Firewall 7.4 Basic Lab 240709 301 No CTF Final
Firewall 7.4 Basic Lab 240709 301 No CTF Final
• Requirements
• Topology
• Get Started
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101
Cisco Confidential
Cisco dCloud
Requirements
The table below outlines the requirements for this preconfigured demonstration.
dCloud: The Cisco Demo Cloud
Table 1. Requirements
Required Optional
Cisco Firepower is an integrated suite of network security and traffic management products, deployed either on purpose-built
platforms or as a software solution. The system is designed to help you handle network traffic in a way that complies with your
organization’s security policy-your guidelines for protecting your network.
This allows the Cisco Firepower NGFW to evolve with a focus on enabling enterprises to stop, prioritize, understand, and automate
responses to modern threats in real-time. Firepower NGFW is unique in its threat-focus, with a foundation of comprehensive
network visibility, best-of-breed threat intelligence and highly-effective threat prevention to address both known and unknown
threats. Firepower NGFW also enables retrospective security, through Advanced Malware Protection, that can “go back in time” to
quickly find and remediate sophisticated attacks that may have slipped through defenses. This has led to a significant reduction in
time-to-detection (TTD) for Cisco customers compared to industry averages.
In this lab you will build a multi-site network Next Generation Firewall (NGFW) solution at between a corporate and two branch
sites. Using the Firepower Management Console (FMC) you will build High Availability NGFW’s at the corporate site, and manage
a branch. In this lab you will also configure a NGFW using the FDM (Firepower Device Manager). You will also configure remote
access and site to site VPN’s. You will also configure Cisco Threat Intelligence Director to accept and implement third party
updates to your NGFW devices.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 101
Cisco Confidential
Cisco dCloud
Topology
This content includes preconfigured users and components to illustrate the scripted scenarios and features of the solution. Most
dCloud: The Cisco Demo Cloud
components are fully configurable with predefined administrative user accounts. You can see the IP address and user account
credentials to use to access a component by clicking the component icon in the Topology menu of your active session and in the
scenario steps that require their use.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 101
Cisco Confidential
Cisco dCloud
Get Started
For best performance, connect to the workstation with Cisco AnyConnect VPN [Show Me How] and the local RDP client on
dCloud: The Cisco Demo Cloud
your laptop [Show Me How]
NOTE: You can also connect to the workstation using the Cisco dCloud Remote Desktop client [Show Me How]. The dCloud
Remote Desktop client works best for accessing an active session with minimal interaction. However, many users experience
connection and performance issues with this method.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 101
Cisco Confidential
Cisco dCloud
NOTE: Because the equipment you are working with in this lab is hosted in a remote virtual environment in dCloud, there are some
aspects of initial device configuration that are not able to be experienced. This lab will step you through as closely as possible to a
new FMC and FTD appliance being deployed as possible. The FMC virtual machine has been deployed as a VM, has had an IP
address assigned to it, a certificate has been installed, and has been licensed. The FTD virtual machine, NGFW1, has been
deployed as a VM and has an IP address assigned to its management IP address.
Steps
Quick Launch
2. If you would like to disable for the duration of the lab, click on the [X] at the top right of the screen
FMC Access
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 101
Cisco Confidential
Cisco dCloud
NOTE: To access the FMC manually in case the browser does not open by default, navigate to https://fmc.dcloud.local
2. Log in to the FMC using the credentials below and clicking the Log In button. The password may be saved in the browser. If
so, then click the Log In button and proceed.
• Username: admin
• Password: C1sco12345
You are presented with the Summary Dashboard screen. There will not be many items with data on the screen as there are no
devices added to the FMC at this point in the implementation.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 101
Cisco Confidential
Cisco dCloud
NOTE: The menus across the top of the screen will be used in configuring the features and settings used by the devices managed
dCloud: The Cisco Demo Cloud
from the FMC as well as reviewing event and security data being reported by devices the FMC manages. You will now use the
System menu represented by the gear icon in the top right of the screen to make configuration changes for the FMC itself.
1. In the top right corner of the FMC user interface click the System menu represented by the gear icon and select Configuration
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 101
Cisco Confidential
Cisco dCloud
4. Review the configuration items on this page but do not make any changes. This is where items such as the management
interface IP address, routes, DNS hostname, DNS domain, DNS Server settings, and Remote Management Port are
configured.
dCloud: The Cisco Demo Cloud
NOTE: In a customer deployment, you would obtain the hostname, domains, and DNS server settings from the customer and
specify the values here so the FMC can resolve DNS names. The hostname is also important when dealing with certificates for the
FMC as the common name of the certificate must match the hostname in order for the certificate to be recognized as valid.
NOTE: The FMC can function as a time source for managed devices. In this lab environment, the time and NTP settings are
preconfigured to help ensure the lab environment is functional. In a customer deployment, you would configure these settings to
have a reliable trusted customer time source added to the list of NTP servers to ensure the FMC has correct time.
6. Review the settings on the page, do not make any changes at this time, continue with the lab.
7. Review the HTTPS certificate for the FMC. From the left window pane select HTTPS Certificate.
This is the certificate generated by the Certificate Authority in the lab and preconfigured for lab purposes. In a customer
environment a best practice would be to replace the default self-signed certificate with a certificate generated by a trusted
Certificate Authority. Review the settings and proceed with the lab.
NOTE: The FMC can generate a Certificate Signing Request (CSR) to submit to a Certificate Authority (CA) or if a certificate was
already generated for the FMC it can be imported from this screen as well.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 101
Cisco Confidential
Cisco dCloud
8. Configure SNMP on the FMC so that it can be polled by the customer’s monitoring system for status and performance. From
the left window panel select SNMP.
9. For the SNMP Version settings choose Version 3 and click Add User
Username: fmcsnmp
Authentication Protocol: SHA
Authentication Password: C1sco12345
Verify Password: C1sco12345
Privacy Protocol: AES128
Privacy Password: C1sco12345
Verify Password: C1sco12345
11. Click Add
NOTE: In your customer environment you should use values provided to you from your customer to match their SNMP polling
settings. A best practice is to use SNMPv3 with Authentication and Privacy protocols enabled and complex passwords
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 101
Cisco Confidential
Cisco dCloud
12. The SNMP v3 user will appear in the list. The FMC can be polled for health and performance statistics. Click Save
2. Edit the Firewall Threat Defense Health Policies dCloud-Health by clicking on the pencil icon
In this section you will configure the FMC to automate some tasks that can be run on a schedule. This will include updating the
CRL (Certificate Revocation List), and the VDB (Vulnerability Database).
2. Select the Gear Icon at the top right Tools > Scheduling
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 101
Cisco Confidential
Cisco dCloud
5. Click Save
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 101
Cisco Confidential
Cisco dCloud
6. You will see that the task has been added to calendar.
e. Run at 1:00 am
j. Click Save
a. Job Type: Update URL Filtering Database (click OK to the warning regarding deploying the updates if prompted)
h. Click Save
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 101
Cisco Confidential
Cisco dCloud
i. Click Save (If you receive an error stating no sensor(s) selected, click on All devices and try again)
Your customer has requested that you configure the FMC to allow user accounts in their Active Directory instance to authenticate
to the FMC. Specifically, any users in the IT group in AD should be logged int the FMC as an administrator. You will now configure
the FMC to allow user accounts in the customer’s Active Directory instance to authenticate to the FMC.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 101
Cisco Confidential
Cisco dCloud
3. Use the following values to configure the External Authentication Object. If a value for a setting is not specified then leave the
default value and do not modify it.
b. Name: dcloud-AD
f. Port 389
4. Click the Fetch DNs button and select DC=dcloud.DC=local as the Base DN
5. Enter the following:
a. Username: dcloud0\administrator
b. Password: C1sco12345
c. Confirm Password: C1sco12345
d. Click Show Advanced Options and check the fields match below
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 101
Cisco Confidential
Cisco dCloud
NOTE: In your customer environment a user account (service account) dedicated for the FMC to query Active Directory should be
used instead of the actual “administrator” account. No special permissions are required in AD for the account to function correctly.
Additionally, it is a best practice to use encryption (Secure LDAP runs on port 636) if the customer’s domain controllers have a
certificate installed so that username and passwords are not being sent clear text through the network.
6. In the Attribute Mapping section click the Fetch Attrs button, and select sAMAccountName from the drop-down list
7. In the CLI Access Attribute field, enter sAMAccountName be aware of capitalization.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 101
Cisco Confidential
Cisco dCloud
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 101
Cisco Confidential
Cisco dCloud
19. Look at the Users you will see admin and restapiuser
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 101
Cisco Confidential
Cisco dCloud
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 101
Cisco Confidential
Cisco dCloud
The objective of this exercise is to deploy a simple, but effective, NGFW configuration:
Steps
NOTE: There are two types of interface objects: security zones and interface groups. The key difference is that interface groups
can overlap. Only security zones can be used in access control policy rules.
Verify and create the Network Objects for the Security Zones that will be added to the interfaces.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 101
Cisco Confidential
Cisco dCloud
Name: InZone1 Select Routed from the Interface Type drop-down menu click Save
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 101
Cisco Confidential
Cisco dCloud
3. Type: configure manager add fmc.dcloud.local C1sco12345 [Enter] and wait for the response
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 101
Cisco Confidential
Cisco dCloud
a. Host: 198.19.10.81
d. Group: None
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 22 of 101
Cisco Confidential
Cisco dCloud
Note: The IP Address 198.19.10.81 is the Management Interface address that terminates the SF Tunnel. It was pre-configured
due to the limitations in the dCloud lab. In a customer environment you would configure the management address through the
wizard.
7. Click Register
9. Configuring the Interfaces. Click on the Pencil Icon on the GigabitEthernet0/0 Line
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 23 of 101
Cisco Confidential
Cisco dCloud
b. Enabled: Checked
dCloud: The Cisco Demo Cloud
c. Security Zone: OutZone
e. Click: OK
a. Name: in10
b. Enable: Checked
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 24 of 101
Cisco Confidential
Cisco dCloud
d. Ipv4: 198.19.10.1/24
e. Click OK
dCloud: The Cisco Demo Cloud
11. Configure GigabitEthernet02-04 as follows:
a. GigabitEthernet0/2
i. Name: in20
b. GigabitEthernet0/3
i. Name in30
c. GigabitEthernet0/4
i. Name in40
1. If currently not on the page in the FMC, select Devices > Device Management. Click on the pencil icon to edit the NGFW1
device settings.
The Interfaces tab should be selected. Confirm that the interfaces of NGFW1 have Security Zones configured
Select Routing > Static Route and click the Add Route button.
Select any-ipv4 from available networks (This is the equivalent of a default route).
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 25 of 101
Cisco Confidential
Cisco dCloud
Click Add.
d. Name the Object “HQ-WAN-GW (You will be able to reuse this object later).
e. Enter the Network IP Address: 198.18.128.1 (This is the outside interface of the Firewall facing the WAN).
f. Click Save.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 26 of 101
Cisco Confidential
Cisco dCloud
Name: 11.11.60.0-24
Gateway +:
Name: 198.18.133.60
Host: 198.18.133.60
Click Save.
Click OK
Click Save.
The default network discovery policy is configured to discover all applications, both internal and external. We will want to add host
and user discovery. In a production environment, this can exceed the FMC Firepower host license. For this reason, it is best
practice to modify the policy.
g. Click the pencil icon to the right to edit the existing rule.
Create Lab_Networks
1. Name: Lab_Networks
2. Network: 198.18.0.0/15
3. Click Save
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 27 of 101
Cisco Confidential
Cisco dCloud
b. Click Exclude
ii. This will add a network that is excluded from Network Discovery
Click Save.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 28 of 101
Cisco Confidential
Cisco dCloud
b. Optional check the Advanced Deploy link the NGFW(s) device and expand the list to see the details. The page
should look similar to the following picture. As of version 6.2.3 you will be alerted if there is a SNORT
interruption. In addition, you will see what will cause the interruption. If you wish to deploy later, you can click
the cancel button.
Click Preview to confirm that NGFW settings, interface and static route configuration and Objects will be modified.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 29 of 101
Cisco Confidential
Cisco dCloud
c. Click OK then Click Device NGFW1 and Deploy. Wait until Deployment completes.
a. Note that the only rule configured is the Default Action Block All Traffic
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 30 of 101
Cisco Confidential
Cisco dCloud
NOTE: The Default Action setting instructs the FTD what to do if no rule in the ACP matches the packet. The “Block all traffic”
setting is a default deny rule that blocks any packet not matching a rule in the ACP and is a security best practice. The “Intrusion
Prevention” setting runs the packet through the Snort IPS engine and if the packet is not blocked by the IPS engine then the
packet is allowed to pass through the firewall. The “Network Discovery” setting performs network discoverydCloud:
on theThe
packet and
Cisco Demo Cloud
hosts involved then allows the packet through the firewall.
b. Action: Allow
d. Zones:
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 31 of 101
Cisco Confidential
Cisco dCloud
NOTE: Rules are divided into sets within a policy. Two sets are predefined:
Mandatory rules, which take precedent over rules of child policies dCloud: The Cisco Demo Cloud
Default rules, which are evaluated after the rules of child policies.
In this exercise, you will not create a child policy, but you will use the default rule set as a convenient way of making sure this rule
is evaluated last.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 32 of 101
Cisco Confidential
Cisco dCloud
e. Inspection: dCloud Balanced Intrusion and Block Malware File Policy (read the note about Snort 2 and
Snort 3)
g. Click Apply
NOTE: The demo intrusion and file policies were pre-configured to save you time. See Appendix 1 in the Firepower Advanced Lab
Guide v3.2 for instructions on how to create these.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 33 of 101
Cisco Confidential
Cisco dCloud
NOTE: Setting Maximum Active Responses to a value greater than 0 enables the Intrusion Policy drop (IPS) rules that drop
packets to send TCP resets to close the connection. Connections that do not trigger an IPS drop will be reset by the FTD if “block
with reset” is applied to the rule regardless of the settings of Maximum Active Responses or if it is a LINA-only drop such as a
Fastpath block. Typically, both the client and server are sent TCP resets. With the configuration above, the system can initiate up
to 25 active responses (TCP Resets) if it sees additional traffic from this connection.
In a production deployment, it is probably best to leave this set to the default. Then no resets are sent, and the malicious system
will not know that it has been detected. But for testing and demonstrations, it is generally better to send resets when packets match
drop rules.
d. Networks
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 34 of 101
Cisco Confidential
Cisco dCloud
1. Name: host-ad1
4. Save
1. Name: Authorized-Internal-DNS-Servers
2. Description: Internal DNS servers that are authorized to query external DNS
4. Save
iv. Click Ports tab, select DNS_over_TCP and DNS_over_UDP ports then click Add to Destination
v. Click Apply
NOTE: The Default Action setting instructs the FTD what to do if no rule in the ACP matches the packet. The “Block all traffic”
setting is a default deny rule that blocks any packet not matching a rule in the ACP and is a security best practice. The “Intrusion
Prevention” setting runs the packet through the Snort IPS engine and if the packet is not blocked by the IPS engine then the
packet is allowed to pass through the firewall. The “Network Discovery” setting performs network discovery on the packet and
hosts involved then allows the packet through the firewall.
Click the New Policy button, and select Threat Defense NAT.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 35 of 101
Cisco Confidential
Cisco dCloud
3. Select the NGFW1. Click Add to Policy and then click Save.
5. Select In Category and NAT Rules After from the Insert drop-down lists.
a. This will ensure that this rule will be evaluated after the auto-NAT (object NAT) rules.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 36 of 101
Cisco Confidential
Cisco dCloud
1. Deploy the Changes to NGFW1 (Ignore the Warnings if they relate to the fact that InZone is not currently defined to an
Interface)
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 37 of 101
Cisco Confidential
Cisco dCloud
i. Type sudo -i
1. Password: C1sco12345
dCloud: The Cisco Demo Cloud
ii. Type ping Outside (198.18.133.200) Should Succeed this confirms the ICMP
iii. Type wget google.com Should Succeed this confirms NAT and Routing
NOTE: Observe that Snort rule 336 was triggered. In the dCloud Balanced Intrusion Policy, the rule state for this rule is set to
Alert [as an Rule Override] This rule is disabled in the system-defined intrusion policies such as Balanced Security and
Connectivity.
NOTE: In a production environment, if you run into a situation where events are not appearing, the first thing you should check is
the time synchronization between the NGFW and FMC. However, in this lab, it is more likely to be an issue with the eventing
processes. If this happens, try restarting these processes as follows.
From the Jumper desktop, connect to the FMC using the pre-defined PuTTY session. Login as admin/C1sco12345 and run the
following commands.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 38 of 101
Cisco Confidential
Cisco dCloud
4. Click Packets Observe that details of the event are presented. You will see Message, Ingress and Egress Security Zones,
and Rule that was triggered. dCloud: The Cisco Demo Cloud
5. Test the file and malware blocking capabilities. These Wget commands can be cut and pasted from the file on the Jump
desktop called Strings in order to cut and paste the text.
b. Next use WGET to attempt to download the file blocked by type: wget -t 1 outside/files/test3.avi.
NOTE: Very little of the file is downloaded. This is because the NGFW can detect the file type when it sees the first block of data.
The Demo File Policy is configured to block AVI files.
NOTE: About 99% of the file is downloaded. This is because the NGFW needs the entire file to calculate the SHA. The NGFW
holds onto the last block of data until the hash is calculated and looked up. The Demo File Policy is configured to block malware
detected in PDF files.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 39 of 101
Cisco Confidential
Cisco dCloud
NOTE: The action is reported as Custom Detection Block, instead of Malware Block. This is because we added Zombies.pdf to the
custom detection list just in case the lab has issues connecting to the cloud.
dCloud: The Cisco Demo Cloud
Click on the red computer icon. This will open the host profile page. Look over this page and then close it.
From the menu, select Analysis > Files > File Events Table View of File Events. You should see information about file events.
NOTE: We are performing this task now, but this NAT Policy will not be used until Branch 1 is brought online in a later section.
The FMC is behind the NGFW1, which is acting as a NAT device. We need to build a static NAT Policy so that the Branch FTD will
be able to communicate with the HQ-FMC.
1. Go to Device > NAT > Default PAT > Click on Add Rule.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 40 of 101
Cisco Confidential
Cisco dCloud
2. Click on the (+) sign again and add the name FMC_Public.
a. For Network enter 198.18.133.120 (An Address on the WAN network).
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 41 of 101
Cisco Confidential
Cisco dCloud
NOTE* The screenshot above shows the Auto NAT and NAT Rules After. Your screen may vary
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 42 of 101
Cisco Confidential
Cisco dCloud
We have now deployed a FTD at the Corporate site and tested the Access Control, NAT and Intrusion policy
a. Now we will configure NGFW Branch 1 so it will also be managed by the FMC.
a. If the response is No mangers configured or Managed Locally we need to configure for FMC management
Type the following command configure manager add 198.18.133.120 C1sco12345 abcde
NOTE: You need to add the FMC’s NAT Address and also a specific NAT ID (in this case abcde). The NAT ID will need to match
with the NAT ID on the FMC when you go through the NGFW registration process.
Go back to the FMC webpage and go to Devices > Device Management > Add > Device.
b. Host: 198.18.133.42
e. Group: None
i. Branch1access
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 43 of 101
Cisco Confidential
Cisco dCloud
Under Access Control Policy, select the down arrow and choose Create New Policy.
g. Name: Branch1access Select Base Policy: None Default Action: Block all traffic. Click Save.
ii.This ID is used as check to make sure the FTD is the one being configured. It is used as a one-time check and
must match the same ID used in the configure manager add 198.18.133.120 C1sco12345 abcde
3. Select Branch1Access Smart Licensing: Check all boxes Under Advanced Type the NAT code from the FTD: abcde.
4. Click Register.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 44 of 101
Cisco Confidential
Cisco dCloud
NOTE: Now that the ngfwbr1 has been added we need to add interfaces, build the default route, create a NAT policy and update
the Access Policy
6. Go to Devices > Device Management. Click on the pencil icon next to the NGFWBr1.
7. Click on the pencil icon on the Gigabit Ethernet0/0 line.
8. Set up the Name, Zones and IP address.
a. Name: branch1_Outside
b. Click: Enabled
c. Security Zone: Click New Enter a name: branch1_Outzone.
9. Select the Ipv4 address tab.
a. Add or verify the IP Address:
i. 198.18.128.81/255.255.192.0.
ii. Click OK
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 45 of 101
Cisco Confidential
Cisco dCloud
NOTE: In this scenario, we used 198.18.133.42/18 for the Management IP Address of the Firewall. You can see this address by
entering the show network command from the command line or by going to expert mode on the FTD and run the ifconfig
command and look at the br1 interface. The Management IP Address is accessibly only to the Operating System. We therefore
have to build a WAN interface as an outside interface. The Outside Interface can also be configured by DHCP from the ISP, we did
not want to add an additional server to this lab scenario.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 46 of 101
Cisco Confidential
Cisco dCloud
a. Name: outside2
c. IPv4: 198.19.40.4/24
a. Name: outside3
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 47 of 101
Cisco Confidential
Cisco dCloud
c. IPv4: 198.19.30.4/24
a. For Gateway. Click the (+) button and configure the New Network Object:
b. Name: Branch1_WAN_GW
c. Host: 198.18.128.1
d. Click Save
e. Click OK
NOTE: This is the same address of the FMC-HQ-WAN-GW object that was created earlier. This is the gateway for the dCloud
pod. You can reuse the FMC-HQ-WAN-GW for this section if you want.
a. Interface: outside3
c. Gateway: 198.19.30.63
d. Metric: 10
e. Click OK
a. Interface: outside2
c. Gateway: 198.19.40.64
d. Metric: 11 [We will change this in the Advanced Lab for DIA]
e. Click: OK
17. Click OK
NOTE: If the Interface outside does not show up in the pull-down box, click on the save button on the top right of the screen.
16. When done, click Save at the top of the web page.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 48 of 101
Cisco Confidential
Cisco dCloud
2. Name the Policy Branch1_NAT and under available devices select NGFWBr1.
4. Click Save.
a. Type: Dynamic.
d. On the Translation Tab under Original Packet Select the (+) and configure New Network Object Name:
Branch1_Networks Network: 198.19.11.0/24 (You could also use/create an Object in the Objects Page that would
encompass an entire lab network group such as 198.18.0.0/15).
7. Click Save.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 49 of 101
Cisco Confidential
Cisco dCloud
10. To modify the Access Control Policy, go to Policies > Access Control > Access Control
c. On Inspection Policy Select dCloud Balanced Intrusion and Block Malware File Policy.
13. Click on Apply Click on Save at the top of the web page Click Deploy Advanced Deployment [Optional]and Select ngfwbr1.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 50 of 101
Cisco Confidential
Cisco dCloud
a. After Deployment is Complete Open session to Branch Office Linux Type: wget -t 1 outside/files/ProjectX.pdf Should
succeed this will verify outbound connectivity from Branch 1
a. No results will be shown, this is because the default sftunnel configuration is being used.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 51 of 101
Cisco Confidential
Cisco dCloud
f. Go to Manager Access
ii. Under Available Networks select FMC_Public and click Add and OK Click Yes under Please Confirm
g. Click on Save and then Deploy when Deploying read the warning and click Deploy
a. Device > Device Management > NGFRBr1 > Device > Management > Manager Access Interface:
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 52 of 101
Cisco Confidential
Cisco dCloud
b. Device > Device Management > NGFRBr1 > Interfaces > GigabitEthernet0/0 > Manager Access > Uncheck Enable
management on this interface for the Manager Click OK Save and Deploy dCloud: The Cisco Demo Cloud
NOTE: In order to configure the FTD using the on-box manager the default FTD address is 192.168.45.45/32 with a default
gateway of 192.168.45.1 has been changed. NGFW3 has been preconfigured with the Management IP Address and the
Username/Password used below.
NOTE: It might take between 10 to 15 minutes to restart the services on the FTD. You will get a Service Unavailable when trying
to access NGFW3 until all services are restarted.
3. From the Quick Launch open a connection to NGFW-3 Web You can also click on the NGFW3 (FDM) from the browser
status bar
It might take between 10 to 15 minutes to restart the services on the FTD. You will get a Service Unavailable when trying to
access NGFW3 until all services are restarted
The Firepower Device Manager screen should prepopulate. If not, the credentials are Username: admin Password: C1sco12345
Click Login
You will come to the following screen, which displays the FTD connections. Scroll down to the Outside Interface Address
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 53 of 101
Cisco Confidential
Cisco dCloud
a. IP Address: 198.18.133.83
c. Gateway: 198.18.128.1
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 54 of 101
Cisco Confidential
Cisco dCloud
5. Click Next
a. If you get a message that, the connection to www.cisco.com has failed. That is ok move on to the setting of the NTP
services.
c. Click Next.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 55 of 101
Cisco Confidential
Cisco dCloud
6. This will bring you to Smart License select Start 90-day evaluation period without registration.
8. Click Finish
NOTE: As you can see Interface GigabitEthernet 0/1 is 192.168.45.1. Also, the Outside Interface GigabitEthernet 0/0 has the
outside interface that we manually configured. If you wish to change the address of GigabitEthernet 0/1, choose the
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 56 of 101
Cisco Confidential
Cisco dCloud
GigabitEthernet 0/1 line and go to actions. A pencil Icon will appear. Click on the icon. Delete the DHCP pool. Change the IP
Address to: 198.19.10.3/255.255.255.0 and click OK
dCloud: to
11. If you made changes Click on the deployment icon and note the configuration changes that will be deployed Thethe
Cisco
FTDDemo Cloud
Snort 3 was introduced on the FDM in code version 6.7. In the next steps we will be looking at Snort 3 rules on the FDM
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 57 of 101
Cisco Confidential
Cisco dCloud
4. Click on the Action cell for one of the rules. Note that the rule states can be set to override. (ALERT, DROP, DISABLED)
5. Click on the Search field and you will see the GID (Generator ID 1 for standard text rules, shared object rules 3), SID (Snort
ID, Talos rules under 1,000,000 local rules over 1,000,000), and Action Field. Then click Cancel
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 58 of 101
Cisco Confidential
Cisco dCloud
7. Deploy your policy using the deploy button button and Deploy Now
dCloud: The Cisco Demo Cloud
8. Note the rule groups on the left
10. Select Chrome child group this will show the BROWSER-CHROME rules
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 59 of 101
Cisco Confidential
Cisco dCloud
14. Click on the Edit link to check or change the Security Level up to Level 3
15. You will see more rules enabled and total rules
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 60 of 101
Cisco Confidential
Cisco dCloud
2. Click on Monitoring > Firewall Management Center and look at the Overview and Process
5. On the Right -hand side click Memory Usage Data Plane and set the Warning Threshold % to 87 Save
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 61 of 101
Cisco Confidential
Cisco dCloud
6. Optional: Under CPU adjust the Data Plane and Snort Warning thresholds to 85%
b. Click Apply
11. Click on CPU, Memory, Interfaces, Connections, Snort tabs and review the results.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 62 of 101
Cisco Confidential
Cisco dCloud
Configure EIGRP
Deploy the changes and test the configuration There are two objectives for this lab exercise:
Configure BGP
The first objective will involve creating network objects, creating access control lists. Also, static NAT and dynamic routing will be
configured.
NOTE: The public server will be deployed in the inside network. It would be more realistic to deploy this in a DMZ, but that would
take more work. However, the lab pod has this capability. See Appendix 4 for information about creating a DMZ in the lab pod.
Steps
1. From the menu, select Objects > Object Management. The Network object page will be selected.
3. Click Save.
3. Click Save.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 63 of 101
Cisco Confidential
Cisco dCloud
3. Click Save.
Select Access List > Standard from the left navigation pane.
dCloud: The Cisco Demo Cloud
a. Click Add Standard Access List.
c. Add the 2 access control entries shown below. The second entry is critical, because of an implicit deny all at the end of
the list.
d. Click Save.
b. You will be at the Interface Objects tab. Select InZone1 and click Add to Source.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 64 of 101
Cisco Confidential
Cisco dCloud
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 65 of 101
Cisco Confidential
Cisco dCloud
c. Type: Static
3. Interface Objects tab select Outzone for Source Interface Objects and InZone1 to Destination Interface Objects
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 66 of 101
Cisco Confidential
Cisco dCloud
c. Click on the [+] for Original Destination Port to add a new port object for the TCP port on the Outside interface
i. Name: nat-port-FMC
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 67 of 101
Cisco Confidential
Cisco dCloud
d. Click Save
f. Translated Packet
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 68 of 101
Cisco Confidential
Cisco dCloud
iv. Click OK
2. Edit Base_Policy
h. Select Ports. Under Available Ports type FTP and select HTTP and HTTPS and add to destination.
i. Under Manually Enter Port or Select Protocol type ICMP Click OK to Add to Destination Port
NOTE: We use the true IP of the webserver, instead of the NAT’ed address that the client will connect to.
k. Select dCloud Balanced Intrusion from the Intrusion Policy drop-down list.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 69 of 101
Cisco Confidential
Cisco dCloud
Modify access control policy to allow outside access to FMC via different port
Confiture EIGRP
NOTE: Prior to release 7.2 EIGRP could only be configured by using FlexConfig. The steps below will show you how configure
EIGRP via the FMC GUI.
a. AS Number: 10
i. Name: EIGRP
iii. Save
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 70 of 101
Cisco Confidential
Cisco dCloud
e. Click Add
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 71 of 101
Cisco Confidential
Cisco dCloud
b. Type: show route [you should see routes with a D in front. This will denote EIGRP, below are some examples]
Configure BGP
2. Click on the pencil icon to edit the device settings for the device NGFW1.
a. Select the Routing tab.
b. Go to General Setting Select BGP and check the Enable BGP checkbox.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 72 of 101
Cisco Confidential
Cisco dCloud
2. From the Quick Launch Menu Click on the session Kali Outside Linux Login as root, password C1sco12345
a. Type curl wwwout. This should succeed.
b. Type ssh wwwout. This should fail.
3. Return to the dCloud session page in your computer’s we browser that shows the diagram of the lab environment. Find the
WSKT2 machine, click the arrow icon and then select Remote Desktop link to connect to the WKST2 machine
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 73 of 101
Cisco Confidential
Cisco dCloud
6. Go back to the Jumpbox Quick Launch Click on the session called CSR60 admin/C1sco12345 [If needed]
a. On the CSR CLI, run the command show bgp, and confirm that routes appear.
7. From the NGFW1 CLI:
8. Run show route or show route bgp.
NOTE: show bgp rib-failure. This shows that the 198.18.128.0/18 route was not inserted in the routing table because there was a
better route (connected).You can also run the following commands from the FMC.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 74 of 101
Cisco Confidential
Cisco dCloud
The objective of this exercise is to upgrade NGFW1 by using a download FTD software from a secondary source and perform an
upgrade of FTD software on NGFW1.
Steps
Starting in software version 6.6 you do not need the FMC to download software for the FTD upgrade. In the next steps we will pull
FTD software from a specific URL.
1. Open a session to Kali Outside Linux Server
a. Login: root/C1sco12345
b. Verify the FTD upgrade software is on the Outside Linux Server
i. cd /var/www/html/files
ii. ls -la and look for Cisco_FTD_Upgrade-7.4.1-172.sh.REL.tar
2. Click on the system icon and select Product Upgrades on the FMC
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 75 of 101
Cisco Confidential
Cisco dCloud
3. Click on Add Upgrade Package Under URL Specify a remote location (Firewall Threat Defense devices only)
a. Source URL http://198.18.133.200/files/Cisco_FTD_Upgrade-7.4.1-172.sh.REL.tar
i. Click Save
4. You will see a successful load and then the upgrade listed as Software update source
5. Click Close
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 76 of 101
Cisco Confidential
Cisco dCloud
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 77 of 101
Cisco Confidential
Cisco dCloud
14. Wait until you see the upgrade completed then click Close
15. Go to Device > Device Management verify the NGFW1 now has Version 7.4.1
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 78 of 101
Cisco Confidential
Cisco dCloud
If there is a clear-text tunnel, the NGFW access control policies apply to the tunneled traffic. Prefilter policies give control over the
tunneling protocol. The following tunneling protocols are supported.
GRE
IP-in-IP
Ipv6-in-IP
Teredo
Prefilter policies communicate with access control policies via tunnel tags. The prefilter policy assigns tunnel tags to specified
tunnels. The access control policy can then include rules that only apply to traffic tunneled through those specified tunnel.
In this exercise, you will create a GRE tunnel between the inside and outside CentOS servers.
You will then configure the NGFW to block ICMP through this GRE tunnel.
NOTE: This exercise has Scenario 3 as a prerequisite. This is because the exercise assumes the static NAT rule, which translates
198.19.10.202 to 198.18.128.202.
Steps
In this task, you will confirm that the access control policy rules apply the tunneled traffic.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 79 of 101
Cisco Confidential
Cisco dCloud
3. Create or verify a GRE tunnel between the Kali Inside Linux server and Outside Linux server.
dCloud: The Cisco Demo Cloud
a. On the Kali Outside Linux Server CLI, type sudo ifup tun0 password: C1sco12345
b. On the Kali Inside Linux Server CLI, type sudo ifup tun0 password: C1sco12345
c. On the Kali Inside Linux Server, confirm that you can ping through the tunnel with the following command. Ping 10.3.0.2
1. Modify the Base_Policy ICMP Permit Access rule to allow for HTTP, HTTPS, FTP and make sure dCloud Balanced
Intrusion policy and Block Malware File Policy are enabled.
3. Run the following command from the Kali Inside Linux Server CLI. FTP 10.3.0.2
ii. 421 Service not available, remote server has closed connection.
4. In the FMC, from the menu, select Analysis > Intrusions > Events.
a. Look for Destination IP: 10.3.0.2
i.Click the arrow on the left to drill down to the table view of the events.
5. Test the file and malware blocking capabilities by running the following commands on the Kali Inside Linux server CLI.
NOTE: These Wget commands can be cut and pasted from the file on the Jump desktop called Strings to cut and paste.txt.
a. As a control test, use WGET to download a file that is not blocked. Wget -t 1 10.3.0.2/files/ProjectX.pdf.
c. Next use WGET to download the file blocked by type: wget -t 1 10.3.0.2/files/test3.avi.
NOTE: Very little of the file is downloaded. This is because the NGFW can detect the file type when it sees the first block of data.
e. wget -t 1 10.3.0.2/files/Zombies.pdf
NOTE: About 99% of the file is downloaded. This is because the NGFW needs the entire file to calculate the SHA. The NGFW
holds onto the last block of data until the hash is calculated and looked up.
6. In the FMC, from the menu, select Analysis > Files > File Events.
b. Observe that the sending and receiving Ips are 10.3.0.2 and 10.3.0.1, respectively.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 80 of 101
Cisco Confidential
Cisco dCloud
d. Click Save.
1. From the menu, select Policies > Access Control > Prefilter.
a. Click New Policy. Enter a name such as NGFW1 Prefilter Policy. Click Save.
c. Select the Encapsulation & Ports tab and check the GRE checkbox.
Analyze – traffic will be passed to Snort, and access policy rules will apply.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 81 of 101
Cisco Confidential
Cisco dCloud
NOTE: You can also create prefilter rules for this policy. This gives you the ability to analyze, block or fast path traffic based on
layer 2 through 4 information.
1. From the menu, select Policies > Access Control > Access Control to edit the Base_Policy Access Control Policy.
Click Apply.
a. In Zones column, search for GRE (Tunnel Tag) and click Add to Source.
d. In the Available Applications or Ports column, make sure that Only ICMP is selected.
e. Select the Logging tab. Check the Log at Beginning of Connection checkbox.
b. If rule does not show up in Mandatory, select the rule to be above rule 1
c. Click Apply
b. Select into Default from the Insert drop-down list. This will become the last rule in the access control policy.
c. In the Available Zones column, select GRE and click Add to Source.
d. Select dCloud Balanced Intrusion from the Intrusion Policy drop-down list.
f. Click Apply and Save to add the rule to the policy and save the access control policy.
1. Deploy the changes, as you have been. Wait for the deployment to complete.
On the Outside Linux Server, type sudo tcpdump -n -i tun0 password: C1sco12345 to monitor tunnel traffic.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 82 of 101
Cisco Confidential
Cisco dCloud
a. Run the following commands on the Kali Inside Linux Server CLI.
a. On the Outside Linux Server CLI, type Ctrl C then sudo ifdown tun0 [password: C1sco12345]
b. On the Kali Inside Linux Server CLI, type sudo ifdown tun0 [password: C1sco12345]
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 83 of 101
Cisco Confidential
Cisco dCloud
• FMC
• Kali Inside
FQDN NAT
The FQDN NAT can change destination addresses using the FQDN response. FQDN name can be included in NAT policy for
enhanced usability. It also provides the flexibility for a simplified firewall insertion in public/private cloud, Dynamic IP’s for
destination NAT, and One-to-many DNS resolution with load balancing. A simple example is a server inside our network that keeps
changing IP every week. FQDN based NAT rule will be a perfect fit for this kind of scenario.
NOTE: Make sure the server/host are not on DHCP with short lease span as that may create issues with DNS cache of FMC as
well as ARP issues from the outside host trying to access it.
Before we get started, we need to check the current NAT configuration and DNS configuration, as FQDN relies on DNS to resolve
hostnames. Before FQDN support in 7.1, NAT was only based on static IP/Host objects.
To use FQDN, a DNS nameserver should be present along with an FQDN object before creating a NAT rule entry. We are using
NGFW1 for this lab.
Type command ping inside.dcloud.local. The ping shows that the name entered doesn’t have a valid DNS entry or a DNS server is
not present/configured for this NGFW1 data plane.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 84 of 101
Cisco Confidential
Cisco dCloud
To ensure the inside.dcloud.local is up and reachable from the NGFW1, try again with the command ping system
inside.dcloud.local, which uses the management interface.
Type the command show dns to see the current output and then show running-config dns
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 85 of 101
Cisco Confidential
Cisco dCloud
The entry is empty and confirms that the nameserver/DNS is not configured for the NGFW1 data plane.
i. Name: NGFW1_Platform_Settings
iii.Save
4. From the left menu, click on DNS and select the checkbox for Enable DNS name resolution by device
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 86 of 101
Cisco Confidential
Cisco dCloud
a. Name: ADserver
c. Timeout: 1
d. Retries: 1
f. click Save.
6. Click on DNS Server Group* and it will show the ADserver as a fill option.
8. Click OK
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 87 of 101
Cisco Confidential
Cisco dCloud
Once Deployed, which can take a couple mins, test the two commands again from NGFW1 CLI
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 88 of 101
Cisco Confidential
Cisco dCloud
The NGFW1 CLI shows that inside.dcloud.local is resolving and we can see a DNS server configured with IP 198.19.10.100.
1. From FMC, Navigate to Objects > Object Management and click on Add Object from the drop-down menu
Select FQDN for the object type and enter details as shown below. For our use case, we will use inside.dcloud.local with FQDN
and try to reach it from outside.
Click Save.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 89 of 101
Cisco Confidential
Cisco dCloud
2. Navigate to Devices > NAT and edit the Default PAT Policy
NOTE: In the current NAT rules, an old entry of Auto NAT is listed for NAT access between the Kali Inside Linux
server (wwwin) and Outside Linux server (wwwout). Delete this Auto NAT rule before making a new NAT entry with FQDN.
Currently, FQDN is supported only with Manual NAT.
4. Click on Add Rule and create a new Manual NAT Rule and fill in the rule fields as shown above:
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 90 of 101
Cisco Confidential
Cisco dCloud
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 91 of 101
Cisco Confidential
Cisco dCloud
1. From the FMC, navigate to Policies > Access Control > Access Control and edit the Base_Policy.
2. Create or Edit the rule called Web Server Access. Add wwwindns to the destination networks.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 92 of 101
Cisco Confidential
Cisco dCloud
3. Apply, Save the rule and policy changes and deploy to NGFW1.
NOTE: In the new NAT rule just created in the task above, we are translating wwwout To Inside using FQDN NAT, which means
that the wwwout object is the one to ping/access from outside and see if the translation is working correctly or not.
4. Similarly, from the same CLI, try accessing the internal server using the command curl wwwout
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 93 of 101
Cisco Confidential
Cisco dCloud
Both are accessible & the IP is shown here for the inside web server is 198.19.10.200, which matches our FQDN configured.
5. Perform a final confirmation by looking at the FMC connection event logs. The connection logs in 7.2 show NAT fields such as
NAT translated IP, Ports, etc. which is great to have for debugging purposes. To look at NAT logs, go to FMC and Navigate
to Analysis > Connections > Events > Table View of Connection Events
a. If you don’t see the 198.x.x.x click on Edit Search > Networking > Initiator IP > 198.18.133.200 and Search
By default, the NAT fields are not enabled on the view page. Click on Table View of Connection Events
6. Enable NAT field in connection event by clicking on a X next to the field name and scrolling down to Disabled Columns to enable
all NAT-based log fields and press Apply.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 94 of 101
Cisco Confidential
Cisco dCloud
7. After enabling the NAT-based fields, scroll right to see all the fields.
As shown above, we can see the initiator IP is 198.18.133.200 (Outside Linux server IP) and the translated Destination NAT IP is
198.18.128.202 (wwwout) with Responder IP AS 198.19.10.200(wwwindns).
NOTE: At this point if the IP of the inside host changes from 198.19.10.200 to some other value, the admin doesn’t have to
manually change IP in the NAT rule anymore, this is the main benefit of a FQDN based NAT.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 95 of 101
Cisco Confidential
Cisco dCloud
In the lab, there is a Linux server on separate VLAN that is connected to GigabitEthernet0/2. The FQDN for this server
isolated.dcloud.local, and it has the IP address of 198.19.10.220/24. Note that this is address is in the same subnet as the inside
network.
The objective is to join these VLANs using a bridge-group on the NGFW. Traffic between these VLANs will be inspected.
NOTE: In this exercise, both interfaces in the bridge group are put in the same security zone. However this is not required. A
bridge group can contain interfaces in different security zones. This allows more granular control of traffic between interfaces in
the same bridge group.
Steps
Create the Object
Create the object needed for this lab exercise:
1. On the FMC Navigate to Objects > Object Management > Interface. Select Interface from the left navigation panel.
b. For Name, enter BViZone. Select Switched from the Interface Type drop-down menu.
c. Click Save.
c. Remove the IPv4 address and click OK. This IP must be removed, so it can be used on another interface.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 96 of 101
Cisco Confidential
Cisco dCloud
i. Click OK.
d. Click OK.
d. Click OK.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 97 of 101
Cisco Confidential
Cisco dCloud
NOTE: If you want the static NAT rule to work with the BVI interfaces, you must include this step. This is because object NAT
dCloud: The Cisco Demo Cloud
does not allow zones with more than one interface.
1. Navigate to Objects > Object Management. Select Interface from the left navigation panel.
e. Click Save.
c. Modify the NAT rule that has Original Destination: wwwout Translated Destination: wwwindns to Translated
Destination: wwwin
2. Add an access control rule to allow (but inspect) traffic between interfaces in BVIZone.
f. Select dCloud Balanced Intrusion from the Intrusion Policy drop-down list.
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 98 of 101
Cisco Confidential
Cisco dCloud
5. From the Kali Inside Linux Server CLI, test connectivity by typing ping isolated. This should succeed.
a. If the ping does not succeed check the Mandatory rules for the Base_Policy and change the Destination Zone from
any to a different zone.
6. From the Kali Inside Linux Server CLI, test the IPS capabilities.
a. Run the following command from the Kali Inside Linux server CLI. ftp isolated
ii. 421 Service not available, remote server has closed connection
1 If you do not see the above message type Ctrl + C
iii. Type quit to end ftp session
c. From the Kali Inside Linux server CLI, test the file and malware blocking capabilities.
i. As a control test, use WGET to download a file that is not blocked. Wget -t 1
isolated/files/ProjectX.pdf
ii. Next use WGET to attempt to download the file blocked by type. Wget -t 1 isolated/files/test3.avi
NOTE: Very little of the file is downloaded. This is because the NGFW can detect the file type when it sees the first block of data.
The dCloud Balanced Intrusion is configured to block AVI files.
NOTE: About 99% of the file is downloaded. This is because the NGFW needs the entire file to calculate the SHA. The NGFW
holds onto the last block of data until the hash is calculated and looked up. The Demo File Policy is configured to block malware
detected in PDF files.
1. Devices > Device Management > click the pencil icon on the NGFW1 line
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 99 of 101
Cisco Confidential
Cisco dCloud
d. Ipv4 198.19.10.1/24
e. Click OK
4. Go to GigabitEthernet 0/2 and remove the name from the interface and make sure it is enabled.
a. Name: in20
b. Security Zone: inZone2
c. Ipv4: 198.19.20.1/24
d. Click OK
e. Click Save
5. Go to Device NAT Default PAT
a. Replace inZonebr1 with InZone1 for all NAT Rules
b. Replace the BVIZone with InZone1
c. Click Save
c. Delete the Block ICMP over GRE rule in Mandatory if not already done
d. You can delete the line with BviZone to BviZone used for the Allow Internal Traffic
e. You can delete the line with Allow GRE Traffic if not already done
f. Modify the Allow Outbound rule for ICMP
g. Click Save
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 100 of 101
Cisco Confidential
Cisco dCloud
7. Click Deploy
a. Select NGFW1
dCloud: The Cisco Demo Cloud
8. Test the Network
a. From Kali Inside Linux Server [root/C1sco12345]
i. Ping Outside
ii. Ping 198.18.128.202 (Outside NAT Address of Kali Inside Linux Server)
Open a session to NGFW-BR 1
© 2024 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 101 of 101
Cisco Confidential