role assigned to you for that domain. From the drop-down list under your user name, choose the domain you want to access. Logging Out of a Firepower System Web Interface When you are no longer actively using a Firepower System web interface, Cisco recommends that you log out, even if you are only stepping away from your web browser for a short period of time. Logging out ends your web session and ensures that no one can use the interface with your credentials. From the drop-down list under your user name, choose Logout. Session Timeout, on page 5 The Context Menu Certain pages in the Firepower System web interface support a right-click (most common) or left-click context menu that you can use as a shortcut for accessing other features in the Firepower System. The contents of the context menu depend where you access it not only the page but also the specific data. For example: IP address hotspots provide information about the host associated with that address, including any available whois and host profile information. SHA-256 hash value hotspots allow you to add a file s SHA-256 hash value to the clean list or custom detection list, or view the entire hash value for copying. 12

The Context Menu On pages or locations that do not support the Firepower System context menu, the normal context menu for your browser appears. Policy Editors Many policy editors contain hotspots over each rule. You can insert new rules and categories; cut, copy, and paste rules; set the rule state; and edit the rule. Intrusion Rules Editor The intrusion rules editor contains hotspots over each intrusion rule. You can edit the rule, set the rule state, configure thresholding and suppression options, and view rule documentation. Event Viewer Event pages (the drill-down pages and table views available under the Analysis menu) contain hotspots over each event, IP address, URL, DNS query, and certain files SHA-256 hash values. While viewing most event types, you can: View related information in the Context Explorer. Drill down into event information in a new window. View the full text in places where an event field contains text too long to fully display in the event view, such as a file s SHA-256 hash value, a vulnerability description, or a URL. While viewing connection events, you can add items to the default Security Intelligence whitelists and blacklists: An IP address, from an IP address hotspot. A URL or domain name, from a URL hotspot. A DNS query, from a DNS query hotspot. While viewing captured files, file events, and malware events, you can: Add a file to or remove a file from the clean list or custom detection list. Download a copy of the file. View nested files inside an archive file. Download the parent archive file for a nested file. View the file composition. Submit the file for local malware and dynamic analysis. While viewing intrusion events, you can perform similar tasks to those in the intrusion rules editor or an intrusion policy: Edit the triggering rule. Set the rule state, including disabling the rule. Configure thresholding and suppression options. View rule documentation. 13

The Context Menu Intrusion Event Packet View Intrusion event packet views contain IP address hotspots. The packet view uses a left-click context menu. Dashboard Many dashboard widgets contain hotspots to view related information in the Context Explorer. Dashboard widgets can also contain IP address and SHA-256 hash value hotspots. Context Explorer The Context Explorer contains hotspots over its charts, tables, and graphs. If you want to examine data from graphs or lists in more detail than the Context Explorer allows, you can drill down to the table views of the relevant data. You can also view related host, user, application, file, and intrusion rule information. The Context Explorer uses a left-click context menu, which also contains filtering and other options unique to the Context Explorer. Security Intelligence Lists and Feeds 14