PDF

Contents
Introduction
Prerequisites
Requirements
Components Used
Background Information
Supported Hardware Platforms
ISR G2 Devices with UCS-E Blades
ISR 4000 Devices with UCS-E Blades
Licenses
Limitations
Configure
Network Diagram
Workflow for FirePOWER Services on UCS-E
Configure the CIMC
Connect to the CIMC
Configure the CIMC
Install ESXi
Install the vSphere Client
Download the vSphere Client
Launch the vSphere Client
Deploy the FireSIGHT Management Center and FirePOWER Devices
Configure the Interfaces
Configure the vSwitch Interfaces on the ESXi
Register the FirePOWER Device with the FireSIGHT Management Center
Redirect and Verify Traffic
Redirect Traffic from the ISR to the Sensor on the UCS-E
Verify Packet Redirection
Verify
Troubleshoot
Related Information
Introduction
This document describes how to install and deploy Cisco FirePOWER software on a Cisco Unified
Computing System E Series (UCS-E) blade platform in Instusion Detection System (IDS) mode.
The configuration example that is described in this document is a supplement to the official user
guide.
Prerequisites
Requirements
There are no specific requirements for this document.
Components Used
The information in this document is based on these software and hardware versions:
●
Cisco Integrated Services Routers (ISR) XE image 3.14 or later
●
Cisco Integrated Management Controller (CIMC) Version 2.3 or later
●
Cisco FireSIGHT Management Center (FMC) Version 5.2 or later
●
Cisco FirePOWER Virtual Device (NGIPSv) Version 5.2 or later
●
VMware ESXi Version 5.0 or later
Note: Before you upgrade the code to Version 3.14 or later, ensure that the system
has sufficient memory, disk space, and a license for the upgrade. Refer to the Example 1:
Copy the image to flash: from TFTP server section of the Access Routers Software Upgrade
Procedures Cisco document in order to learn more about code upgrades.
In order to upgrade the CIMC, BIOS, and other firmware components, you can use either the
Cisco Host Upgrade Utility (HUU), or you can upgrade the firmware components manually.
In order to learn more about the firmware upgrade, refer to the Upgrading the Firmware on
Cisco UCS E-Series Servers section of the Host Upgrade Utility User Guide for Cisco UCS
E-Series Servers and the Cisco UCS E-Series Network Compute Engine.
Background Information
This section provides information about the supported hardware platforms, licenses, and
limitations in regards to the components and procedures that are described in this document.
Supported Hardware Platforms
This section lists the supported hardware platforms for G2 and 4000 Series devices.
ISR G2 Devices with UCS-E Blades
These ISR G2 Series devices with UCS-E Series blades are supported:
Product
Platform
2911
Cisco 2900
Series ISR
2921
2951
Cisco 3900
Series ISR
3925
3925E
UCS-E Model
UCS-E 120/140 single wide option
UCS-E 120/140/160/180 single or double
option
UCS-E 120/140/160 single or double wide
option
UCS-E 120/140/160 single and double wi
option or 180 double wide
UCS-E 120/140/160 single and double wi
option or 180 double wide
UCS-E 120/140/160 single and double wi
option or 180 double wide
UCS-E 120/140/160 single and double wi
option or 180 double wide
3945
3945E
ISR 4000 Devices with UCS-E Blades
These ISR 4000 Series devices with UCS-E Series blades are supported:
Product
Platform
Cisco 4400 Series 4451
ISR
4431
4351
Cisco 4300 Series
ISR
4331
4321
UCS-E Model
UCS-E 120/140/160 single and double wide option or 180
double wide
UCS-E Network Interface Module
UCS-E 120/140/160/180 single and double wide option o
double wide
UCS-E 120/140 single wide option
UCS-E Network Interface Module
Licenses
The ISR must have a security K9 license, as well as an appx license, in order to enable the
service.
Limitations
Here are two limitations in regards to the information that is described in this document:
●
Multicast is not supported.
Only 4,096 Bridge Domain Interfaces (BDI) are supported for each system.
The BDIs do not support these features:
●
●
Bidirectional Forwarding Detection (BFD) protocol
●
Netflow
●
Quality of Service (QoS)
●
Network-Based Application Recognition (NBAR) or Advanced Video Coding (AVC)
●
Zone Based Firewall (ZBF)
●
Cryptographic VPNs
●
Multiprotocol Label Switching (MPLS)
●
Point-to-Point Protocol (PPP) over Ethernet (PPPoE)
Note: For a BDI, the Maximum Transmission Unit (MTU) size can be configured with any
value between 1,500 and 9,216 bytes.
Configure
This section describes how to configure the components that are involved with this deployment.
Network Diagram
The configuration that is described in this document uses this network topology:
Workflow for FirePOWER Services on UCS-E
Here is the workflow for FirePOWER services that run on a UCS-E:
1. The data-plane pushes traffic for inspection out from the BDI/UCS-E interface (works for G2
and G3 Series devices).
2. The Cisco IOS-XE CLI activates packet redirection for analysis (options for all interfaces or
per-interface).
3. The sensor CLI setup startup script simplifies the configuration.
Configure the CIMC
This section describes how to configure the CIMC.
Connect to the CIMC
There are multiple ways to connect to the CIMC. In this example, the connection to the CIMC is
completed via a dedicated management port. Ensure that you connect the M port (dedicated) to
the network with the use of an Ethernet cable. Once connected, enter the hw-module subslot
command from the router prompt:
ISR-4451#hw-module subslot 2/0 session imc
IMC ACK: UCSE session successful for IMC
Establishing session connect to subslot 2/0
To exit, type ^a^q
picocom v1.4
port is : /dev/ttyDASH1
flowcontrol : none
baudrate is : 9600
parity is : none
databits are : 8
escape is : C-a
noinit is : no
noreset is : no
nolock is : yes
send_cmd is : ascii_xfr -s -v -l10
receive_cmd is : rz -vv
Terminal ready
Tip: In order to exit, enter ^a^q.
Configure the CIMC
Use this information in order to complete the configuration of the CIMC:
Unknown# scope cimc
Unknown /cimc # scope
Unknown /cimc/network
Unknown /cimc/network
Unknown /cimc/network
Unknown /cimc/network
Unknown /cimc/network
Unknown /cimc/network
Unknown /cimc/network
Unknown /cimc/network
Unknown /cimc/network
network
# set dhcp-enabled no
*# set dns-use-dhcp no
*# set mode dedicated
*# set v4-addr 172.16.1.8
*# set v4-netmask 255.255.255.0
*# set v4-gateway 172.16.1.1
*# set preferred-dns-server 64.102.6.247
*# set hostname 4451-UCS-E
*# commit
Caution: Enure that you enter the commit command in order to save the changes.
Note: The mode is set to dedicated when the management port is used.
Enter the show detail command in order to verify the detail settings:
4451-UCS-E /cimc/network # show detail
Network Setting:
IPv4 Address: 172.16.1.8
IPv4 Netmask: 255.255.255.0
IPv4 Gateway: 172.16.1.1
DHCP Enabled: no
Obtain DNS Server by DHCP: no
Preferred DNS: 64.102.6.247
Alternate DNS: 0.0.0.0
VLAN Enabled: no
VLAN ID: 1
VLAN Priority: 0
Hostname: 4451-UCS-E
MAC Address: E0:2F:6D:E0:F8:8A
NIC Mode: dedicated
NIC Redundancy: none
NIC Interface: console
4451-UCS-E /cimc/network #
Launch the web interface of the CIMC from a browser with the default username and password.
The default username and password are:
●
Username: admin
●
Password: password
Install ESXi
After you log into the user interface of the CIMC, you are able to view a page similar to that shown
in the next image. Click the Launch KVM Console icon, click add image, and then map the ESXi
ISO as the virtual media:
Click the Virtual Media tab, and then click Add Image in order to map the virtual media:
After the virtual media is mapped, click Power Cycle Server from the CIMC home page in order to
power-cycle the UCS-E. The ESXi setup launches from the virtual media. Complete the ESXi
install.
Note: Record the ESXi IP address, Username, and Password for future reference.
Install the vSphere Client
This section describes how to install the vSphere client.
Download the vSphere Client
Launch ESXi and use the Download VSphere Client link in order to download the vSphere client.
Install it on your computer.
Launch the vSphere Client
Launch the vSphere Client from your computer. Log in with the username and password that you
created during installation:
Deploy the FireSIGHT Management Center and FirePOWER Devices
Complete the procedures that are described in the Deployment of FireSIGHT Management Center
on VMware ESXi Cisco document in order to deploy a FireSIGHT Management Center on the
ESXi.
Note: The process that is used in order to deploy a FirePOWER NGIPSv device is similar to
the process that is used in order to deploy a Management Center.
Configure the Interfaces
On the Dual-Wide UCS-E, there are four interfaces:
●
The highest MAC address interface is Gi3 on the front panel.
●
The second highest MAC address interface is Gi2 on the front panel.
The last two that appear are the internal interfaces.
On the Single-Wide UCS-E, there are three interfaces:
●
●
The highest MAC address interface is Gi2 on the front panel.
The last two that appear are the internal interfaces.
Both of the UCS-E interfaces on the ISR4K are trunk ports.
●
The UCS-E 120S and 140S have three Network Adaptor plus Management Ports:
●
The vmnic0 is mapped to UCSEx/0/0 on the router backplane.
●
The vmnic1 is mapped to UCSEx/0/1 on the router backplane.
●
The vmnic2 is mapped to the UCS-E front plane GE2 interface.
The front-panel management (M) port can only be used for the CIMC.
The UCS-E 140D, 160D, and 180D have four Network Adaptors:
●
●
The vmnic0 is mapped to UCSEx/0/0 on the router backplane.
●
The vmnic1 is mapped to UCSEx/0/1 on the router backplane.
●
The vmnic2 is mapped to the UCS-E front plane GE2 interface.
●
The vminc3 is mapped to the UCS-E front plane GE3 interface.
●
The front-panel management (M) port can only be used for the CIMC.
Configure the vSwitch Interfaces on the ESXi
The vSwitch0 on the ESXi is the management interface through which the ESXi, FireSIGHT
Management Center, and the FirePOWER NGIPSv device communicate to the network. Click
Properties for the vSwitch1 (SF-Inside) and the vSwitch2 (SF-Outside) in order to make any
changes.
This image shows the properties of the vSwitch1 (you must complete the same steps for the
vSwitch2):
The vSwtich configuration on the ESXi is complete. Now you must verify the interface settings:
1. Navigate to the virtual machine for the FirePOWER device.
2. Click Edit virtual machine settings.
3. Verify all of the three network adapters.
4. Ensure that they are properly chosen, as shown here:
Register the FirePOWER Device with the FireSIGHT Management Center
Complete the procedures that are described in the Cisco document in order to register a
FirePOWER device with a FireSIGHT Management Center.
Redirect and Verify Traffic
This section describes how to redirect traffic and how to verify the packets.
Redirect Traffic from the ISR to the Sensor on the UCS-E
Use this information in order to redirect the traffic:
interface GigabitEthernet0/0/1
ip address dhcp
negotiation auto
!
interface ucse2/0/0
no ip address
no negotiation auto
switchport mode trunk
no mop enabled
no mop sysid
service instance 1 ethernet
encapsulation untagged
bridge-domain 1
!
interface BDI1
ip unnumbered GigabitEthernet0/0/1
end
!
utd
mode ids-global
ids redirect interface BDI1
Note: If you currently run Version 3.16.1 or later, use the utd engine advanced command
instead of the utd command.
Verify Packet Redirection
From the ISR console, enter this command in order to verify whether the packet counters
increment:
cisco-ISR4451#
show plat hardware qfp active feature utd stats
Drop Statistics:
Stats were all zero
General Statistics:
Pkts Entered Policy 6
Pkts Entered Divert 6
Pkts Entered Recycle Path 6
Pkts already diverted 6
Pkts replicated 6
Pkt already inspected, policy check skipped 6
Pkt set up for diversion 6
Verify
You can use these show commands in order to verify that your configuration works properly:
●
show plat software utd global
●
show plat software utd interfaces
●
show plat software utd rp active global
●
show plat software utd fp active global
●
show plat hardware qfp active feature utd stats
●
show platform hardware qfp active feature utd
Troubleshoot
You can use these debug commands in order to troubleshoot your configuration:
●
debug platform condition feature utd controlplane
●
debug platform condition feature utd dataplane submode
Related Information
●
●
●
●
●
●
Getting Started Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series
Network Compute Engine, Release 2.x
Troubleshooting Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series
Network Compute Engine
Getting Started Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series
Network Compute Engine, Release 2.x – Upgrading Firmware
Cisco ASR 1000 Series Aggregation Services Routers Software Configuration Guide –
Configuring Bridge Domain Interfaces
Host Upgrade Utility User Guide for Cisco UCS E-Series Servers and the Cisco UCS ESeries Network Compute Engine – Upgrading the Firmware on Cisco UCS E-Series
Servers
Technical Support & Documentation - Cisco Systems