3 Before Installation ............................................................................................................................... 13
Cisco Preparative Procedures & Operational User Guide
1
1 Introduction
The Cisco Firepower eXtensible Operating System (FXOS) chassis1 is a next-generation platform for
network and content security solutions. The FXOS chassis is part of the Cisco Application Centric
Infrastructure (ACI) Security Solution and provides an agile, open, secure platform that is built for
scalability, consistent control, and simplified management.
The FXOS chassis provides the following features:
• Modular chassis-based security system—provides high performance, flexible input/output
configurations, and scalability.
• Firepower Chassis Manager—graphical user interface provides streamlined, visual representation
of current chassis status and simplified configuration of chassis features.
• FXOS CLI—provides command-based interface for configuring features, monitoring chassis
status, and accessing advanced troubleshooting features.
The Cisco firepower (FP) 9300 security appliance is a modular, scalable, carrier-grade appliance that
includes the Chassis (including fans and power supply), Supervisor Blade (to manage the security
application running on the security module), network module (optional) and security module that contains
the security application which in this evaluation is the ASA. The FP4100 Series appliance is a complete
standalone, bundle unit that contains everything required above in one appliance. To manage the FP 9300
and 4100 Series appliances, FXOS provides a command-line interface (CLI) and a web GUI known as the
firepower chassis manager. The ASA installed on the security module is managed separately and is
described in the corresponding document specified in section 1.3.
This document is a supplement to the Cisco administrative guidance, which is comprised of the
installation and administration documents identified in section 1.3. This document supplements those
manuals by specifying how to install, configure and operate this product in the Common Criteria
evaluated configuration. This document is referred to as the operational user guide in the Network
Devices collaborative Protection Profile (NDcPP) v1.0 and meets all the required guidance assurance
activities from the NDcPP.
Cisco Preparative Procedures & Operational User Guide
1.1 Common Criteria (CC) Evaluated Configuration
The following sections describe the scope of evaluation, required configuration, assumptions, and
operational environment that the system must be in to ensure a secure deployment. To ensure the system
is in the CC evaluated configuration, the users must do the following:
Configure all the required system settings and default policy as documented in this guide.
Disable all the features that would violate the cPP requirements or would make the system
vulnerable to attacks as documented in this guide.
Ensure all the environmental assumptions in section 2 are met.
Ensure that your operational environment is consistent with section 2.
Follow the guidance in this document.
Cisco Preparative Procedures & Operational User Guide
Scope of Evaluation
The list below identifies features or protocols that are not evaluated and the rationale why. Note that this
does not mean the features cannot be used in the evaluated configuration. It means that the features were
not evaluated and/or validated by an independent third party and the functional correctness of the
implementation is vendor assertion.
The following features and protocols are not evaluated:
Telnet for management purposes – Telnet passes authentication credentials in clear text and is
disabled by default.
FXOS REST API—Allows users to programmatically configure and manage their chassis. The
Cisco Preparative Procedures & Operational User Guide
Cisco ASA for Firepower 4100 Quick Start Guide, Last Updated: May 9, 2016
Cisco ASA for Firepower 9300 Quick Start Guide, Last Updated: May 9, 2016
Cisco FXOS CLI Configuration Guide, 2.0(1), First Published: April 12, 2016
Cisco FXOS Firepower Chassis Manager Configuration Guide, 2.0(1), First Published: April 12, 2016
Cisco Firepower 4100 Series Hardware Installation Guide, Last Updated: April 6, 2016
Cisco Firepower 9300 Hardware Installation Guide, Last Updated: August 23, 2016
Cisco Adaptive Security Appliance (ASA) 9.6 Preparative Procedures & Operational User Guide for the
Common Criteria Certified configuration, Version 0.2, August 28, 2016
Cisco Common Criteria Supplemental User Guide, Version 0.1, September 8, 2016 [This Document]
Documentation References
The Cisco Firepower System documentation set includes online help and PDF files.
The following product guidance documents are provided online or by request:
At any time, you can type the ? character to display the options available at the current state of the
command syntax.
If you have not typed anything at the prompt, typing ? lists all available commands for the mode you are
in. If you have partially typed a command, typing ? lists all available keywords and arguments available
at your current position in the command syntax.
The most up-to-date versions of the documentation can be accessed on the Cisco Support web site
(http://www.cisco.com/c/en/us/support/index.html).
Cisco Preparative Procedures & Operational User Guide
2 Operational Environment
This section describes the components in the environment and assumptions made about the environment.
2.1 Operational Environment Components
The system can be configured to rely on and utilize a number of other components in its operational
environment.
Management Workstation (Required) – The system supports Command Line Interface (CLI) and
web access and as such an administrator would need a terminal emulator or SSH client
(supporting SSHv2) or web browser (supporting HTTPS) to utilize those administrative
interfaces.
Audit server – The system can be configured to deliver audit records to an external log server.
Authentication servers – The system can be configured to utilize external authentication servers.
Certificate Authority (CA) server – The system can be configured to import X.509v3 certificates
from a CA, e.g., for TLS connection to syslog server.
NTP server – The system can be configured to obtain time from a trusted time source.
DNS server – The system supports domain name service in the network.
Cisco Preparative Procedures & Operational User Guide
Environment Security
Objective
Operational Environment
Security Objective Definition
Administrator Responsibility
OE.PHYSICAL
Physical security, commensurate with the
value of the TOE and the data it contains,
is provided by the environment.
Administrators must ensure the system is
installed and maintained within a secure
physical location. This can include a
secured building with key card access or
within the physical control of an
authorized administrator in a mobile
environment.
OE.NO_GENERAL_PURPOSE
There are no general-purpose computing
capabilities (e.g., compilers or user
applications) available on the TOE, other
than those services necessary for the
operation, administration and support of
the TOE.
Administrators must not add any generalpurpose computing capabilities (e.g.,
compilers or user applications) to the
system.
OE.TRUSTED_ADMIN
TOE Administrators are trusted to follow
and apply all guidance documentation in
a trusted manner.
Administrators must be properly trained
in the usage and proper operation of the
system and all the enabled functionality.
These administrators must follow the
provided guidance.
OE.UPDATES
The TOE firmware and software is
updated by an administrator on a regular
basis in response to the release of product
updates due to known vulnerabilities.
Administrators must regularly update the
system to address any known
vulnerabilities.
OE.ADMIN_CREDENTIALS_
SECURE
The administrator’s credentials (private
key) used to access the TOE must be
protected on any other platform on which
they reside.
Administrators must protect their access
credentials where ever they may be.
2.2 Environmental Assumptions
The assumptions state the specific conditions that are expected to be met by the operational environment
and administrators.
Cisco Preparative Procedures & Operational User Guide
Audience
This document is written for administrators configuring the Cisco Firepower system 4100 and 9300. This
document assumes you are familiar with networks and network terminology, that you are a trusted
individual, and that you are trained to use the Internet and its associated terms and applications.
Cisco Preparative Procedures & Operational User Guide
4.1.2 Login to CLI Remotely
You can also connect to the FXOS CLI using SSH. The Firepower eXtensible Operating System supports
up to eight simultaneous SSH connections. To connect with SSH, you need to know the hostname or IP
address of the FXOS chassis.
Use one of the following syntax examples to log in with SSH client:
1) Initiate a SSHv2 connection to the appliance at hostname, where hostname corresponds to the
host name of the appliance. You can also use the IP address of the appliance.
The standard command prompt appears if the authentication was successful.
If authentication fails, access will be denied.
Audit Record:
Creation Time: 2015-07-09T08:20:17.030
User: internal
Session ID: internal
ID: 3330860
Action: Creation
Description: Fabric A: local user admin logged in from 172.23.33.113
Affected Object: sys/user-ext/sh-login-admin-pts_5_1_15135
Trigger: Session
Modified Properties: id:pts_5_1_15135, name:admin, policyOwner:local
4.1.3 Login to CLI Locally
You can connect to the FXOS CLI using a terminal plugged into the console port. Verify that the console
port parameters on the computer terminal (or console server) attached to the console port are as follows:
%AUTHPRIV-6-SYSTEM_MSG: 05[IKE] IKE_SA test2[3] established
2
4.2 Auditable Events
The appliances that are part of the Cisco FP 4100 and 9300 System generate an audit record for each user
interaction with the web interface, and also record system status messages in the system log. For the CLI,
the appliance also generates an audit record for every action executed.
Each appliance generates an audit event for each user interaction with the web interface and CLI
command executed. Each event includes at least a timestamp, the user name of the user whose action
generated the event, a source IP, and text describing the event. The common fields are described in the
table below. The required auditable events are also provided in the table below.
%AUTHPRIV-6-SYSTEM_MSG: 15[IKE] IKE SA key size (128) is less then
CHILD SA key size (256), sa strength violation - charon-custom
%AUTHPRIV-6-SYSTEM_MSG: 15[IKE] failed to establish CHILD_SA,
keeping IKE_SA - charon-custom
%AUTHPRIV-6-SYSTEM_MSG: 15[IKE] received AUTH_LIFETIME of
9850s, scheduling reauthentication in 8410s - charon-custom
2017 Jan 31 10:10:04 mio4-A %AUTHPRIV-6-SYSTEM_MSG: 15[IKE]
sending DELETE for ESP CHILD_SA with SPI cd365fb3 - char on-custom
FCS_SSHS_EXT.1
Failure to
establish an
SSH session
%FPRM-6-AUDIT: [session][internal][creation][internal][213987][sys/userext/sh-login-admin-pts_0_1_4614][id:pts_0_1_4614, name: USERNAME,
policyOwner:local][] Fabric A: local user USERNAME logged in from
IP_ADDRESS
%AUTHPRIV-6-SYSTEM_MSG: pam_unix(sshd:session): session closed for
user USERNAME – sshd[25700]
%AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed for user
USERNAME from IP_ADDRESS - sshd[3094]
Cisco Preparative Procedures & Operational User Guide
SFR
Auditable
Event
Actual Audited Event
FCS_TLSS_EXT.1
Failure to
establish an
TLS Session
%FPRM-6-AUDIT: [session][internal][creation][internal][211634][sys/userext/web-login-admin-web_60027_A][id:web_60027_A, name: USERNAME
policyOwner:local][] Web A: local user USERNAME logged in from
IP_ADDRESS
%FPRM-6-AUDIT: [session][internal][deletion][internal][1205449][sys/userext/user- USERNAME / term-web_27244_A][sys/user-ext/user- USERNAME
/term-web_27244_A][] Fabric A: user USERNAME terminated session id
ttyS0_1_3038
%AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed for user
USERNAME from IP_ADDRESS - httpd[8515]
%AUTHPRIV-5-SYSTEM_MSG: pam_unix(aaa:auth): authentication failure;
logname= uid=0 euid=0 tty= ruser= rhost= user= USERNAME - aaad
%LOCAL0-6-SYSTEM_MSG: authentication failed - httpd[8501]
%AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed for user
USERNAME from IP_ADDRESS - httpd[8501]
%AUTHPRIV-5-SYSTEM_MSG: Login failed for user USERNAME httpd[8501]
%USER-6-SYSTEM_MSG: [ssl:info] [pid 8926:tid 1823603600] SSL Library
Error: error:14076129:SSL routines:SSL23_GET_CLIENT_HELLO:only tls
allowed in fips mode - httpd[8926]
%USER-6-SYSTEM_MSG: [ssl:info] [pid 8926:tid 1823603600] [client
IP_ADDRESS:60782] AH01998: Connection closed to child 124 with abortive
shutdown (server IP_ADDRESS:443) - httpd[8926]
FIA_UIA_EXT.1
All use of the
identification
and
authentication
mechanism.
See FIA_UAU_EXT.2.
FIA_UAU_EXT.2
All use of the
identification
and
authentication
mechanism.
%FPRM-6-AUDIT: [session][internal][creation][internal][213524][sys/userext/sh-login-admin-ttyS0_1_6336][id:ttyS0_1_6336, name: USERNAME,
policyOwner:local][] Fabric A: local user USERNAME logged in from console
%AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed for user
USERNAME from console - login
Fabric A: user USERNAME terminated session id pts_0_1_7451
Affected Object: sys/user-ext/user-admin/term-pts_0_1_7451
FIA_X509_EXT.1
Unsuccessful
attempt to
validate a
%AUTHPRIV-6-SYSTEM_MSG: 11[IKE] sending end entity cert "C=US,
ST=CA, O=Cisco, OU=STBU, CN=D_NAME" - charon-custom
%AUTHPRIV-6-SYSTEM_MSG: 11[IKE] establishing CHILD_SA test -
Cisco Preparative Procedures & Operational User Guide
SFR
Auditable
Event
Actual Audited Event
certificate
charon-custom
%AUTHPRIV-6-SYSTEM_MSG: 07[IKE] received
AUTHENTICATION_FAILED notify error - charon-custom
FMT_MOF.1(1)/
TrustedUpdate
Any attempt
to initiate a
manual
update
%FPRM-6-EVENT: [E4197594][213626][transition][internal][]
[FSM:STAGE:SKIP]: Request to upgrade software on server 1/1(FSMSTAGE:sam:dme:ComputePhysicalAssociate:updateSspOsSoftware)
IP_ADDRESS 24/01 14:32:21.966
%FPRM-6-AUDIT:
[USERNAME][USERNAME][creation][pts_0_1_16141][229312][sys/userext/pre-login-banner][message:This is a CC test banner , policyOwner:local][]
PreLoginBanner created
Initiation of
update; result
of the update
attempt
(success or
failure)
%FPRM-6-EVENT: [E4197594][213626][transition][internal][]
[FSM:STAGE:SKIP]: Request to upgrade software on server 1/1(FSMSTAGE:sam:dme:ComputePhysicalAssociate:updateSspOsSoftware)
IP_ADDRESS 24/01 14:32:21.966
switch A: cmd: set clock oct 31 2016 6 20 0 from 2016-11-01T01:17:30.679,
logged in from console on term /dev/ttyS0: Local mgmt command executed
FTA_SSL_EXT.1
Any attempts
at unlocking
of an
interactive
session.
%FPRM-6-AUDIT: [session][internal][deletion][internal][1313572][sys/userext/user- USERNAME /term-ttyS0_1_7995][sys/user-ext/user-admin/termttyS0_1_7995][] Fabric A: system terminated session id ttyS0_1_7995 of user
USERNAME due to idle timeout
FTA_SSL.3
The
termination
of a remote
session by the
session
locking
mechanism.
%FPRM-6-AUDIT: [session][internal][deletion][internal][1204232][sys/userext/remoteuser- USERNAME /term-web_16073_A][sys/user-ext/remoteuserUSERNAME /term-web_16073_A][] Web A: system terminated Web session
id web_16073_A of user USERNAME due to idle timeout
FTA_SSL.4
The
termination
of an
interactive
session.
%FPRM-6-AUDIT: [session][internal][deletion][internal][1204385][sys/userext/user- USERNAME /term-pts_0_1_12413][sys/user-ext/user- USERNAME
/term-pts_0_1_12413][] Fabric A: system terminated session id
pts_0_1_12413 of user USERNAME due to idle timeout
%FPRM-6-AUDIT: [session][internal][deletion][internal][1205445][sys/userext/user- USERNAME /term-ttys0_1_3038][sys/user-ext/user- USERNAME
/term-ttys0_1_3038][] Fabric A: user USERNAME terminated session id
ttyS0_1_3038
FTP_ITC.1
Initiation of
the trusted
channel.
Termination
of the trusted
channel.
Failure of the
trusted
channel
functions.
IPSec
%AUTHPRIV-6-SYSTEM_MSG: 05[IKE] IKE_SA test2[3] established
between IP_ADDRESS [C=US, ST=CA, O=cisco, OU=STBU,
CN=D_NAME]...IP_ADDRESS [C=US, O=Luo, CN=D_NAME] - charon-
custom
2017 Jan 31 10:10:04 mio4-A %AUTHPRIV-6-SYSTEM_MSG: 15[IKE]
sending DELETE for ESP CHILD_SA with SPI cd365fb3 - char on-custom
%AUTHPRIV-6-SYSTEM_MSG: 15[IKE] failed to establish CHILD_SA,
keeping IKE_SA - charon-custom
TLS
%USER-6-SYSTEM_MSG: [ssl:info] [pid 8926:tid 1823603600] [client
IP_ADDRESS:60782] AH01964: Connection to child 124 established (server