Cisco FTDv
Description | A Cisco FTDv connected to two Alpine Linux Hosts |
Components | Cisco FTDV, Multitool Alpine Linux |
Resource requirements1 | 4 8 GB |
Topology file | ftdv01.yml |
Name | ftdv01 |
Version information2 | Cisco_Secure_Firewall_Threat_Defense_Virtual-7.2.5-208.qcow2 , docker:24.0.6 |
Description#
This lab consists of one Cisco FTDv firewall connected to two Alpine Linux nodes.
Configuration#
The FTDv node takes about 1-2 minutes to complete its start up. Check using "docker container ls" until the FTDv container shows up as "healthy".
# docker container ls
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
5682d73984d1 vrnetlab/vr-ftdv:7.2.5 "/launch.py --userna…" 34 minutes ago Up 34 minutes (healthy) 22/tcp, 80/tcp, 443/tcp, 5000/tcp, 8305/tcp, 10000-10099/tcp clab-ftdv01-ftdv1
1ebe3dae6846 wbitt/network-multitool:alpine-extra "/bin/sh /docker-ent…" 34 minutes ago Up 34 minutes 80/tcp, 443/tcp, 1180/tcp, 11443/tcp clab-ftdv01-client1
9726c9bb9e21 wbitt/network-multitool:alpine-extra "/bin/sh /docker-ent…" 34 minutes ago Up 34 minutes 80/tcp, 443/tcp, 1180/tcp, 11443/tcp clab-ftdv01-client2
ftdv1#
Log into the FTDv node using the Web UI and add the following configuration. Password is Admin@123
.
- Click "Skip device setup" on the initial screen.
- In the dialog window "Are you sure you want to skip device setup?" check the "Start 90-day evaluation" box, select the "FTDv5 - Tiered" performance tier, and click "Confirm".
- In the "Interfaces" menu configure GigabitEthernet0/0 with the
192.168.1.1/30
IP, and GigabitEthernet0/1 with the192.168.2.1/30
IP. - Go to the "Policies" menu and add a test "allow all" policy (all fields should be left empty, and the action should be "allow").
- Deploy pending changes.
client1#
The two clients should be configured with the correct IP addresses and a route to the other client via the FTDv node. First attach to the container process docker exec -it clab-ftdv01-client1 ash
docker exec -it clab-ftdv01-client1 ash
# ip -br a show dev eth1
eth1@if3749 UP 192.168.1.2/30 fe80::a8c1:abff:feee:be5c/64
# ip r
default via 172.20.20.1 dev eth0
172.20.20.0/24 dev eth0 proto kernel scope link src 172.20.20.4
192.168.1.0/30 dev eth1 proto kernel scope link src 192.168.1.2
192.168.2.0/30 via 192.168.1.1 dev eth1
Verification#
Traceroute from client1 to client2 to verify the data-plane via the FTDv node.