index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
397
null
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
398
CHAPTER 15 Connection Settings This chapter describes how to configure connection settings for connections that go through the ASA, or for management connections that go to the ASA. • What Are Connection Settings?, on page 377 • Configure Connection Settings, on page 378 • Monitoring Connections, on page 399 • History ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
399
from predicting the next ISN for a new connection and potentially hijacking the new session. You can disable randomization per traffic class if desired. • TCP Normalization—The TCP Normalizer protects against abnormal packets. You can configure how some types of packet abnormalities are handled by traffic class. • TCP ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
400
Configure Global Timeouts You can set the global idle timeout durations for the connection and translation slots of various protocols. If the slot has not been used for the idle time specified, the resource is returned to the free pool. Changing the global timeout sets a new default timeout, which in some cases can be ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
401
• timeout sip_media hh:mm:ss—The idle time until an SIP media port connection closes. This duration must be at least 1 minute. The default is 2 minutes. The SIP media timer is used for SIP RTP/RTCP with SIP UDP media packets, instead of the UDP inactivity timeout. • timeout sip-provisional-media hh:mm:ss—The timeout va...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
402
You can limit the number of embryonic connections to help prevent SYN flooding attacks. An embryonic connection is a connection request that has not finished the necessary handshake between source and destination. When the embryonic connection threshold of a connection is crossed, the ASA acts as a proxy for the server...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
403
In the default configuration, the global_policy policy map is assigned globally to all interfaces. If you want to edit the global_policy, enter global_policy as the policy name. For the class map, specify the class you created earlier in this procedure. Step 3 Set the embryonic connection limits. • set connection embry...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
404
history sampling data. The ASA samples the number of attacks 30 times during the rate interval, so for the default 30 minute period, statistics are collected every 60 seconds. • clear threat-detection statistics tcp-intercept—Erases TCP Intercept statistics. Example: hostname(config)# show threat-detection statistics t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
405
Step 2 Configure the TCP map criteria by entering one or more of the following commands. The defaults are used for any commands you do not enter. Use the no form of a command to disable the setting. • check-retransmission—Prevent inconsistent TCPretransmission. This command is disabled by default. • checksum-verificati...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
406
• syn-data {allow | drop}—Allow or drop SYN packets with data. The default is to allow the packet. • tcp-options {md5 | mss | selective-ack | timestamp | window-scale | range lower upper} action—Set the action for packets with TCP options. These options are named: md5, mss, selective-ack (selective acknowledgment mecha...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
407
policy-map name class name Example: hostname(config)# class-map normalization hostname(config-cmap)# match any hostname(config)# policy-map global_policy hostname(config-pmap)# class normalization In the default configuration, the global_policy policy map is assigned globally to all interfaces. If you want to edit the ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
408
Bypass TCP State Checks for Asynchronous Routing (TCP State Bypass) If you have an asynchronous routing environment in your network, where the outbound and inbound flow for a given connection can go through two different ASA devices, you need to implement TCP State Bypass on the affected traffic. However, TCP State Byp...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
409
If you have asymmetric routing configured on upstream routers, and traffic alternates between two ASA devices, then you can configure TCPstate bypass for specific traffic. TCPstate bypass alters the way sessions are established in the fast path and disables the fast path checks. This feature treats TCP traffic much as ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
410
hostname(config)# class-map bypass-class hostname(config-cmap)# match access-list bypass Step 2 Add or edit a policy map that sets the actions to take with the class map traffic, and identify the class map. policy-map name class name Example: hostname(config)# policy-map global_policy hostname(config-pmap)# class bypas...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
411
Disable TCP Sequence Randomization Each TCP connection has two ISNs: one generated by the client and one generated by the server. The ASA randomizes the ISN of the TCP SYN passing in both the inbound and outbound directions. Randomizing the ISN of the protected host prevents an attacker from predicting the next ISN for...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
412
In the default configuration, the global_policy policy map is assigned globally to all interfaces. If you want to edit the global_policy, enter global_policy as the policy name. For the class map, specify the class you created earlier in this procedure. Step 3 Disable TCP sequence number randomization on the class: set...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
413
• (Transparent mode only.) Multicast flows for bridge groups that contain two and only two interfaces. Reverse flows for offloaded flows are also offloaded. Flow Offload Limitations Not all flows can be offloaded. Even after offload, a flow can be removed from being offloaded under certain conditions. Following are som...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
414
processed normally. This is called a collision. Use the show flow-offloadflow command in the CLI to display statistics for this situation. Conditions for reversing offload After a flow is offloaded, packets within the flow are returned to the ASA for further processing if they meet the following conditions: • They incl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
415
saved and the system has been rebooted. ciscoasa(config)# write memory ciscoasa(config)# reload Step 2 Create the service policy rule that identifies traffic that is eligible for offload. a) Create an L3/L4 class map to identify the traffic that is eligible for flow offload. Matching by access-list or port would be the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
416
Example The following example classifies all TCPtraffic from the 10.1.1.0 255.255.255.224 subnet as eligible for offload and attaches the policy to the outside interface. hostname(config)# access-list offload permit tcp 10.1.1.0 255.255.255.224 any hostname(config)# class-map flow_offload hostname(config-cmap)# match a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
417
Before you begin If you want to customize the TCP Normalizer, create the required TCP Map before proceeding. The set connectioncommand (for connection limits and sequence randomization) and set connectiontimeout commands are described here separately for each parameter. However, you can enter the commands on one line, ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
418
• set connection per-client-max n—(TCP, UDP, SCTP.) The maximum number of simultaneous connections allowed per client, between 0 and 2000000. The default is 0, which allows unlimited connections. This argument restricts the maximum number of simultaneous connections that are allowed for each host that is matched to the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
419
For systems that are operating in a high-availability configuration, we recommend that you do not set the interval to less than one minute (0:1:0). If the connection needs to be moved between systems, the changes required take longer than 30 seconds, and the connection might be deleted before the change is accomplished...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
420
hostname(config)# service-policy global_policy global The global keyword applies the policy map to all interfaces, and interface applies the policy to one interface. Only one global policy is allowed. You can override the global policy on an interface by applying a service policy to that interface. You can only apply o...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
421
• show threat-detection statistics top tcp-intercept [all | detail] View the top 10 protected servers under attack. The all keyword shows the history data of all the traced servers. The detail keyword shows history sampling data. The ASA samples the number of attacks 30 times during the rate interval,so for the default...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
422
Feature Name Platform Releases Description You can now configure how long the system should maintain a connection when the route used by the connection no longer exists or is inactive. If the route does not become active within this holddown period, the connection is freed. You can reduce the holddown timer to make rou...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
423
Feature Name Platform Releases Description You can now specify actions for the TCP MSS and MD5 options in a packet’s TCP header when configuring a TCP map. In addition, the default handling of the MSS, timestamp, window-size, and selective-ack options has changed. Previously, these options were allowed, even if there w...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
424
CHAPTER 16 Quality of Service Have you ever participated in a long-distance phone call that involved a satellite connection? The conversation might be interrupted with brief, but perceptible, gaps at odd intervals. Those gaps are the time, called the latency, between the arrival of packets being transmitted over the ne...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
425
• Priority queuing—For critical traffic that cannot tolerate latency, such as Voice over IP (VoIP), you can identify traffic for Low Latency Queuing (LLQ) so that it is always transmitted ahead of other traffic. See Priority Queuing, on page 404. What is a Token Bucket? A token bucket is used to manage a device that re...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
426
How QoS Features Interact You can configure each of the QoSfeatures alone if desired for the ASA. Often, though, you configure multiple QoSfeatures on the ASA so you can prioritize some traffic, for example, and prevent other traffic from causing bandwidth problems. You can configure: Priority queuing (for specific tra...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
427
Configure QoS Use the following sequence to implement QoS on the ASA. Procedure Step 1 Determine the Queue and TX Ring Limits for a Priority Queue, on page 406. Step 2 Configure the Priority Queue for an Interface, on page 407. Step 3 Configure a Service Rule for Priority Queuing and Policing, on page 409. Determine th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
428
__________ Queue limit (# of packets) __________ = Delay (ms) __________ x Average packetsize (bytes) ___________ ÷ # of bytes/ms from Step 1 2 TX Ring Limit Worksheet The following worksheet shows how to calculate the TX ring limit. This limit determines the maximum number of packets allowed into the Ethernet transmit...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
429
• (ASA 5512-X through ASA 5555-X)Priority queuing is notsupported on the Management 0/0 interface. Procedure Step 1 Create the priority queue for the interface. priority-queue interface_name Example: hostname(config)# priority-queue inside The interface_name argument specifies the physical interface name on which you w...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
430
Examples The following example establishes a priority queue on interface “outside” (the GigabitEthernet0/1 interface), with the default queue-limit and tx-ring-limit: hostname(config)# priority-queue outside The following example establishes a priority queue on the interface “outside” (the GigabitEthernet0/1 interface)...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
431
Step 2 Create an L3/L4 class map to identify the traffic for which you want to perform priority policing. class-map name match parameter Example: hostname(config)# class-map policing_traffic hostname(config-cmap)# match access-list policing If you use an ACL for traffic matching, policing is applied in the direction sp...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
432
• conform-action—(Optional.) Sets the action to take when the traffic is below the policing rate and burst size. You can drop or transmit the traffic. The default is to transmit the traffic. • exceed-action—(Optional.) Sets the action to take when traffic exceeds the policing rate and burst size. You can drop or transm...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
433
QoS Priority Statistics To view statistics for service policies implementing the priority command, use the show service-policy priority command. hostname# show service-policy priority Global policy: Service-policy: global_fw_policy Interface outside: Service-policy: qos Class-map: TG1-voice Priority: Interface outside:...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
434
Configuration Examples for Priority Queuing and Policing The following sections provide examples of configuring priority queuing and policing. Class Map Examples for VPN Traffic In the following example, the class-map command classifies all non-tunneled TCP traffic, using an ACL named tcp_traffic: hostname(config)# acc...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
435
polices the tunnel. In this example, the “host-specific” traffic is rate-limited before the tunnel, then the tunnel is rate-limited: hostname(config)# access-list host-over-l2l extended permit ip any host 192.168.10.10 hostname(config)# class-map host-specific hostname(config-cmap)# match access-list host-over-l2l Prio...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
436
History for QoS Feature Name Platform Releases Description We introduced QoS priority queuing and policing. We introduced the following commands: priority-queue,queue-limit, tx-ring-limit, priority, police, show priority-queue statistics, show service-policy police, show service-policy priority, show running-config pri...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
437
CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6 416 Connection Management and Threat Detection History for QoS
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
438
CHAPTER 17 Threat Detection The following topics describe how to configure threat detection statistics and scanning threat detection. • Detecting Threats, on page 417 • Guidelines for Threat Detection, on page 419 • Defaults for Threat Detection, on page 420 • Configure Threat Detection, on page 421 • Monitoring Threat...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
439
Basic Threat Detection Statistics Using basic threat detection statistics, the ASA monitors the rate of dropped packets and security events due to the following reasons: • Denial by ACLs. • Bad packet format (such as invalid-ip-header or invalid-tcp-hdr-length). • Connection limits exceeded (both system-wide resource l...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
440
Scanning Threat Detection A typical scanning attack consists of a host that tests the accessibility of every IP address in a subnet (by scanning through many hosts in the subnet or sweeping through many ports in a host or subnet). The scanning threat detection feature determines when a host is performing a scan. Unlike...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
441
Defaults for Threat Detection Basic threat detection statistics are enabled by default. The following table lists the default settings. You can view all these default settings using the show running-config all threat-detection command. For advanced statistics, by default, statistics for ACLs are enabled. Table 18: Basi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
442
Configure Threat Detection Basic threat detection statistics are enabled by default, and might be the only threat detection service that you need. Use the following procedure if you want to implement additional threat detection services. Procedure Step 1 Configure Basic Threat Detection Statistics, on page 421. Basic t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
443
100 Configure Advanced Threat Detection Statistics You can configure the ASA to collect extensive statistics. By default, statistics for ACLs are enabled. To enable other statistics, perform the following steps. Procedure Step 1 (Optional) Enable all statistics. threat-detection statistics To enable only certain statis...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
444
Example: hostname(config)# threat-detection statistics host number-of-rate 2 hostname(config)# threat-detection statistics port number-of-rate 2 hostname(config)# threat-detection statistics protocol number-of-rate 3 Step 4 (Optional) Configure statistics for attacks intercepted by TCP Intercept. threat-detectionstatis...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
445
Step 2 (Optional) Set the duration of the shun for attacking hosts. threat-detection scanning-threat shun duration seconds Example: hostname(config)# threat-detection scanning-threat shun duration 2000 Step 3 (Optional) Change the default event limit for when the ASA identifies a host as an attacker or as a target. thr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
446
The only exception to this rule is if the number of events in the unfinished burst interval already exceeds the number of events in the oldest burst interval (#1 of 30) when calculating the total events. In that case, the ASA calculates the total events as the last 29 complete intervals, plus the events so far in the u...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
447
Command Purpose Displays the top 10 statistics. If you do not enter any options, the top 10 statistics are shown for all categories. The min-display-rate min_display_rate argument limits the display to statisticsthat exceed the minimum display rate in events per second. You can set the min_display_rate between 0 and 21...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
448
Command Purpose Displays statistics for all ports or for a specific port or range of ports. show threat-detection statistics [min-display-rate min_display_rate] port [start_port[-end_port]] Displays statistics for all IP protocols or for a specific protocol. The protocol_number argument is an integer between 0 and 255....
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
449
Field Description tot-ses The total number of sessions for this host since it was added to the database. act-ses The total number of active sessions that the host is currently involved in. The number of firewall drops. Firewall drops is a combined rate that includes all firewall-related packet drops tracked in basic th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
450
Field Description The total number of events over each rate interval. The unfinished burst interval presently occurring is not included in the total events. The only exception to this rule is if the number of events in the unfinished burst interval already exceeds the number of events in the oldest burst interval (#1 o...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
451
hostname# show threat-detection scanning-threat Latest Target Host & Subnet List: 192.168.1.0 (l2l) 192.168.1.249 (l2l) Latest Attacker Host & Subnet List: 192.168.10.234 (outside) 192.168.10.0 (outside) 192.168.10.2 (outside) 192.168.10.3 (outside) 192.168.10.4 (outside) 192.168.10.5 (outside) 192.168.10.6 (outside) 1...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
452
History for Threat Detection Feature Name Platform Releases Description Basic and advanced threat detection statistics, scanning threat detection was introduced. The following commands were introduced: threat-detection basic-threat, threat-detection rate, show threat-detection rate, clear threat-detection rate, threat-...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
453
Feature Name Platform Releases Description You can now customize the number of rate intervals for which statistics are collected. The default number of rates was changed from 3 to 1. The following commands were modified: threat-detection statistics port number-of-rates, threat-detection statistics protocol number-of-ra...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf
0
Cisco Firepower 2100 Series Hardware Installation Guide First Published: 2017-05-25 Last Modified: 2024-12-04 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
1
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
2
CONTENTS CHAPTER 1 Overview 1 Features 1 Deployment Options 5 Package Contents 5 QR Code Sticker 8 Serial Number Location 9 Front Panel 10 Front Panel LEDs 12 Rear Panel 17 Network Modules 19 10-Gb Network Module 19 1-Gb Network Module 21 Hardware Bypass Network Modules 22 1-Gb SX/10-Gb SR/10-Gb LR Network Module with ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
3
Safety Recommendations 47 Maintain Safety with Electricity 47 Prevent ESD Damage 48 Site Environment 48 Site Considerations 48 Power Supply Considerations 49 Rack Configuration Considerations 49 CHAPTER 3 Rack-Mount and Ground the Chassis 51 Unpack and Inspect the Chassis 51 Rack-Mount the Chassis Using Brackets 52 Rac...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
4
CHAPTER 1 Overview • Features, on page 1 • Deployment Options, on page 5 • Package Contents, on page 5 • QR Code Sticker, on page 8 • Serial Number Location, on page 9 • Front Panel, on page 10 • Front Panel LEDs, on page 12 • Rear Panel, on page 17 • Network Modules, on page 19 • Hardware Bypass Network Modules, on pa...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
5
Figure 1: Firepower 2110 and 2120 Figure 2: Firepower 2130 and 2140 The following table lists the features for the Firepower 2100 series. Table 1: Firepower 2100 Series Features Feature 2110 2120 2130 2140 1 RU Fits a standard 19-inch (48.3-cm) square-hole rack Form factor 4-post EIA-310-D rack (Optional) Two 2-post mo...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
6
Feature 2110 2120 2130 2140 Maximum number 16 24 of interfaces Management port 1 Gigabit Ethernet (10 M/100 M/1 G Base-T) Console port RJ-45 serial port USB port USB 2.0 Type A (500 mA) Network ports 12 fixed RJ-45 1 G/100 M/10 M ports (named Ethernet 1/1 through 1/12 ) Small form-factor Four fixed 1-G SFP ports Four f...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
7
Feature 2110 2120 2130 2140 Two fixed fans One hot-swappable fan tray with four fans Internal component only; not field-replaceable Fan Two SSD slots (200 GB ) Ships with one 200-GB SSD installed in slot 1 Note We may ship larger capacity SSDs depending on component supply availability. The larger capacity SSDs are for...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
8
Deployment Options Here are some examples of how you can deploy the Firepower 2100: • As a firewall: • At the enterprise Internet edge deployed in a high availability configuration • At branch offices in either a high availability pair or standalone • As a device that provides additional application control, URL filter...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
9
Figure 3: Firepower 2110 and 2120 Package Contents Console cable RJ-45 to DB-9 (part number 72-3383-01) 1 Firepower 2110 or 2120 chassis 2 SFP transceiver (Optional; in package if ordered) One power cord (country-specific) 4 See Power Cord Specifications, on page 37 for the list of supported power cords. 3 One ground l...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
10
Rack-mount screws: — • Four 12-24 x 0.75-inchPhillipsscrews(part number 648-0440-01) for securing the chassis to your rack • Four 10-32 x 0.75-inchPhillipsscrews(part number 48-0441-01) forsecuring the chassis to your rack • Four M6 x 1 x 19-mm Phillips screws (part number 48-101022-01) for securing the chassis to your...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
11
One ground lug kit (part number 69-100359-01) • One #6 AWG, 90 degree, #10 post ground lug (part number 32-0608-01) • Two 10-32 x 0.38-inch Phillips screws Two slide rail locking brackets (part number 8 700-105350-01) 7 Cisco Secure Firepower 2100 This document has links to the hardware installation guide, regulatory a...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
12
The following figure shows the placement of the QR code sticker on the front panel of the Firepower 2100 chassis. Figure 6: QR Code Sticker on the Firepower 2100 Front Panel 1 QR code sticker — Serial Number Location The serial number for the Firepower 2100 series chassis is located on the pullout asset card on the fro...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
13
Figure 8: Compliance Label on the Chassis Front Panel The following figure shows the front panel of the Firepower 2110 and 2120. See Front Panel LEDs, on page 12 for a description of the LEDs. Figure 9: Firepower 2110 and 2120 Front Panel Gigabit Ethernet management port: • Firepower Threat Defense—Management 0 (also r...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
14
5 Locator LED 6 System LEDs 7 Type A USB 2.0 port 8 RJ-45 console port Four fixed SFP (1 Gb) ports Fiber ports 1/13 through 1/16 labeled left to right 9 Pullout asset card with chassis serial number 10 11 SSD (slot 2) — The following figure shows the front panel of the Firepower 2130 and 2140. See Front Panel LEDs, on ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
15
The RJ-45 (8P8C) port supports RS-232 signaling to an internal UART controller. The console port does not have any hardware flow control, and does notsupport a remote dial-in modem. The baud rate is 9600. You can use the standard cable found in your accessory kit to convert the RJ-45 to DB-9 if necessary. Type A USB Po...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
16
Figure 11: Firepower 2110 and 2120 Front Panel LEDs Ethernet Link • Green—The link partner is detected; no activity. • Green, flashing—Network activity is detected. PWR 2 • Off—Input power is not detected. Standby power is off. • Green, flashing—System has detected a power switch toggle event, and initiated the shutdow...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
17
ACT (Role of a high-availability pair) • Off—Unit is not configured or enabled in a high-availability pair. • Green—Unit is in active mode. • Amber—Unit is in standby mode. SYS (Health) 6 • Off—System has not booted up yet. • Green, flashing quickly—System is booting up. • Green—Normal system function. • Amber—System b...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
18
SSD2 Alert Status • Off—SSD has normal activity. • Amber—SSD failure. SSD1 Alert Status 12 • Off—SSD has normal activity. • Amber—SSD failure. 11 The following figure shows the Firepower 2130 and 2140 front panel LEDs. Figure 12: Firepower 2130 and 2140 Front Panel LEDs Locator • Off—Locate is off. • Blue—Locate is on....
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
19
Ethernet Speed • Green, flashing—The number of flashes determines link speed; 1 flash=10 Mbit, 2=100 Mbit, 3=1 Gbit. Ethernet Link 4 • Green—The link partner is detected; no activity. • Green, flashing—Network activity is detected. 3 ACT (Role of a high-availability pair) • Off—The unit is not configured or enabled in ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
20
PSU-1 • Off—The power supply module is not present or not detected. • Green—The powersupply module is present and working properly. • Amber—The power supply module is present but a fault or problem has been detected. Fiber Port 10 • Green—Port is enabled, the link partner is detected. • Amber—Port is enabled, but the l...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
21
Two-post grounding pad Note The two-post grounding lug is included in the accessory kit. 3 Fixed fans 4 The following figure shows the rear panel of the Firepower 2130 and 2140. Figure 14: Firepower 2130 and 2140 Rear Panel 1 Power on/off switch 2 Power supply module 1 FAIL LED 3 Power supply module 2 FAIL LED 4 Power ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
22
On theFirepower 2130 and 2140, the OK LEDs on the rear powersuppliesflash after the switch isturned off; this is expected behavior. Note If you move the power switch to the OFF position before the shutdown command sequence is complete or if you remove the system power cords before the graceful shutdown is complete, dis...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
23
Make sure you have the correct firmware package and software version installed to support this network module.See CiscoFXOS Troubleshooting Guide for theFirepower 1000/2100 withFirepower Threat Defense for the procedure to verify your firmware package and software version. See Cisco Firepower 2100 ASA Platform ModeFXOS...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
24
For More Information • For a list of copper SFPs, see Supported SFP/SFP+ Transceivers, on page 31. 1-Gb Network Module The following figure shows the front panel of the 1-Gb network module (FPR2K-NM-8X1G). The eight ports are numbered from top to bottom, left to right. Make sure you have the correct firmware package an...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
25
7 Ethernet X/4 8 Ethernet X/6 Network activity LEDs • Off—No connection or port is not in use. • Amber—No link or network failure. • Green—Link up. • Green, flashing—Network activity. 9 Ethernet X/8 10 For More Information • For a list of copper SFPs, see Supported SFP/SFP+ Transceivers, on page 31. Hardware Bypass Net...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
26
For the 40-Gb network module, you connect the two ports to form a paired set. For the 1/10-Gb network modules, you connect the top port to the bottom port to form a hardware bypass paired set. This allows traffic to flow even if the security appliance fails or loses power. If you have an inline interface set with a mix...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
27
Figure 17: FPR2K-NM-6X1SX-F, FPR2K-NM-6X10SR-F, FPR2K-NM-6X10LR-F Six network activity LEDs: • Amber—No connection, or port is not in use, or no link or network failure. • Green—Link up, no network activity. • Green, flashing—Network activity. 1 Captive screw/handle 2 Ethernet X/3 (top port) Ethernet X/4 (bottom port) ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
28
Cable distance Note Half the distance specified by the IEEE standard. Modal bandwidth (MHz/km) Core diameter (microns) 110 m 137 m 250 m 275 m 500 m 160 (FDDI) 200 (OM1) 400 500 (OM2) 2000 (OM3) 62.5 62.5 50 50 50 Cable and operating distance Table 3: 10-Gb SR Network Module (FPR2K-NM-6X10SR-F) Operating Mode Typical M...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
29
Cable and operating G.652 Single mode 5 km distance 1-Gb Network Module with Hardware Bypass The following figure shows the front panel view of the 1-Gb network module with hardware bypass (FPR-NM-8X1G-F). Pair ports 1 and 2, 3 and 4, 5 and 6, and 7 and 8 to form hardware bypass paired sets. Make sure you have the corr...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
30
Ethernet X/2 Ports 7 and 8 are paired together to form a hardware bypass pair. LED B4 applies to this paired port. Ethernet X/2 6 Ports 5 and 6 are paired together to form a hardware bypass pair. LED B3 applies to this paired port. 5 Network activity LEDs — • Left LED—Green indicates network activity when a 10M/100M/1G...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
31
The system does not consume more than the capacity of one power supply module, so it will always operate in full redundancy mode (Firepower 2130 and 2140 only) when two power supply modules are installed. Note Table 5: AC Power Supply Module Hardware Specifications 2110 2120 2130 2140 Input voltage 100 to 240 V AC Maxi...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
32
Power Supply Module LEDs The following figure shows the bicolor power supply LEDs on the power supply module. The figure shows the AC power supply module. The DC power supply module has the same LEDs. Figure 19: Power Supply Module LEDs 1 Amber FAIL LED 2 Green OK LED The following describes the power module supply LED...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
33
Fan Modules The Firepower 2110 and 2120 have two fixed fans. If the fans fail, you must send your Firepower 2110 or 2120 for RMA. The Firepower 2130 and 2140 have a removable fan tray with 3 + 1 redundant fans that are hot-swappable. The fan tray is installed in the rear of the chassis. Any one fan can fail indefinitel...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
34
Supported SFP/SFP+ Transceivers The SFP/SFP+ transceiver is a bidirectional device with a transmitter and receiver in the same physical package. It is a hot-swappable optical or electrical (copper) interface that plugs into the SFP/SFP+ ports on the fixed ports and the network module ports, and provides Ethernet connec...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
35
Use appropriate ESD procedures when inserting the transceiver. Avoid touching the contacts at the rear, and keep the contacts and ports free of dust and dirt. Keep unused transceivers in the ESD packing that they were shipped in. Warning By default autonegotiation is enabled for 1-Gb fiber interfaces. In version 6.7 an...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
36
10G-SR SFP-10G-SR Supported on Firepower 2130 and 2140. 10G-LR SFP-10G-LR 10G-LRM SFP-10G-LRM 10G-ER SFP-10G-ER 10G-SR-S SFP-10G-SR-S 10G-LR-S SFP-10G-LR-S 10G-ZR-S SFP-10G-ZR-S 10G-ER-S SFP-10G-ER-S SFP-H10GB-CU1M SFP-H10GB-CU1-5M SFP-H10GB-CU2M SFP-H10GB-CU2-5 SFP-H10GB-CU3M SFP-H10GB-CU5M H10GB-CU 1M, 1.5M, 2M, 2.5M...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
37
Specification 2110 2120 2130 2140 100/240 V AC 2.9 A (at 100 VAC), 50 to 60 Hz Note The power supply module is rated at 6.3 A, but the system power is limited to 2.9 A. 100/240V AC 1.9 A (at 100 VAC), 50 to 60 Hz Note The power supply module is rated at 4 A, but the system power is limited to 1.9 A. System power Operat...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
38
See the show inventory and show inventory expand commands in the Cisco FXOS Troubleshooting Guide for theFirepower 2100Seriesto display a list of thePIDsfor yourFirepower 2100. Orsee the show inventory command in the Cisco Firepower Threat Defense Command Reference or the Cisco ASA Series Command Reference to display a...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
39
PID Description FPR2K-SSD100 SSD for Firepower 2110 and 2120 FPR2K-SSD100= SSD for Firepower 2110 and 2120 (spare) FPR2K-SSD200 SSD for Firepower 2130 and 2140 FPR2K-SSD200= SSD for Firepower 2130 and 2140 (spare) FPR2K-SSD-BBLKD SSD slot carrier FPR2K-SSD-BBLKD= SSD slot carrier (spare) FPR-MSP-SSD MSP SSD FPR-MSP-SSD...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
40
PID Description FPR2K-CBL-MGMT= Cable management brackets (spare) FPR2K-RM-BRKT= Rack-mount brackets (spare) FPR2K-SLIDE-RAILS Slide rail kit FPR2K-SLIDE-RAILS= Slide rail kit (spare) FPR2K-RAIL-BRKT= Slide rail brackets (spare) Power Cord Specifications Each power supply has a separate power cord. Standard power cords...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
41
Figure 22: Australia CAB-ACA 1 Plug: A.S. 3112 2 Cord set rating: 10 A, 250 V 3 Connector: IEC 60320/C13 Figure 23: Brazil CAB-C13-ACB 1 Plug: NBR 14136 2 Cord set rating: 10 A, 250 V 3 Connector: IEC 60320/C13 Figure 24: China CAB-ACC 1 Plug: GB2099.1-2008/GB1002 2 Cord set rating: 10 A, 250 V 3 Connector: IEC 60320/C...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf
42
Figure 25: Europe CAB-ACE 1 Plug: CEE 7 VII 2 Cord set rating: 10 A, 250 V 3 Connector: IEC 60320/C13 Figure 26: India PWR-CORD-IND-D 1 Plug: IS 6538-1971 2 Cord set rating: 10 A, 250 V 3 Connector: IEC 60320/C13 Figure 27: Italy CAB-ACI 1 Plug: CEI 23-16 2 Cord set rating: 10 A, 250 V 3 Connector: IEC 60320/C13 Cisco ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf