Firepower FMC and FTD troubleshooting

 1. Display real time log on FMC or FTD:

pigtail

for example: pigtail | grep 192.168.2.20

                     pigtail | grep sftunnel


2. Restart communication channel

manage_procs.pl

run it from  the sensor only, run it from FMC will reset all sensors' channel.

This scripts are nice to be used when the FMC and FTD have communication problems like heartbeats are not received, policy deployment is failing or events are not received

> expert

**************************************************************

NOTICE - Shell access will be deprecated in future releases

         and will be replaced with a separate expert mode CLI.

**************************************************************

admin@FTD:~$ sudo su

Password:

root@FTD:/home/admin# manage_procs.pl


****************  Configuration Utility  **************


 1   Reconfigure Correlator

 2   Reconfigure and flush Correlator

 3   Restart Comm. channel

 4   Update routes

 5   Reset all routes

 6   Validate Network

 0   Exit


**************************************************************

Enter choice:


3. Check communication channel status

sftunnel_status.pl


4 Verify communication channel session, each FTD has two tunnels: Control and Event.

expert mode:

netstat | grep 8305


5. check flow offload to hardware

show flow-offload flow


6. Packet capture and packet-tracer with trace detail 

Gives info for both Lina and Snort engine inspection 


7. show data-path inspection

FTD# show service-policy flow tcp host 172.16.1.10  host 8.8.8.8 eq 21


Global policy:

  Service-policy: global_policy

    Class-map: inspection_default

      Match: default-inspection-traffic

      Action:

        Input flow:  inspect ftp

    Class-map: class-default

      Match: any

      Action:

        Output flow:        Input flow:  set connection advanced-options UM_STATIC_TCP_MAP

FTD#


8. Process Management tool:

root@FTD:/home/admin# 

pmtool status | grep "-" | head

pmtool disablebyid sftunnel

pmtool enablebyid sftunnel


9. Capture on Snort engine

> capture CP [trace] interface inside match ip any host 203.0.113.1
> show capture CP
> show capture packet-number 4 trace

or

> capture-traffic -s 0 -w capture.pcap icmp and host 172.16.1.10

-s 0 means means no limit on packet size, in post cases, use -s 1500

filename.pcap locates at /ngfw/var/commom/ folder

file secure-copy <ip> <username><location> capture.pcap


===========

FTD deployment troubleshooting.


https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw-virtual/215258-troubleshooting-firepower-threat-defense.html


Configure, Verify and Troubleshoot Firepower Device Registration

https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/215540-configure-verify-and-troubleshoot-firep.html#anc28


=============

Error:
active peer already exists

Reason:
A device can be un-cleanly de-registered and still exists in the database

Fix:
 /usr/local/sf/bin/remove_peer.pl "IP or NAME or UUID" FORCE








Comments

Popular posts from this blog

ASA IKEv1 VPN troubleshooting Steps and Tips

Firepower 2100/1100 FTD/ASA initial setup, reimage, upgrade.