Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com
go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any
2017–2019 Cisco Systems, Inc. All rights reserved.
About the FXOS CLI Command Reference Guide
This guide represents an on-going effort to document the many CLI commands in FXOS, and as such, should
be viewed as a work-in-progress. The guide will be republished periodically as new command descriptions
are added and existing descriptions updated or corrected.
Cisco Firepower 4100/9300 FXOS Command Reference
1
About the FXOS CLI Command Reference Guide
Cisco Firepower 4100/9300 FXOS Command Reference
2
CLI Overview
• Managed Objects, on page 4
• Command Modes, on page 5
• Object Commands, on page 7
• Complete a Command, on page 8
• Command History, on page 9
• Commit, Discard, and View Pending Commands, on page 10
• Inline Help for the CLI, on page 11
• CLI Session Limits, on page 12
Cisco Firepower 4100/9300 FXOS Command Reference
3
Managed Objects
Managed Objects
The Firepower eXtensible Operating System (FXOS) uses a managed object model, where managed objects
are abstract representations of physical or logical entities that can be managed. For example, chassis, security
modules, network modules, ports, and processors are physical entities represented as managed objects, and
licenses, user roles, and platform policies are logical entities represented as managed objects.
Managed objects may have one or more associated properties that can be configured.
CLI Overview
Cisco Firepower 4100/9300 FXOS Command Reference
4
CLI Overview
Command Modes
The CLI is organized into a hierarchy of command modes, with EXEC mode being the highest-level mode
of the hierarchy. Higher-level modes branch into lower-level modes. You use create, enter, and scope
commands to move from higher-level modes to modes in the next lower level, and you use the up command
to move up one level in the mode hierarchy. You can also use the top command to move to the top level in
the mode hierarchy.
Note
Most command modes are associated with managed objects, so you must create an object before you can
access the mode associated with that object. You use create and enter commands to create managed objects
for the modes being accessed. The scope commands do not create managed objects and can only access modes
for which managed objects already exist.
Each mode contains a set of commands that can be entered in that mode. Most of the commands available in
each mode pertain to the associated managed object.
Command Modes
The CLI prompt for each mode shows the full path down the mode hierarchy to the current mode. This helps
you to determine where you are in the command mode hierarchy, and it can be an invaluable tool when you
need to navigate through the hierarchy.
The following table lists the main command modes, the commands used to access each mode, and the CLI
prompt associated with each mode.
Table 1: Main Command Modes and Prompts
Mode PromptCommands Used to AccessMode Name
#top command from any modeEXEC
/adapter #scope adapter command from EXEC modeAdapter
/cabling #scope cabling command from EXEC modeCabling
/chassis #scope chassis command from EXEC modeChassis
Ethernet server domain
/eth-server #scope eth-server command from EXEC
mode; this command and all subcommands
are currently not supported
Ethernet uplink
/eth-uplink #scope eth-uplink command from EXEC
mode
Fabric interconnect
/fabric-interconnect #scope fabric-interconnect command from
EXEC mode
Firmware
/firmware #scope firmware command from EXEC
mode
Cisco Firepower 4100/9300 FXOS Command Reference
5
Command Modes
CLI Overview
Mode PromptCommands Used to AccessMode Name
Host Ethernet interface
Monitoring
Packet capture
Service profile
mode
Note
This command and all
subcommands are not supported
at this level; the Host Ethernet
interface commands are available
in /adapter # mode.
mode
EXEC mode
mode
Note
Do not alter or configure service
profiles; that is, do not use the
create, set, or delete
subcommand sets.
/host-eth-if #scope host-eth-if command from EXEC
/license #scope license command from EXEC modeLicense
/monitoring #scope monitoring command from EXEC
/org #scope org command from EXEC modeOrganization
/packet-capture #scope packet-capture command from
/security #scope security command from EXEC modeSecurity
/server #scope server command from EXEC modeServer
/service-profile #scope service-profile command from EXEC
/ssa #scope ssa command from EXEC modeSSA
/system #scope system command from EXEC modeSystem
Virtual HBA
Note
This command and all
/vhba #scope vhba command from EXEC mode
subcommands are currently not
supported.
/vnic #scope vnic command from EXEC modeVirtual NIC
Cisco Firepower 4100/9300 FXOS Command Reference
6
CLI Overview
Object Commands
Four general commands are available for object management:
• create object
• delete object
• enter object
• scope object
You can use the scope command with any managed object, whether a permanent object or a user-instantiated
object. The other commands allow you to create and manage user-instantiated objects. For every create object
command, a corresponding delete object and enter object command exists.
In the management of user-instantiated objects, the behavior of these commands depends on whether the
object exists, as described in the following tables:
Table 2: Command Behavior If The Object Does Not Exist
Object Commands
create object
delete object
enter object
scope object
Table 3: Command Behavior If The Object Exists
create object
delete object
enter object
scope object
BehaviorCommand
The object is created and its configuration mode, if applicable, is entered.
An error message is generated.
The object is created and its configuration mode, if applicable, is entered.
An error message is generated.
BehaviorCommand
An error message is generated.
The object is deleted.
The configuration mode, if applicable, of the object is entered.
The configuration mode of the object is entered.
Cisco Firepower 4100/9300 FXOS Command Reference
7
Complete a Command
Complete a Command
You can use the Tab key in any mode to complete a command. Partially typing a command name and pressing
Tab causes the command to be displayed in full or to the point where you must enter another keyword or an
argument value.
CLI Overview
Cisco Firepower 4100/9300 FXOS Command Reference
8
CLI Overview
Command History
The CLI stores all commands used in the current session. You can step through the previously used commands
by using the up-arrow or down-arrow keys. The up-arrow key moves to the previous command in the history,
and the down-arrow key moves to the next command in the history. When you get to the end of the history,
pressing the down-arrow key does nothing.
You can enter any command in the history again by stepping through the history to recall that command and
then pressing Enter. The command is entered as if you had manually typed it. You can also recall a command
and change it before you press Enter.
Command History
Cisco Firepower 4100/9300 FXOS Command Reference
9
Commit, Discard, and View Pending Commands
Commit, Discard, and View Pending Commands
When you enter a configuration command in the CLI, the command is not applied until you enter the
commit-buffer command. Until committed, a configuration command is pending and can be discarded by
entering a discard-buffer command.
You can accumulate pending changes in multiple command modes and apply them together with a single
commit-buffer command. You can view the pending commands by entering the show configuration pending
command in any command mode.
Note
All pending commands are checked for validity. However, if any queued command fails during commit, the
remaining commands are applied; failed commands are reported in an error message.
While any commands are pending, an asterisk (*) appears before the command prompt. The asterisk disappears
when you enter the commit-buffer command.
The following example shows how the prompts change during the command entry process:
Firepower# scope system
Firepower /system # scope services
Firepower /system/services # create ntp-server 192.168.200.101
Firepower /system/services* # show configuration pending
At any time, you can enter the ? character to display the options available at the current state of the command
syntax.
If you have not entered anything at the prompt, entering ? lists all available commands for the mode you are
in. With a partially entered command, entering ? lists all keywords and arguments available at your current
position in the command syntax.
Inline Help for the CLI
Cisco Firepower 4100/9300 FXOS Command Reference
11
CLI Session Limits
CLI Session Limits
FXOS limits the number of CLI sessions that can be active at one time to 32 total sessions. This value is not
configurable.
CLI Overview
Cisco Firepower 4100/9300 FXOS Command Reference
12
Filter and Save Show Output
• Save and Filter Show Command Output, on page 14
Cisco Firepower 4100/9300 FXOS Command Reference
13
Save and Filter Show Command Output
Save and Filter Show Command Output
You can save the output of show commands by redirecting the output to a text file. You can filter the output
of show commands by piping the output to filtering commands.
Saving and filtering output are available with all show commands but are most useful when dealing with
commands that produce a lot of text.
Filter Show Command Output
To filter the output of a show command, use the following subcommands. Note that in the following syntax
description, the initial vertical bar | after the show command is the pipe character and is part of the command,
not part of the syntax description. The filtering options are entered after the command’s initial | character.
• uniq—Discards all but one of successive identical lines.
• wc—Displays a count of lines, words, and characters.
expression
Cisco Firepower 4100/9300 FXOS Command Reference
14
Filter and Save Show Output
Note
Several of these subcommands have additional options that let you further control the filtering. For example,
with show configuration | head and show configuration | last, you can use the lines keyword to change the
number of lines displayed; the default is 10. As another example, with show configuration | sort, you can
add the option -u to remove duplicate lines from the output. (Complete descriptions of these options is beyond
the scope of this document; refer to the FXOS help output for the various commands, and to the appropriate
Linux help, for more information.)
Examples
The following example shows how to determine the number of lines currently in the system event log:
FP9300-A# show sel 1/1 | count
3008
FP9300-A#
Save Show Command Output
An expression, or pattern, is typically a simple text string. Do not enclose the expression in single or
double-quotes—these will be seen as part of the expression. Also, trailing spaces will be included in the
expression.
The following example shows how to display lines from the system event log that include the string “error”:
FP9300-A# show sel 1/1 | include error
968 | 05/15/2016 16:46:25 | CIMC | System Event DDR4_P2_H2_EC
C #0x99 | Upper critical - going high | Asserted | Reading 20
000 >= Threshold 20000 error
FP9300-A#
Related Topics
Save Show Command Output, on page 15
Save Show Command Output
You can save the output of show commands by redirecting the output to a text file.
show command[ > {ftp:|scp:|sftp:|tftp:|volatile: |workspace:}]|[ >> {volatile: |workspace:}]
Syntax Description
> {ftp:|scp:|sftp:|tftp:|volatile:
|workspace:}
Redirects the show command output to a specified text file
using the selected transport protocol.
After you enter the command, you are queried for remote
server name or IP address, user name, file path, and so on.
If you press Enter at this point, the output is saved locally.
>> {volatile: | workspace:}
Appends the show command output to the appropriate text
file, which must already exist.
Example
The following example attempts to save the current configuration to the system workspace; a configuration
file already exists, which you can choose to overwrite or not.
Cisco Firepower 4100/9300 FXOS Command Reference
15
Save Show Command Output
FP9300-A# show configuration > workspace
File already exists, overwrite (y/n)?[n]n
Reissue command with >> if you want to append to existing file
FP9300-A#
Related Topics
Filter Show Command Output, on page 14
Filter and Save Show Output
Cisco Firepower 4100/9300 FXOS Command Reference
16
Unsupported and Restricted Commands
• Unsupported Commands, on page 18
• Restricted Commands, on page 22
Cisco Firepower 4100/9300 FXOS Command Reference
17
Unsupported Commands
Unsupported Commands
The following commands, while visible in the CLI, are not supported. Entering any of these commands has
no effect.
EXEC (Top-level) Commands
# restore-check
# scope eth-server (and all subcommands)
# scope host-eth-if (the host-eth-if subcommands are available in /adapter mode)
# scope nh-test (and all subcommands)
# set nh-test
# show nh-test
# show registry-repository
Unsupported and Restricted Commands
# show ucspe-tech-support
# ucspe-copy
# vhba (and all subcommands)
Chassis Mode Commands
/chassis # scope iom
/chassis # show iom
/chassis # show post
Fabric Interconnect Mode Commands
/fabric-interconnect # scope fan
/fabric-interconnect # scope fan-module
/fabric-interconnect # scope psu
/fabric-interconnect # scope sw-uplink
/fabric-interconnect # show fan
/fabric-interconnect # show fan-module
/fabric-interconnect # show lan-neighbors
/fabric-interconnect # show psu
/fabric-interconnect # show san-neighbors
/fabric-interconnect # show sw-uplink
Organization Mode Commands
/org # scope auth-profile
Cisco Firepower 4100/9300 FXOS Command Reference
18
Unsupported and Restricted Commands
/org # scope fc-policy
/org # scope iqn-pool
/org # scope iscsi-policy
/org # scope kvm-mgmt-policy
/org # scope rackserver-disc-policy
/org # scope rackserver-mgmt-policy
/org # scope san-connectivity-policy
/org # scope storage-connection-policy
/org # scope udld-link-policy
/org # scope udld-system-settings
/org # scope uuid-suffix-pool
/org # scope vhba-beh-policy
/org # scope vhba-templ
Unsupported Commands
/org # scope vmq-conn-policy
/org # scope wwn-pool
/org # show fc-policy
/org # show fc-zone
/org # show iqn-pool
/org # show rackserver-disc-policy
/org # show rackserver-mgmt-policy
/org # show san-connectivity-policy
/org # show udld-link-policy
/org # show udld-system-settings
/org # show uuid-suffix-pool
/org # show vhba-beh-policy
/org # show vhba-templ
/org # show vmq-conn-policy
/org # show wwn-pool
Packet Capture Mode Commands
/packet-capture # show nh-test
Security Mode Commands
/security # create role
/security # delete role
Cisco Firepower 4100/9300 FXOS Command Reference
19
Unsupported Commands
Unsupported and Restricted Commands
Server Mode Commands
/server # show flexflash-controller
Service Profile Mode Commands
/service-profile # disassociate
/service-profile # rename-to
/service-profile # scope dynamic-vnic-conn
/service-profile # scope ext-pooled-ip
/service-profile # scope ext-static-ip
/service-profile # scope fc-zone
/service-profile # scope iscsi-boot
/service-profile # scope vhba
/service-profile # set dynamic-vnic-conn-policy
/service-profile # set ext-mgmt-ip-pool-name
/service-profile # set ext-mgmt-ip-state
/service-profile # set iscsi-identity
/service-profile # set kvm-mgmt-policy
/service-profile # set san-connectivity-policy-name
/service-profile # set src-templ-name
/service-profile # show dynamic-vnic-conn
/service-profile # show dynamic-vnic-conn-policy
/service-profile # show ext-pooled-ip
/service-profile # show ext-static-ip
/service-profile # show fc-zone
/service-profile # show initiator-group
/service-profile # show iscsi-boot
/service-profile # show iscsi-identity
/service-profile # show mgmt-iface
/service-profile # show vhba
/service-profile # show vnic-iscsi
System Mode Commands
/system # scope control-ep
/system # scope environment-features
/system # scope storage-features
Cisco Firepower 4100/9300 FXOS Command Reference
20
Unsupported and Restricted Commands
/system # scope vm-mgmt
/system # set virtual-ip
/system # show control-ep
Unsupported Commands
Cisco Firepower 4100/9300 FXOS Command Reference
21
Restricted Commands
Restricted Commands
Use of the following commands is restricted. Do not use any of these commands unless instructed to do so
by a member of the Cisco Technical Assistance Center (TAC).
Service Profile Mode Commands
Do not change any service profile configurations; specifically do not use any of the /service-profile #create, /service-profile # delete or /service-profile # set subcommands.
Unsupported and Restricted Commands
Cisco Firepower 4100/9300 FXOS Command Reference
22
PART I
A – R Commands
• A – C Commands, on page 25
• D – R Commands, on page 81
A – C Commands
• acknowledge fault, on page 27
• acknowledge server, on page 28
• acknowledge slot, on page 29
• activate firmware, on page 30
• backup sel, on page 31
• cancel, on page 32
• clear lock-status, on page 33
• clear password-history, on page 34
• clear sel, on page 35
• commit-buffer, on page 36
• connect adapter, on page 37
• connect asa, on page 38
• connect cimc, on page 40
• connect ftd, on page 42
• connect fxos, on page 44
• connect local-mgmt, on page 46
• connect module, on page 48
• connect vdp, on page 50
• create app-instance, on page 52
• create bootstrap-key FIREWALL_MODE, on page 53
• create bootstrap-key PERMIT_EXPERT_MODE, on page 54
• create certreq, on page 55
• create connection, on page 57
• create destination, on page 58
• create ip-block, on page 60
• create ipv6-block, on page 62
• create keyring, on page 64
• create local-user, on page 65
• create policy (callhome), on page 67
• create policy (flow control), on page 70
• create profile, on page 71
• create resource-profile, on page 73
• create ssh-server, on page 75
Cisco Firepower 4100/9300 FXOS Command Reference
25
• create subinterface, on page 76
• create trustpoint, on page 79
• cycle, on page 80
A – R Commands
Cisco Firepower 4100/9300 FXOS Command Reference
26
A – R Commands
acknowledge fault
To acknowledge a system fault, use the acknowledge fault command.
acknowledge fault id
acknowledge fault
Syntax Description
Command Modes
Command History
Usage Guidelines
Related Commands
fault id
The fault identification number. The range of valid values is 0 to
18446744073709551615.
Multiple modes
ModificationRelease
Command added.1.1(1)
Use the acknowledge fault command to acknowledge the existence of a fault.
Example
The following example shows how to acknowledge a fault:
Acknowledges a server on the device.acknowledge server
Acknowledges the existence of a slot in the device.acknowledge slot
Shows fault policy information.show fault
Cisco Firepower 4100/9300 FXOS Command Reference
27
acknowledge server
acknowledge server
To acknowledge a server, use the acknowledge server command.
acknowledge server {id|chassis/blade_id}
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
server
{id|chassis/blade_id}
To use the server identification number to identify the server to acknowledge,
provide the id.
To use the chassis and blade identification numbers to identify the server to
acknowledge, enter chassis/blade_id in n/n format.
Note
The chassis ID number is always 1.
EXEC
scope chassis/
ModificationRelease
Command added.1.1(1)
Use the acknowledge server command to verify the existence of a server in your network. For example, you
can acknowledge a server that was recently commissioned to ensure that it exists.
In chassis mode, you can use only the id variable to identify the server to be acknowledged.
Example
The following example shows how to acknowledge a server in module 2 while in chassis mode:
Verifies the existence of a slot that was recently commissioned.acknowledge slot
show server
The show server commands display a variety of server-related configuration
information.
Cisco Firepower 4100/9300 FXOS Command Reference
A – R Commands
acknowledge slot
To acknowledge a slot, use the acknowledge slot command.
acknowledge slot {id|chassis/blade_id}
acknowledge slot
Syntax Description
Command Modes
Command History
Usage Guidelines
slot {id|chassis/blade_id}
In chassis or fabric-interconnect mode, use the slot id to identify the module
to acknowledge.
In EXEC mode, use the chassis and blade identification numbers to identify
the slot to acknowledge; enter chassis/blade_id in n/n format.
Note
The chassis ID number is always 1.
EXEC
scope chassis/
scope fabric-interconnect/
ModificationRelease
Command added.1.1(1)
Use the acknowledge slot command to verify the existence of a slot that was recently commissioned to ensure
that it exists. In fabric-interconnect mode, you must use this command when an existing module is replaced
with one with a different product ID (PID).
In chassis and fabric-interconnect mode, you can use only the id variable to identify the slot to be acknowledged.
In EXEC mode, you can use only the chassis and blade identification (chassis/blade_id) numbers to identify
the slot to be acknowledged.
Related Commands
Example
The following example shows how to acknowledge a slot while in chassis mode:
Acknowledges the existence of a server in your network.acknowledge server
Cisco Firepower 4100/9300 FXOS Command Reference
29
activate firmware
activate firmware
To activate a firmware package, use the activate firmware command.
activate firmware version
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
Related Commands
version
Use its version number to specify the firmware package to be activated.
scope system/
ModificationRelease
Command added.1.1(1)
As part of the activation process, all CLI sessions will be terminated.
Example
This example shows how to activate a firmware package:
firepower# scope system
firepower /system # activate firmware 2.4(1.52)
As part of activation, all cli sessions will be terminated.
Continue with activation? (yes/no)
DescriptionCommand
Shows system firmware versions and status information.show firmware
Shows server firmware versions and status information.show server firmware
Cisco Firepower 4100/9300 FXOS Command Reference
30
A – R Commands
backup sel
backup sel
To back up the system event log (SEL), use the backup sel command.
backup sel {id|chassis/blade_id}
Syntax Description
Command Modes
Command History
Usage Guidelines
id
chassis/blade_id
The server ID. On 9300 devices, there may be up to 3 servers.
The appliance chassis number and blade number in x/y format.
Note
The chassis ID number is always 1.
Any command mode
ModificationRelease
Command added.1.1(1)
Use this command to back up the system event log (SEL) for a server.
In the command mode of a specific server (/chassis/server), you can run this command without any options.
Example
This example shows how to back up the SEL for server 2 in chassis 1:
firepower# backup sel 1/2
firepower* # commit-buffer
firepower#
Related Commands
DescriptionCommand
Clears the system event log (SEL) for a server.clear sel
Cisco Firepower 4100/9300 FXOS Command Reference
31
cancel
cancel
A – R Commands
To cancel a reservation request, use the cancel command.
cancel
Syntax Description
Command Modes
Command History
Usage Guidelines
Related Commands
This command has no arguments or keywords.
scope license/scope reservation/
ModificationRelease
Command added.1.1(1)
If you have already generated the authorization code, you must install it.
Example
This example shows how to cancel a reservation request:
firepower# scope license
firepower /license # scope reservation
firepower /license/reservation # cancel
Warning : If you have already generated the authorization code from CSSM, please abort the
cancellation by issuing discard-buffer and then install the authorization code.
To clear a user’s locked-out status, use the clear lock-status command in local user mode.
clear lock-status
clear lock-status
Syntax Description
Command Modes
Command History
Usage Guidelines
This command has no arguments or keywords.
Local user (/security/local-user)
ModificationRelease
Command added.1.1(1)
If any user (including admin users) exceeds the specified maximum number of login attempts, the user is
locked out of the system and must wait the specified amount of time before being allowed to log in, unless
you clear the user’s locked-out status.
Example
This example shows how to enter local user mode and specify the amount of time that must pass
before a locked-out user can log in.
Creates a new local user account.create local-user
Specifies the password for a user account.set password
Cisco Firepower 4100/9300 FXOS Command Reference
34
A – R Commands
clear sel
clear sel
To clear the system event log (SEL) for a server, use the clear sel command.
clear sel {id|chassis_id/blade_id}
Syntax Description
Command Modes
Command History
Usage Guidelines
id
chassis_id/blade_id
(Optional) The server ID. The 9300 devices have a maximum of 3 servers.
(Optional) The chassis number and blade number in n/n format.
Note
The chassis ID number is always 1.
Any command mode
ModificationRelease
Command added.1.4(1)
Use this command to clear the system event log (SEL) for a server.
In the command mode for a specific server (/chassis/server), you can run this command without specifying a
server.
Example
This example shows how to clear system event logs for server 1 in chassis 1 while in organization
mode.
FP9300-A # scope org Test
FP9300-A /org # clear sel 1/1
FP9300-A /org* # commit-buffer
FP9300-A /org #
Related Commands
DescriptionCommand
Backs up the system event log (SEL).backup sel
Cisco Firepower 4100/9300 FXOS Command Reference
35
commit-buffer
commit-buffer
To save or verify configuration changes, use the commit-buffer command.
commit-buffer [verify-only]
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
Related Commands
verify-only
(Optional) Verifies/validates buffer contents only; the contents are not
committed.
Any command mode
ModificationRelease
Command added.1.1(1)
Use this command to execute or verify all pending configuration changes. While any configuration changes
are pending, an asterisk (*) appears before the command prompt. When you enter the commit-buffer command,
the pending commands are committed and the asterisk disappears.
Example
This example shows how to save configuration changes:
Specifies the chassis, server (module) and adapter IDs (entered in n/n/n format).
On the Firepower 9300, the module number can be 1, 2, or 3. On the Firepower
4100, it is 1.
rack_server/id
Note
Specifies the rack number and module ID (entered in n/n format).
The chassis ID number is always 1.
Any command mode
ModificationRelease
Command added.1.1(1)
Use help to list available mezzanine adapter commands; use help command to view information about an
individual command.
Refer to connect adapter: Command List, on page 392 for additional information.
To exit the adapter mode, enter exit.
Example
The following example shows how to connect to the adapter command shell, and view available
commands:
Related Commands
firepower# connect adapter 1/1/1
adapter 1/1/1 # help
Available commands:
connect- Connect to remote debug shell
exit- Exit from subshell
help- List available commands
history- Show command history
show-fwlist- Show firmware versions on the adapter
show-identity- Show adapter identity
show-phyinfo- Show adapter phy info
show-systemstatus- Show adapter status
adapter 1/1/1 # exit
firepower#
DescriptionCommand
Returns you to the previous CLI mode.exit
Cisco Firepower 4100/9300 FXOS Command Reference
37
connect asa
connect asa
To connect to the ASA CLI, use the connect asa command.
connect asa [name]
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
name
(Optional) Specifies the ASA application instance name, which is the same as
the logical device name.
connect module/
ModificationRelease
2.4(1)
Added the name argument.
Command added.1.1(4)
See the ASA documentation for commands available from the CLI.
To exit the ASA console, enter Ctrl-a, d
Return to the supervisor level of the FXOS CLI:
Exit the console:
Enter ~, then quit to exit the Telnet application.
Example:
asa> Ctrl-a, d
Firepower-module1> ~
telnet> quit
firepower#
Exit the Telnet session:
Enter Ctrl-], .
Example:
asa> Ctrl-a, d
Firepower-module1> Ctrl-], .
firepower#
Example
This example shows how to connect to the ASA CLI on module 1:
firepower# connect module 1 console
Telnet escape character is '~'.
Trying 127.5.1.1...
Connected to 127.5.1.1.
Cisco Firepower 4100/9300 FXOS Command Reference
38
A – R Commands
connect asa
Escape character is '~'.
CISCO Serial Over LAN:
Close Network Connection to Exit
Firepower-module1> connect asa
asa>
Related Commands
DescriptionCommand
Connects to the FTD CLI.connect ftd
Connects to the module CLI.connect module
Connects to the vDP CLI.connect vdp
Cisco Firepower 4100/9300 FXOS Command Reference
39
connect cimc
connect cimc
To connect to the Cisco Integrated Management Controller (CIMC) command shell, use the connect cimc
command.
connect cimc {chassis_id/blade_id | rack_id}
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
chassis_id/blade_id
rack_id
Specifies the chassis and module numbers (entered in n/n format).
Note
The chassis ID number is always 1.
Specifies the rack number.
Any command mode
ModificationRelease
Command added.1.1(1)
Enter help to list available CIMC firmware debug utility commands; enter help command to view information
about an individual command. Enter exit to terminate the utility. Do not use this utility unless instructed to
do so by Cisco TAC. Refer to connect cimc: Command List, on page 394 for additional information.
Example
The following example shows how to connect to cimc mode and then list the available commands:
firepower# connect cimc 1/1
Trying 127.5.1.1...
Connected to 127.5.1.1.
Escape character is '^]'.
CIMC Debug Firmware Utility Shell [ support ]
[ help ]# help
__________________________________________
__________________________________________
Command List
__________________________________________
alarms
cores
dimmbl
exit
i2cstats
images
mctools
memory
messages
mrcout
network
obfl
post
power
Cisco Firepower 4100/9300 FXOS Command Reference
40
Debug Firmware Utility
A – R Commands
connect cimc
programmables
sensors
sel
fru
tasks
top
update
users
version
cert
sldp
help
help [COMMAND]
__________________________________________
Notes:
"enter Key" will execute last command
"COMMAND ?" will execute help for that command
__________________________________________
[ help ]# exit
Connection closed by foreign host.
firepower#
Related Commands
DescriptionCommand
Returns you to the previous CLI mode.exit
Cisco Firepower 4100/9300 FXOS Command Reference
41
connect ftd
connect ftd
A – R Commands
To connect to the Firepower Threat Defense (FTD) CLI, use the connect ftd command.
connect ftd name
Syntax Description
Command Modes
Command History
Usage Guidelines
name
Specifies the FTD application instance name, which is the same as the logical
device name. If you have multiple application instances for an application type,
you must specify the name of the instance. To view the instance names, enter
the command without a name.
connect module/
ModificationRelease
2.4(1)
Added the name argument. The escape character was changed to exit from
Ctrl-a, d.
Command added.1.1(4)
See the FTD documentation for commands available from the CLI.
To exit the FTD console, enter exit. For pre-2.4(1) versions, enter Ctrl-a, d
Return to the supervisor level of the FXOS CLI:
Exit the console:
Enter ~, then quit to exit the Telnet application.
This example shows how to connect to the FTD CLI on module 1:
Cisco Firepower 4100/9300 FXOS Command Reference
42
A – R Commands
connect ftd
firepower# connect module 1 console
Telnet escape character is '~'.
Trying 127.5.1.1...
Connected to 127.5.1.1.
Escape character is '~'.
CISCO Serial Over LAN:
Close Network Connection to Exit
Firepower-module1> connect ftd
>
Related Commands
DescriptionCommand
Connects to the ASA CLI.connect asa
Connects to the module CLI.connect module
Connects to the vDP CLI.connect vdp
Cisco Firepower 4100/9300 FXOS Command Reference
43
connect fxos
connect fxos
To connect to the fxos command shell, use the connect fxos command.
connect fxos [a]
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
a
(Optional) Connects to fabric a.
Note
The fabric ID is always a. If you omit the fabric ID, you are
connected to fabric A.
Any command mode
ModificationRelease
Command added.1.1(1)
To exit the fxos mode, enter exit.
Example
The following example shows how to connect to the fxos command shell, and view available
commands:
firepower# connect fxos
firepower(fxos)# ?
clearReset functions
cliCLI commands
debugDebugging functions
debug-filter Enable filtering for debugging functions
ethanalyzerConfigure cisco packet analyzer
noNegate a command or set its defaults
ntpNTP configuration
showShow running system information
systemSystem management commands
terminalSet terminal line parameters
testTest command
undebugDisable Debugging functions (See also debug)
endGo to exec mode
exitExit from command interpreter
popPop mode from stack or restore from name
pushPush current mode to stack or save it under name
whereShows the cli context you are in
Related Commands
44
firepower(fxos)# exit
firepower#
DescriptionCommand
Connects to a remote debug shell while connected to a specific adapter.connect local-mgmt
Cisco Firepower 4100/9300 FXOS Command Reference
A – R Commands
connect fxos
DescriptionCommand
Returns you to the previous CLI mode.exit
Cisco Firepower 4100/9300 FXOS Command Reference
45
connect local-mgmt
connect local-mgmt
To connect to the local-mgmt command shell, use the connect local-mgmt command.
connect local-mgmt [a]
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
a
(Optional) Connects to fabric a.
Note
The fabric ID is always a. If you omit the fabric ID, you are
connected to fabric A.
Any command mode
ModificationRelease
Command added.1.1(1)
Refer to connect local-mgmt: Command List, on page 409 for additional information.
To exit the local-mgmt mode, enter exit.
Example
The following example shows how to connect to the local-mgmt command shell, and view available
commands:
cdChange current directory
clearClear managed objects
clusterCluster mode
connectConnect to Another CLI
copyCopy a file
cpCopy a file
deleteDelete managed objects
dirShow content of dir
enableEnable
endGo to exec mode
eraseErase
erase-log-config Erase the mgmt logging config file
exitExit from command interpreter
fipsFIPS compliance
lsShow content of dir
mgmt-portManagement Port
mkdirCreate a directory
moveMove a file
mvMove a file
pingTest network reachability
ping6Test IPv6 network reachability
pwdPrint current directory
rebootReboots Fabric Interconnect
restore-checkCheck if in restore mode
rmRemove a file
rmdirRemove a directory
Cisco Firepower 4100/9300 FXOS Command Reference
46
A – R Commands
connect local-mgmt
run-scriptRun a script
showShow system information
shutdownShutdown
sshSSH to another system
tail-mgmt-logtail mgmt log file
telnetTelnet to another system
terminalTerminal
topGo to the top mode
tracerouteTraceroute to destination
traceroute6Traceroute to IPv6 destination
verifyVerify Application Image
firepower(local-mgmt)# exit
firepower#
Related Commands
DescriptionCommand
Connects to the FXOS command shell.connect fxos
Returns you to the previous CLI mode.exit
Cisco Firepower 4100/9300 FXOS Command Reference
47
connect module
connect module
To connect to the module command shell, use the connect module command.
connect module module_id {console | telnet}
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
console
Connects to the serial console. The benefit of a console connection is that it is
persistent.
module_id
telnet
On 9300 devices the module number can be 1, 2, or 3; on 4100 devices it is 1.
Connects using a Telnet connection. The benefits of using a Telnet connection
is that you can have multiple sessions to the module at the same time, and the
connection speed is faster.
Any command mode
ModificationRelease
Telnet support added.2.4(1)
Command added.1.1(1)
From the module CLI, you can connect to the application CLI using the connect application command.
Refer to connect module: Command List, on page 414 for additional information.
Example
The following example shows how to connect to the module 1 console, and view available commands:
firepower# connect module 1 console
Telnet escape character is '~'.
Trying 127.5.1.1...
Connected to 127.5.1.1.
Escape character is '~'.
CISCO Serial Over LAN:
Close Network Connection to Exit
Firepower-module1>?
secure-login=> Enable blade secure login
show=> Display system information. Enter show ? for options
config=> Configure the system. Enter config ? for options
terminalLength=> Terminal settings. Enter terminal ? for options
ping=> Ping a host to check reachability
nslookup=> Look up an IP address or host name with the DNS servers
traceroute=> Trace the route to a remote host
connect=> Connect to specific csp console (asa, etc)
The following example shows how to connect to the module 1 using Telnet, and view available
commands:
firepower# connect module 1 telnet
Type exit or Ctrl-] followed by . to quit.
Firepower-module1>?
secure-login=> Enable blade secure login
show=> Display system information. Enter show ? for options
config=> Configure the system. Enter config ? for options
terminalLength=> Terminal settings. Enter terminal ? for options
ping=> Ping a host to check reachability
nslookup=> Look up an IP address or host name with the DNS servers
traceroute=> Trace the route to a remote host
connect=> Connect to specific csp console (asa, etc)
support=> System file operations
testcrashinfo=> Test crashinfo support
exit=> Exit the session
help=> Get help on command syntax
Firepower-module1> <Ctrl-], .>
firepower#
Related Commands
DescriptionCommand
Connects to the ASA CLI.connect asa
Connects to the FTD CLI.connect ftd
Connects to the vDP CLI.connect vdp
Cisco Firepower 4100/9300 FXOS Command Reference
49
connect vdp
connect vdp
To connect to the Radware DefensePro (vDP) CLI, use the connect vdp command.
connect vdp [name]
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
name
(Optional) Specifies the vDP application instance name, which is the same as
the main application logical device/application instance name.
connect module/
ModificationRelease
2.4(1)
Added the name argument.
Command added.1.1(4)
See the vDP documentation for commands available from the CLI.
To exit the vDP console, enter Ctrl-], .
Return to the supervisor level of the FXOS CLI:
Exit the console:
Enter ~, then quit to exit the Telnet application.
This example shows how to connect to the vDP CLI on module 1:
firepower# connect module 1 console
Telnet escape character is '~'.
Trying 127.5.1.1...
Connected to 127.5.1.1.
Cisco Firepower 4100/9300 FXOS Command Reference
50
A – R Commands
connect vdp
Escape character is '~'.
CISCO Serial Over LAN:
Close Network Connection to Exit
Firepower-module1> connect vdp
Related Commands
DescriptionCommand
Connects to the ASA CLI.connect asa
Connects to the FTD CLI.connect ftd
Connects to the module CLI.connect module
Cisco Firepower 4100/9300 FXOS Command Reference
51
create app-instance
create app-instance
To define an application instance, use the create app-instance command.
create app-instance app_type app_name
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
app_name
The name of the application instance, between 1 and 64 characters. You will
use this device name when you create the logical device for this instance.
app_type
The application type, either asa, ftd, or vdp.
scope ssa/scope slot/
ModificationRelease
2.4(1)
The app_name argument is now required.
Command added.1.1(1)
You can set many parameters for this application instance, including the the image version, deployment type,
resource profile and mode. You can also enable, disable and restart the application.
Example
The following example shows how to set the image version for an FTD application instance:
Shows current application attributes.show app-attri
Cisco Firepower 4100/9300 FXOS Command Reference
A – R Commands
create bootstrap-key FIREWALL_MODE
To specify the firewall mode, routed or transparent, in the bootstrap configuration for the FTD and ASA, use
the create bootstrap-key FIREWALL_MODE command.
Bootstrap settings are meant for initial deployment only, or for disaster recovery. For normal operation, you
can change most values in the application CLI configuration.
Example
The following example shows how to set the mode to routed mode:
Expert Mode provides FTD shell access for advanced troubleshooting. By default for container instances,
Expert Mode is only available to users who access the FTD CLI from the FXOS CLI. This limitation is only
applied to container instances to increase isolation between instances. Use Expert Mode only if a documented
procedure tells you it is required, or if the Cisco Technical Assistance Center asks you to use it. To enter this
mode, use the expert command in the FTD CLI.
Example
The following example shows how to enable Expert Mode from SSH:
Creates the bootstrap configuration for the application.create mgmt-bootstrap
Sets the value for this command.set value
Cisco Firepower 4100/9300 FXOS Command Reference
A – R Commands
create certreq
To add a new keyring certificate request, use the create certreq command. If a request already exists for the
current keyring, the command will fail.
To edit an existing certificate request, use the enter certreq command.
You also can use the scope form of this command to enter an existing certificate request to assign or change
properties.
To delete an existing certificate request, use the delete form of this command.
create certreq [ip|subject-name]
delete certreq
enter certreq
scope certreq
create certreq
Syntax Description
Command Modes
Command History
Usage Guidelines
ip ip_address
subject-name name
scope security/scope keyring/
When you create a new keyring certificate request, you are automatically entered into certificate request mode
(security/keyring/certreq) with an asterisk indicating the new certificate request is not yet defined and committed.
You also can scope into certificate request mode for an existing keyring.
Use the set command in certificate request mode to specify certificate request parameters.
(Optional) Enter the ip keyword and the IPv4 address of the domain on which
this device resides. You will be asked to enter and confirm a password for the
request. This parameter applies only to the create certreq form of the
command.
(Optional) Enter the subject-name keyword and an identifier for this request;
for example, the appliance host name. You will be asked to enter and confirm
a password for the request. This parameter applies only to the create certreq
form of the command.
ModificationRelease
Command added.1.1(1)
Note
Before you create or commit a new certificate request, you must set the RSA key modulus (SSL key length)
using set modulus, on page 202.
Example
This example shows how to create a new keyring and its certificate request:
countryCountry name (2 letter code)
dnsDNS name (subject alternative name)
e-mailE-mail name
fi-a-ipCertificate request FI A ip address
fi-a-ipv6Certificate request FI A ipv6 address
fi-b-ipCertificate request FI B ip address
fi-b-ipv6Certificate request FI B ipv6 address
ipCertificate request ip address
ipv6Certificate request ipv6 address
localityLocality name (eg, city)
org-nameOrganisation name (eg, company)
org-unit-name Organisational Unit Name (eg, section)
passwordCertificate request password
stateState, province or county (full name)
subject-nameCertificate request subject name
Related Commands
firepower /security/keyring/certreq* # set
DescriptionCommand
Deletes an existing keyring certificate request.delete certreq
To add a new IPSec connection, use the create connection command. If a connection with the specified name
already exists, the command will fail.
To add or edit an IPSec connection, use the enter connection command. If the specified connection does not
exist, it is created and entered; if the connection exists, it is entered.
You also can use the scope form of this command to enter an existing connection to assign or change properties.
Generally, “scoping into” an object is more convenient than entering it, since the objectʼs name is usually all
that is needed, whereas the enter form of the command often requires entering all its definition parameters.
To delete an existing connection, use the delete form of this command.
create connection name
enter connection name
delete connection name
scope connection name
create connection
Syntax Description
Command Modes
Command History
Usage Guidelines
name
The connection name; can be up to 16 alphanumeric characters.
scope security/scope ipsec/
ModificationRelease
Command added.1.1(1)
When you create a new IPSec connection, you are automatically entered into security/ipsec/connection mode
with an asterisk indicating the new connection is not yet committed. You can configure the connection before
committing it.
After you create a connection, the name cannot be changed. You must delete the connection and create a new
one.
Example
This example shows how to create and enter a new IPSec connection:
Sets the IPSec connection administrative state to disabled or enabled.set adminstate
Shows current IPSec connection information.show connection
Cisco Firepower 4100/9300 FXOS Command Reference
57
create destination
create destination
To add a new Smart Call Home destination, use the create destination command. If a destination with the
specified name already exists, the command will fail.
To add or edit a Smart Call Home destination, use the enter destination command. If the specified destination
does not exist, it is created and entered; if the destination exists, it is entered.
You also can use the scope form of this command to enter an existing destination to assign or change properties.
Generally, “scoping into” an object is more convenient than entering it, since the objectʼs name is usually all
that is needed, whereas the enter form of the command often requires entering all its definition parameters.
To delete an existing destination, use the delete form of this command.
create destination name
delete destination name
enter destination name
scope destination name
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
Note
name
The name identifying the Smart Call Home destination.
scope monitoring/scope callhome/scope profile/
ModificationRelease
Command added.1.4(1)
When you create a new Smart Call Home destination, you are automatically entered into callhome/profile
mode (monitoring/callhome/profile) with an asterisk indicating the new destination is not yet committed. You
can set the destination parameters—transport protocol and an email address—and then commit the new
destination information.
An email address is the only allowed destination address in a callhome profile.
After you create a Smart Call Home destination, the destination name cannot be changed. You must delete
the destination and create a new one.
Example
This example shows how to create, enter and configure a Smart Call Home destination:
Deletes an existing Smart Call Home destination.delete destination
Enters a Smart Call Home destination.enter destination
Sets an email address for a Smart Call Home destination.set address
Sets the transport protocol for a Smart Call Home destination.set protocol
Cisco Firepower 4100/9300 FXOS Command Reference
59
create ip-block
create ip-block
To add a new block of IPv4 addresses for service access, use the create ip-block command. If an address
block with the specified properties already exists, the command will fail.
To add or edit a block of IPv4 addresses, use the enter ip-block command. If the specified address block does
not exist, it is created and entered; if the address block exists, it is entered.
You also can use the scope form of this command to enter an existing address block to assign or change
properties.
To delete an existing address block, use the delete form of this command.
The prefix length; determines the number of addresses in the block. Value can
be 0 to 32.
The service (HTTPS, SNMP, or SSH) to which the address block is assigned.https|snmp|ssh
scope system/scope services/
ModificationRelease
Command added.1.1(1)
Use this command to assign a block of IPv4 addresses to provide access to a specified service (HTTPS, SNMP,
or SSH).
When you create a new IP block, you are automatically entered into ip-block mode (system/services/ip-block)
with an asterisk indicating the new block assignment is not yet committed.
Up to 25 different blocks can be configured for each service. A address of 0.0.0.0 and a prefix of 0 allows
unrestricted access to a service. Each block of addresses is identified by its starting IPv4 addresss.
Example
This example shows how to create, enter and verify an IPv4 address block to provide SSH access:
firepower # scope system
firepower /system # scope services
firepower /system/services # enter ip-block 192.168.200.101 24 ssh
firepower /system/services/ip-block* # commit-buffer
firepower /system/services/ip-block # up
firepower /system/services # show ip-block
Permitted IP Block:
IP AddressPrefix Length Protocol
Cisco Firepower 4100/9300 FXOS Command Reference
60
A – R Commands
create ip-block
--------------- ------------- --------
0.0.0.00 https
0.0.0.00 snmp
0.0.0.00 ssh
192.168.200.10124 ssh
firepower /system/services #
Related Commands
DescriptionCommand
Creates an IPv6 address block.create ipv6-block
Deletes an existing IPv4 block.delete ip-block
Cisco Firepower 4100/9300 FXOS Command Reference
61
create ipv6-block
create ipv6-block
To add a new block of IPv6 addresses for service access, use the create ipv6-block command. If an address
block with the specified properties already exists, the command will fail.
To add or edit a block of IPv6 addresses, use the enter ipv6-block command. If the specified address block
does not exist, it is created and entered; if the address block exists, it is entered.
You also can use the scope form of this command to enter an existing address block to assign or change
properties.
To delete an existing address block, use the delete form of this command.
The prefix length; determines the number of addresses in the block. Value can
be 0 to 128.
The service (HTTPS, SNMP, or SSH) to which the address block is assigned.https|snmp|ssh
scope system/scope services/
ModificationRelease
Command added.1.1(1)
Use this command to assign a block of IPv6 addresses to provide access to a specified service (HTTPS, SNMP,
or SSH).
When you create a new IPv6 block, you are automatically entered into ipv6-block mode
(system/services/ipv6-block) with an asterisk indicating the new block assignment is not yet committed.
Up to 25 different blocks can be configured for each service. A address of 0:0:0:0:0:0:0:0 and a prefix of 0
allows unrestricted access to a service. Each block of addresses is identified by its starting IPv6 addresss.
Example
This example shows how to create, enter and verify an IPv6 address block to provide SSH access:
firepower # scope system
firepower /system # scope services
firepower /system/services # create ipv6-block 2001:DB8:1::1 64 ssh
firepower /system/services/ipv6-block* # commit-buffer
firepower /system/services/ipv6-block # up
firepower /system/services # show ipv6-block
Permitted IPv6 Block:
IPv6 Address Prefix Length Protocol
Cisco Firepower 4100/9300 FXOS Command Reference
62
A – R Commands
create ipv6-block
------------ ------------- --------
::0 https
::0 snmp
::0 ssh
2001:DB8:1::1
64 ssh
firepower /system/services #
Related Commands
DescriptionCommand
Creates an IPv4 block.create ip-block
Deletes an existing IPv6 block.delete ipv6-block
Cisco Firepower 4100/9300 FXOS Command Reference
63
create keyring
create keyring
To add a new RSA keyring, use the create keyring command. If a keyring with the specified name already
exists, the command will fail.
To edit an existing keyring, use the enter keyring command.
You also can use the scope form of this command to enter an existing keyring to assign or change properties.
To delete an existing keyring, use the delete form of this command.
create keyring name
delete keyring name
enter keyring name
scope keyring name
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
name
The name identifying the keyring; can be between 1 and 16 characters.
scope security/
ModificationRelease
Command added.1.1(1)
When you create a new keyring, you are automatically entered into keyring mode (security/keyring) with an
asterisk indicating the new keyring is not yet committed. You can create a keyring certificate request, and set
keyring parameters such as RSA key modulus and certificate authority trustpoint, and then commit the new
keyring information.
Example
This example shows how to create and enter a new RSA keyring:
firepower # scope security
firepower /security # enter keyring test_keyring
firepower /security/keyring* # set ?
To add a new local user account, use the create local-user command. If a local user account with the specified
name already exists, the command will fail.
To add or edit a local user account, use the enter local-user command. If the specified account does not exist,
it is created and entered; if the account exists, it is entered.
You also can use the scope form of this command to enter an existing local user account to assign or change
properties.
To delete an existing local user account, use the delete form of this command.
The ID to be used when logging into this local user account. Note the following
guidelines and restrictions when entering a user name:
• The name can contain between 1 and 32 characters, including the
following:
• Any alphabetic character
• Any numeral
• _ (underscore)
• - (dash)
• . (dot)
• The name must be unique.
• The name must start with an alphabetic character. It cannot start with a
number or a special character, such as an underscore.
• The name is case-sensitive.
• You cannot create an all-number name.
After you create a user account, you cannot change its name. You must delete
the user account and create a new one.
Command Modes
Command History
Usage Guidelines
scope security/
ModificationRelease
Command added.1.1(1)
You can configure up to 48 local user accounts. Each account must have a unique user name and password.
Cisco Firepower 4100/9300 FXOS Command Reference
65
create local-user
A – R Commands
When you create a new user account, you are automatically entered into local user mode (/security/local-user)
with an asterisk indicating the new account is not yet committed. You can specify additional user account
information such as password, first and last names, and so on, and then commit the new account information.
After you create the user account, the account name cannot be changed. You must delete the user account and
create a new one.
Example
This example shows how to enter security mode, enter a local user account (simultaneously creating
the new account since it does not exist), and then assigning first and last names to the account:
firepower # scope security
firepower /security # enter local-user test_user
firepower /security/local-user* # set firstname test
firepower /security/local-user* # set lastname user
firepower /security/local-user* # commit-buffer
firepower /security/local-user #
Related Commands
DescriptionCommand
Deletes an existing local user account.delete local-user
Specifies the date on which the user account expires.set expiration
Sets a password for the user account.set password
Cisco Firepower 4100/9300 FXOS Command Reference
66
A – R Commands
create policy (callhome)
To add a new Smart Call Home and Smart Licensing policy, use the create policy command. If a policy with
the specified name already exists, the command will fail.
To add or edit an IPSec connection, use the enter policy command. If the specified policy does not exist, it
is created and entered; if the policy exists, it is entered.
You also can use the scope form of this command to enter an existing policy to assign or change properties.
To delete an existing policy, use the delete form of this command.
When you create a new Smart Call Home policy, you are automatically entered into callhome/policy mode
(monitoring/callhome/policy) with an asterisk indicating the new policy is not yet committed. You can set
property values and enable/disable services, and then commit the new policy.
After you create a Smart Call Home policy, the policy name cannot be changed. You must delete the policy
and create a new one.
Use this command to create an instance of a policy for an existing type of fault or system event. The available
keywords for Call Home policy event types are:
• adaptor-mismatch
• arp-targets-config-error
• association-failed
• configuration-failure
The fault or system event type. See Usage Guidelines below for event options.
ModificationRelease
Command added.1.1(1)
• connectivity-problem
• election-failure
• equipment-degraded
• equipment-disabled
• equipment-inaccessible
• equipment-inoperable
Cisco Firepower 4100/9300 FXOS Command Reference
67
create policy (callhome)
A – R Commands
• equipment-offline
• equipment-problem
• equipment-removed
• fru-problem
• health-led-amber
• health-led-amber-blinking
• identity-unestablishable
• inventory-failed
• license-graceperiod-expired
• limit-reached
• link-down
• management-services-failure
• management-services-unresponsive
• memory-error
• mgmtif-down
• ndisc-targets-config-error
• near-max-limit
• port-failed
• power-problem
• psu-insufficient
• psu-mixed-mode
• thermal-problem
• version-incompatible
• vif-ids-mismatch
• voltage-problem
Example
This example shows how to create, enter and enable a Call Home policy instance for link-down
events:
Deletes an existing Smart Call Home policy.delete policy
Enables or disables the administrative state for a Smart Call Home policy.set admin-state
Cisco Firepower 4100/9300 FXOS Command Reference
69
create policy (flow control)
create policy (flow control)
To add a new named flow control policy, use the create policy command. If a policy with the specified name
already exists, the command will fail.
To add or edit a named flow control policy, use the enter policy command. If the specified policy does not
exist, it is created and entered; if the policy exists, it is entered.
You also can use the scope form of this command to enter an existing policy to assign or change properties.
To delete an existing policy, use the delete form of this command.
create policy name
delete policy name
enter policy name
scope policy name
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
name
A name to identify the flow control policy. The name can be from 1 to 32
characters.
scope eth-uplink/scope flow-control/
ModificationRelease
Command added.1.1(1)
When you create a new flow control policy, you are automatically entered into flow-control/policy mode
(eth-uplink/flow-control/policy) with an asterisk indicating the new policy is not yet committed. You can set
policy property values and then commit the new policy.
After you create a flow control policy, the policy name cannot be changed. You must delete the policy and
create a new one.
Example
This example shows how to create and enter a named policy for flow control:
Deletes an existing flow control policy.delete policy
In flow-control/policy mode, sets flow control policy properties.set
Shows property values for a flow control policy.show policy
Cisco Firepower 4100/9300 FXOS Command Reference
A – R Commands
create profile
To add a new Smart Call Home and Smart Licensing destination profile, use the create profile command. If
a profile with the specified name already exists, the command will fail.
To add or edit a destination profile, use the enter profile command. If the specified profile does not exist, it
is created and entered; if the profile exists, it is entered.
You also can use the scope form of this command to enter an existing profile to assign or change properties.
If the profile does not exist, the command will fail.
To delete an existing profile, use the delete form of this command.
create profile name
delete profile name
enter profile name
scope profile name
create profile
Syntax Description
Command Modes
Command History
Usage Guidelines
name
The name identifying the destination profile.
scope monitoring/scope callhome/
ModificationRelease
Command added.1.1(1)
When you create a new Smart Call Home profile, you are automatically entered into callhome/profile mode
(monitoring/callhome/profile) with an asterisk indicating the new profile is not yet committed. You can define
the profile, and then commit the new profile information.
After you create a Smart Call Home destination profile, the profile name cannot be changed. You must delete
the profile and create a new one.
Example
This example shows how to create and enter a Smart Call Home destination profile:
Deletes an existing Smart Call Home destination profile.delete profile
In monitoring/callhome mode, sets profile properties.set
Cisco Firepower 4100/9300 FXOS Command Reference
71
create profile
A – R Commands
DescriptionCommand
show profile
Lists currently defined Smart Call Home and Smart Licensing profiles; available
in monitoring/callhome mode.
Cisco Firepower 4100/9300 FXOS Command Reference
72
A – R Commands
create resource-profile
To add a resource profile for use with container instances, use the create resource-profile command.
create resource-profile name
create resource-profile
Syntax Description
Command Modes
Command History
Usage Guidelines
name
Sets the name of the profile between 1 and 64 characters. Note that you cannot
change the name of this profile after you add it.
scope ssa/
ModificationRelease
Command added.2.4(1)
To specify resource usage per container instance, create one or more resource profiles. When you deploy the
logical device/application instance, you specify the resource profile that you want to use. The resource profile
sets the number of CPU cores; RAM and disk space are dynamically allocated according to the number of
cores.
• The minimum number of cores is 6.
• You cannot specify 8 cores due to internal architecture.
• You can assign cores as an even number (6, 10, 12, 14 etc.) up to the maximum.
• The maximum number of cores available depends on the security module/chassis model.
The chassis includes a default resource profile called "Default-Small," which includes the minimum number
of cores. You can change the definition of this profile, and even delete it if it is not in use. Note that this profile
is created when the chassis reloads and no other profile exists on the system.
If you change the settings for a resource profile, then any instances that use the resource profile will reload,
which can take approximately 5 minutes.
If you change the resource profile settings after you add the FTD instance to the FMC, update the inventory
for each unit on the Devices > Device Management > Device > System > Inventory dialog box.
Example
The following example adds three resource profiles.
firepower# scope ssa
firepower /ssa # enter resource-profile basic
firepower /ssa/resource-profile* # set description "lowest level"
firepower /ssa/resource-profile* # set cpu-core-count 6
firepower /ssa/resource-profile* # exit
firepower /ssa # enter resource-profile standard
firepower /ssa/resource-profile* # set description "middle level"
firepower /ssa/resource-profile* # set cpu-core-count 10
firepower /ssa/resource-profile* # exit
firepower /ssa # enter resource-profile advanced
Cisco Firepower 4100/9300 FXOS Command Reference
73
create resource-profile
A – R Commands
firepower /ssa/resource-profile* # set description "highest level"
firepower /ssa/resource-profile* # set cpu-core-count 12
firepower /ssa/resource-profile* # commit-buffer
firepower /ssa/resource-profile #
Related Commands
DescriptionCommand
Sets the number of CPUs for the resource profile.set cpu-count
Assigned the resource profile to the application instance.set resource-profile-name
Shows resource usage for the security module/engine slot.show monitor detail
Shows resource allocation for the application instance.show resource detail
You can add between 250 and 500 VLAN subinterfaces to the chassis, depending on your network deployment.
VLAN IDs per interface must be unique, and within a container instance, VLAN IDs must be unique across
all assigned interfaces. You can reuse VLAN IDs on separate interfaces as long as they are assigned to different
container instances. However, each subinterface still counts towards the limit even though it uses the same
ID.
For native instances, you can create VLAN subinterfaces within the application only. For container instances,
you can also create VLAN subinterfaces inside the application on interfaces that do not have FXOS VLAN
subinterfaces defined, and these subinterfaces are not subject to the FXOS limit. Choosing in which operating
system to create subinterfaces depends on your network deployment and personal preference. For example,
to share a subinterface, you must create the subinterface in FXOS. Another scenario that favors FXOS
subinterfaces comprises allocating separate subinterface groups on a single interface to multiple instances.
For example, you want to use Port-Channel1 with VLAN 2-11 on instance A, VLAN 12-21 on instance B,
and VLAN 22-31 on instance C. If you create these subinterfaces within the application, then you would have
to share the parent interface in FXOS, which may not be desirable. See the following illustration that shows
the three ways you can accomplish this scenario:
Sets the ID between 1 and 4294967295. This ID will be appended to the parent
interface ID as interface_id.subinterface_id. For example, if you add a
subinterface to Ethernet1/1 with the ID of 100, then the subinterface ID will
be: Ethernet1/1.100. This ID is not the same as the VLAN ID, although you
can set them to match for convenience.
ModificationRelease
Command added.2.4(1)
Cisco Firepower 4100/9300 FXOS Command Reference
76
A – R Commands
create subinterface
You cannot add a subinterface to a physical interface that is currently allocated to a logical device. If other
subinterfaces of the parent are allocated, you can add a new subinterface as long as the parent interface itself
is not allocated.
Subinterfaces are supported on data or data-sharing type interfaces only.
Example
The following example creates 3 subinterfaces on Ethernet 1/1, and sets them to be data-sharing
interfaces.
Creates an EtherChannel (port channel).create port-channel
Enters the physical interface object.scope interface
Sets the interface type.set port-type
Sets the VLAN ID for a subinterface.set vlan
Cisco Firepower 4100/9300 FXOS Command Reference
78
A – R Commands
create trustpoint
To add a new trustpoint for validation of a certificate during Internet Key Exchange (IKE) authentication, use
the create trustpoint command. If a connection with the specified name already exists, the command will
fail.
To add or edit a trustpoint, use the enter trustpoint command. If the specified trustpoint does not exist, it is
created and entered; if the trustpoint exists, it is entered.
You also can use the scope form of this command to enter an existing trustpoint to assign or change properties.
To delete an existing trustpoint, use the delete form of this command.
create trustpoint name
delete trustpoint name
enter trustpoint name
scope trustpoint name
create trustpoint
Syntax Description
Command Modes
Command History
Usage Guidelines
name
The trustpoint name; can be up to 32 alphanumeric characters.
scope security/
ModificationRelease
Command added.1.1(1)
Use this command to identify trustpoints that will be used to validate certificates during Internet Key Exchange
(IKE) authentication.
When you create a new trustpoint, you are automatically entered into security/trustpoint mode with an asterisk
indicating the new trustpoint is not yet committed. After you create a trustpoint, the name cannot be changed.
You must delete the trustpoint and create a new one.
Example
This example shows how to create and enter a trustpoint:
Takes a network module offline or online.set adminstate
Cisco Firepower 4100/9300 FXOS Command Reference
80
D – R Commands
• decommission, on page 82
• delete, on page 83
• delete decommissioned server, on page 85
• deregister, on page 86
• disable, on page 87
• disable cc-mode, on page 88
• disable fips-mode, on page 89
• disable reservation, on page 90
• discard-buffer, on page 91
• download image, on page 92
• enable, on page 94
• enable cc-mode, on page 95
• enable fips-mode, on page 96
• enable reservation, on page 97
• end, on page 98
• enter, on page 99
• exit, on page 101
• install, on page 102
• install firmware, on page 103
• install platform, on page 105
• ping (connect local-mgmt), on page 106
• ping6 (connect local-mgmt), on page 108
• power, on page 110
• reboot, on page 111
• recommission, on page 113
• register, on page 114
• reinitialize, on page 115
• remove server, on page 116
• renew, on page 117
• request universal, on page 118
• return, on page 119
Cisco Firepower 4100/9300 FXOS Command Reference
81
decommission
decommission
To decommission a server, use the decommission server command.
decommission server {id|chassis_id/blade_id}
A – R Commands
Syntax Description
Usage Guidelines
Command Modes
Command History
Related Commands
id
chassis_id/blade_id
The server identification number. This is a value between 1 and 255.
The chassis and blade identification numbers in n/n format.
Depending on the type of device hosting the module to be decommissioned, identify it using its module ID
(4100 series), or the chassis number and module number (9300 devices).
Any command mode
ModificationRelease
Command added.1.4(1)
Example
This example shows how to decommission a server:
FP9300-A# decommission server 1/1
FP9300-A* # commit-buffer
FP9300-A #
DescriptionCommand
Deletes a decommissioned server.delete decommissioned
Recommissions a decommissioned server.recommission
Shows any decommissioned servers.show server
decommissioned
Cisco Firepower 4100/9300 FXOS Command Reference
82
A – R Commands
delete
delete
To delete an existing managed object, use the relevant delete command in the appropriate command mode.
delete object_type name [parameters]
Syntax Description
Command Modes
Command History
Usage Guidelines
object_type
The type of object to be deleted. Examples include local user account and
organization.
name
parameters
The name of the specific object to be deleted.
(Optional) Any additional properties or parameters needed to identify the
object. Refer to the description of the create command for the specific object
type for more information.
Depends on the type of object being deleted; refer to the description of the create command for the specific
object type for more information.
Refer to the description of the create command for the specific object type for history information.
Objects are abstract representations of physical components or logical entities that can be managed. For
example, the chassis, security modules, network modules, ports, and processors are physical components
represented as managed objects, while licenses, user roles, and platform policies are logical entities represented
as managed objects.
FXOS provides four general commands for managing objects: create, delete, enter, and scope. For example,
you can create a local user account, you can delete a local user account, and you can enter a local user account
to assign or change properties for that account; you also can “scope into” the local user account to assign or
change properties.
Generally, the keywords and options available to each of these object-management commands are the same,
so we detail only the create version of the various object commands. In other words, for information about
the delete command for a particular object, refer to the description of the create command for that object.
For example, refer to create local-user, on page 65 for information related to deleting an existing local user
account.
Related Commands
Example
This example shows how to enter security mode and then delete a local user account:
Creates a new local user account.create local-user
Cisco Firepower 4100/9300 FXOS Command Reference
83
delete
A – R Commands
DescriptionCommand
Adds or edits a local user account.enter local-user
Deletes an existing local user account.delete local-user
Enters a existing local user account.scope local-user
Cisco Firepower 4100/9300 FXOS Command Reference
84
A – R Commands
delete decommissioned server
To delete a decommissioned server, use the delete decommissioned server command.
delete decommissioned server vendor model serial_number
delete decommissioned server
Syntax Description
Command Modes
Command History
Related Commands
vendor
The name of the company that manufactured the server; can be no more than
510 characters.
model
serial_number
The module’s model name; can be no more than 510 characters.
The module’s serial number; can be no more than 510 characters.
Any command mode
ModificationRelease
Command added.1.4(1)
Example
This example shows how to delete a decommissioned server.
FP9300-A # delete decommissioned server Cisco Systems, Inc.
Cisco Firepower 9000 Series Security Module
FLM1949C6J1
FP9300-A* # commit-buffer
DescriptionCommand
Decommissions a server.decommission server
Cisco Firepower 4100/9300 FXOS Command Reference
85
deregister
deregister
A – R Commands
To remove this Firepower 4100/9300 device from your Cisco Smart Software License account, use the
deregister command.
deregister
Syntax Description
Command Modes
Command History
Usage Guidelines
Related Commands
This command has no arguments or keywords.
License mode
ModificationRelease
Command added.1.1(1)
Deregistration removes the device from your account, and all license entitlements and certificates on the
device are removed. You can use this to free up a license for a new Firepower 4100/9300, or you can remove
the device from the Smart Software Manager.
Use this command to disable an application instance without removing it from the system.
Example
This example shows how to display current application instances, including their status, then enter
application instance mode and disable an application instance:
Enters application mode for a specific application instance.scope app-instance
Cisco Firepower 4100/9300 FXOS Command Reference
87
disable cc-mode
disable cc-mode
To disable Common Criteria mode, use the disable cc-mode command.
disable cc-mode
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
Related Commands
This command has no arguments or keywords.
Security (/security) mode
ModificationRelease
Command added.1.1(1)
A reboot of the system will be required after this command is committed.
Example
This example shows how to enter security mode and disable Common Criteria mode:
FP9300-A # scope security
FP9300-A /security # disable cc-mode
Warning: A reboot of the system is required in order for the system to be
operating in a non-CC approved mode.
FP9300-A /security* #
DescriptionCommand
Enables Common Criteria mode.enable cc-mode
Shows current Common Criteria mode admin and operational states.show cc-mode
Cisco Firepower 4100/9300 FXOS Command Reference
88
A – R Commands
disable fips-mode
To disable FIPS (Federal Information Processing Standard) mode, use the disable fips-mode command.
disable fips-mode
disable fips-mode
Syntax Description
Command Modes
Command History
Usage Guidelines
Related Commands
This command has no arguments or keywords.
Security (/security) mode
ModificationRelease
Command added.1.1(1)
A reboot of the system will be required after this command is committed.
Example
This example shows how to enter security mode and disable FIPS mode:
FP9300-A # scope security
FP9300-A /security # disable fips-mode
Warning: A reboot of the system is required in order for the system to be
operating in a non-FIPS approved mode.
FP9300-A /security* #
DescriptionCommand
Enables FIPS mode.enable fips-mode
Shows current FIPS mode admin and operational states.show fips-mode
Cisco Firepower 4100/9300 FXOS Command Reference
89
disable reservation
disable reservation
To disable permanent license reservation, use the disable reservation command.
disable reservation
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
Related Commands
This command has no arguments or keywords.
License (/license) mode
ModificationRelease
Command added.1.1(1)
Enable license reservation before attempting to assign a permanent license to your Firepower 4100/9300
chassis.
Example
This example shows how to enter license mode and disable reservation mode:
FP9300-A # scope license
FP9300-A /license # disable reservation
Warning: If you have already generated the authorization code from CSSM
and have not installed it on the device, please abort this command by
issuing discard-buffer and complete the installation.
FP9300-A /license* #
To cancel pending configuration changes, use the discard-buffer command.
discard-buffer
discard-buffer
Syntax Description
Command Modes
Command History
Usage Guidelines
This command has no arguments or keywords.
Any command mode
ModificationRelease
Command added.1.1(1)
Use this command to cancel and discard all uncommitted configuration changes. While any configuration
commands are pending, an asterisk (*) appears before the command prompt. When you enter the discard-buffer
command, the commands are discarded and the asterisk disappears.
Example
This example shows how to discard pending configuration changes:
To copy an FXOS firmware image to the Firepower 4100/9300 chassis, use the download image command
in firmware mode.
To copy a logical device software image to the Firepower 4100/9300 chassis, use the download image
command in application software (/ssa/app-software) mode.
(Optional) Specifies the URI of an image file to be imported via FTP (File
Transfer Protocol).
(Optional) Specifies the URI of an image file to be imported via SCP (Secure
Copy Protocol).
(Optional) Specifies the URI of an image file to be imported via SFTP (SSH
File Transfer Protocol or Secure File Transfer Protocol).
(Optional) Specifies the URI of an image file to be imported via TFTP (Trivial
File Transfer Protocol).
Note
(Optional) Specifies the path to an image file to be imported from a connected
USB Type A device.
(Optional) Specifies the path to an image file to be imported from a connected
USB Type B device.
TFTP has a file size limitation of 32 MB. Because firmware bundles
can be much larger than that, we recommend that you do not use
TFTP for firmware downloads.
Command History
Usage Guidelines
92
ModificationRelease
Command added.1.1(1)
Be sure you have the location address and authentication credentials for image file access, as well as the fully
qualified name of the file.
FXOS stores firmware images in bootflash on the fabric interconnect.
In firmware mode, you can use the show package image_name detail command to monitor the image download
process. The output display does not refresh automatically, so you may have to enter the command multiple
times until the task State is “Downloaded.”
In firmware mode, and in application software mode, you can use the show download-task command to
monitor the image download process. The output display does not refresh automatically, so you may have to
enter the command multiple times.
Cisco Firepower 4100/9300 FXOS Command Reference
A – R Commands
download image
Examples
This example shows how to download a firmware image file using the SCP protocol, and monitor
the download progress:
Use this command to re-enable an application instance that was previously disabled.
Example
This example shows how to display current application instances, including their status, then enter
application instance mode and enable a disabled application:
Enters application mode for a specific application instance.scope app-instance
Cisco Firepower 4100/9300 FXOS Command Reference
A – R Commands
enable cc-mode
To enable Common Criteria mode, use the enable cc-mode command.
enable cc-mode
enable cc-mode
Syntax Description
Command Modes
Command History
Usage Guidelines
Important
This command has no arguments or keywords.
Security mode
ModificationRelease
Command added.1.1(1)
Connectivity to one or more services may be denied when this command is committed. Also, a reboot of the
system will be required.
Prior to FXOS release 2.0.1, the existing SSH host key created during first-time setup of a device was
hard-coded to 1024 bits. To comply with FIPS and Common Criteria certification requirements, you must
destroy this old host key and generate a new one (see create ssh-server, on page 75 for information about
creating and deleting SSH host keys). If you do not perform these additional steps, you will not be able to
connect to the Supervisor using SSH after the device has rebooted with Common Criteria mode enabled. If
you performed initial setup using FXOS 2.0.1 or later, you do not have to generate a new host key.
Example
This example shows how to enter security mode and enable Common Criteria mode:
FP9300-A # scope security
FP9300-A /security # enable cc-mode
Warning: Connectivity to one or more services may be denied when committed.
Please consult the product's CC Security Policy documentation.
WARNING: A reboot of the system is required in order for the system to be operating in a
CC approved mode.
Related Commands
FP9300-A /security* #
DescriptionCommand
Disables Common Criteria mode.disable cc-mode
Shows current Common Criteria mode administrative and operational states.show cc-mode
Cisco Firepower 4100/9300 FXOS Command Reference
95
enable fips-mode
enable fips-mode
To enable FIPS (Federal Information Processing Standard) mode, use the enable fips-mode command.
enable fips-mode
A – R Commands
Syntax Description
Command Modes
Command History
Usage Guidelines
Important
This command has no arguments or keywords.
Security mode
ModificationRelease
Command added.1.1(1)
Connectivity to one or more services may be denied when this command is committed. Also, a reboot of the
system will be required.
Prior to FXOS release 2.0.1, the existing SSH host key created during first-time setup of a device was
hard-coded to 1024 bits. To comply with FIPS and Common Criteria certification requirements, you must
destroy this old host key and generate a new one (see create ssh-server, on page 75 for information about
creating and deleting SSH host keys). If you do not perform these additional steps, you will not be able to
connect to the Supervisor using SSH after the device has rebooted with Common Criteria mode enabled. If
you performed initial setup using FXOS 2.0.1 or later, you do not have to generate a new host key.
Example
This example shows how to enter security mode and enable FIPS mode:
FP9300-A # scope security
FP9300-A /security # enable fips-mode
Warning: Connectivity to one or more services may be denied when committed.
Please consult the product's FIPS Security Policy documentation.
WARNING: A reboot of the system is required in order for the system to be operating in a
FIPS approved mode.
Related Commands
96
FP9300-A /security* #
DescriptionCommand
Disables FIPS mode.disable fips-mode
Shows current FIPS mode administrative and operational states.show fips-mode
Cisco Firepower 4100/9300 FXOS Command Reference
A – R Commands
enable reservation
To enable permanent license reservation, use the enable reservation command.
enable reservation
enable reservation
Syntax Description
Command Modes
Command History
Usage Guidelines
Related Commands
This command has no arguments or keywords.
License (/license) mode
ModificationRelease
Command added.1.1(1)
Enable license reservation before attempting to assign a permanent license to your Firepower 4100/9300
chassis.
Example
This example shows how to enter license mode and enable reservation mode: