FMC and FTD with External Authentication

 



Configure FMC with LDAP for External Authentication


1. System > Users > External Authentication, Add External Authentication Object

    Set Defaults button will automatically fill up Attribute Mapping section. 
    Once configures host info, Fetch DNs can retrieve Base DN 




NetworkAdmins is AD group, only members in this AD group can login FMC/FTD. In this lab, maps it to FMC Administrator group, don't select any Default User Role, once you select one, you can't unselect it.






















CLI Access Filter:

when check "Same as Base Filter", cli access doesn't check user's AD group info, so all AD user will get access FMC/FTD cli.

To restrict cli access, we can add a new AD attribute, in this lab, it is called "firepowercli". Refer this article to create a Unicode String attribute, restart AD Domain Services, then in AD set the value to "shell" for user needs FMC/FTD cli access.

https://www.rebeladmin.com/2017/11/step-step-guide-create-custom-active-directory-attributes/


Then configure :




 



Test will show how many users has shell access and which user has.  



Test button also reports which FMC admin group is assigned

user is assigned to FMC Administrator group


user is not assigned to any FMC group, no access.





2. Leave Default role to None, enabled AD for Shell Authentication, Enable the LDAP object Corp-AD, Save and Apply




Note: No need to create a FMC local same user account to map the AD account.



Configure FTD with LDAP for External Authentication

External Authentication Object created in previous step will show up in FTD platform setting, just need enable it, save and deploy. then you can ssh to FTD MGMT interface using AD user account.









https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/215538-configure-firepower-management-center-an.html#toc-hId-1407814223


FTD SSH and HTPPs access 

commands to restrict access from specified IPs

configure https-access-list (local manager only)

configure ssh-access-list 

> configure ssh-access-list 192.168.2.0/24
The ssh access list was changed successfully.
>
> show ssh-access-list
ACCEPT     tcp  --  192.168.2.0/24       anywhere             state NEW tcp dpt:ssh
>

By default, FTD SSH is only enabled on MGMT interface, to enable it on data interface, need configure platform setting:







HTTPS access is specifically useful to download the packet captures from the diagnostic secure web interface directly for the analysis. 

But it gives Authorization Required message, couldn't download capture via https

We can download CLI capture via copy command, must be in LINA CLI:

copy /pcap capture:CP ftp://ftpusername@192.168.2.111/ftp/CP.pcap





Configure FMC and FTD External Authentication with ISE as a RADIUS Server

https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/221009-configure-fmc-and-ftd-external-authentic.html


FTD CLI Access with RADIUS

https://bluenetsec.com/ftd-cli-access-with-radius/

Comments

Popular posts from this blog

Firepower FMC and FTD troubleshooting

ASA IKEv1 VPN troubleshooting Steps and Tips

Firepower 2100/1100 FTD/ASA initial setup, reimage, upgrade.