index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
397 | null | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
398 | CHAPTER 15
Connection Settings
This chapter describes how to configure connection settings for connections that go through the ASA, or for
management connections that go to the ASA.
• What Are Connection Settings?, on page 377
• Configure Connection Settings, on page 378
• Monitoring Connections, on page 399
• History ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
399 | from predicting the next ISN for a new connection and potentially hijacking the new session. You can
disable randomization per traffic class if desired.
• TCP Normalization—The TCP Normalizer protects against abnormal packets. You can configure how
some types of packet abnormalities are handled by traffic class.
• TCP ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
400 | Configure Global Timeouts
You can set the global idle timeout durations for the connection and translation slots of various protocols. If
the slot has not been used for the idle time specified, the resource is returned to the free pool.
Changing the global timeout sets a new default timeout, which in some cases can be ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
401 | • timeout sip_media hh:mm:ss—The idle time until an SIP media port connection closes. This duration
must be at least 1 minute. The default is 2 minutes. The SIP media timer is used for SIP RTP/RTCP with
SIP UDP media packets, instead of the UDP inactivity timeout.
• timeout sip-provisional-media hh:mm:ss—The timeout va... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
402 | You can limit the number of embryonic connections to help prevent SYN flooding attacks. An embryonic
connection is a connection request that has not finished the necessary handshake between source and destination.
When the embryonic connection threshold of a connection is crossed, the ASA acts as a proxy for the server... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
403 | In the default configuration, the global_policy policy map is assigned globally to all interfaces. If you want
to edit the global_policy, enter global_policy as the policy name. For the class map, specify the class you
created earlier in this procedure.
Step 3 Set the embryonic connection limits.
• set connection embry... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
404 | history sampling data. The ASA samples the number of attacks 30 times during the rate interval, so for
the default 30 minute period, statistics are collected every 60 seconds.
• clear threat-detection statistics tcp-intercept—Erases TCP Intercept statistics.
Example:
hostname(config)# show threat-detection statistics t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
405 | Step 2 Configure the TCP map criteria by entering one or more of the following commands. The defaults are used
for any commands you do not enter. Use the no form of a command to disable the setting.
• check-retransmission—Prevent inconsistent TCPretransmission. This command is disabled by default.
• checksum-verificati... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
406 | • syn-data {allow | drop}—Allow or drop SYN packets with data. The default is to allow the packet.
• tcp-options {md5 | mss | selective-ack | timestamp | window-scale | range lower upper} action—Set
the action for packets with TCP options. These options are named: md5, mss, selective-ack (selective
acknowledgment mecha... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
407 | policy-map name
class name
Example:
hostname(config)# class-map normalization
hostname(config-cmap)# match any
hostname(config)# policy-map global_policy
hostname(config-pmap)# class normalization
In the default configuration, the global_policy policy map is assigned globally to all interfaces. If you
want to edit the ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
408 | Bypass TCP State Checks for Asynchronous Routing (TCP State Bypass)
If you have an asynchronous routing environment in your network, where the outbound and inbound flow for
a given connection can go through two different ASA devices, you need to implement TCP State Bypass on
the affected traffic.
However, TCP State Byp... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
409 | If you have asymmetric routing configured on upstream routers, and traffic alternates between two ASA
devices, then you can configure TCPstate bypass for specific traffic. TCPstate bypass alters the way sessions
are established in the fast path and disables the fast path checks. This feature treats TCP traffic much as ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
410 | hostname(config)# class-map bypass-class
hostname(config-cmap)# match access-list bypass
Step 2 Add or edit a policy map that sets the actions to take with the class map traffic, and identify the class map.
policy-map name
class name
Example:
hostname(config)# policy-map global_policy
hostname(config-pmap)# class bypas... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
411 | Disable TCP Sequence Randomization
Each TCP connection has two ISNs: one generated by the client and one generated by the server. The ASA
randomizes the ISN of the TCP SYN passing in both the inbound and outbound directions.
Randomizing the ISN of the protected host prevents an attacker from predicting the next ISN for... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
412 | In the default configuration, the global_policy policy map is assigned globally to all interfaces. If you want
to edit the global_policy, enter global_policy as the policy name. For the class map, specify the class you
created earlier in this procedure.
Step 3 Disable TCP sequence number randomization on the class:
set... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
413 | • (Transparent mode only.) Multicast flows for bridge groups that contain two and only two interfaces.
Reverse flows for offloaded flows are also offloaded.
Flow Offload Limitations
Not all flows can be offloaded. Even after offload, a flow can be removed from being offloaded under certain
conditions. Following are som... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
414 | processed normally. This is called a collision. Use the show flow-offloadflow command in the CLI
to display statistics for this situation.
Conditions for reversing offload
After a flow is offloaded, packets within the flow are returned to the ASA for further processing if they
meet the following conditions:
• They incl... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
415 | saved and the system has been rebooted.
ciscoasa(config)# write memory
ciscoasa(config)# reload
Step 2 Create the service policy rule that identifies traffic that is eligible for offload.
a) Create an L3/L4 class map to identify the traffic that is eligible for flow offload. Matching by access-list
or port would be the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
416 | Example
The following example classifies all TCPtraffic from the 10.1.1.0 255.255.255.224 subnet as eligible
for offload and attaches the policy to the outside interface.
hostname(config)# access-list offload permit tcp 10.1.1.0 255.255.255.224 any
hostname(config)# class-map flow_offload
hostname(config-cmap)# match a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
417 | Before you begin
If you want to customize the TCP Normalizer, create the required TCP Map before proceeding.
The set connectioncommand (for connection limits and sequence randomization) and set connectiontimeout
commands are described here separately for each parameter. However, you can enter the commands on one
line, ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
418 | • set connection per-client-max n—(TCP, UDP, SCTP.) The maximum number of simultaneous
connections allowed per client, between 0 and 2000000. The default is 0, which allows unlimited
connections. This argument restricts the maximum number of simultaneous connections that are allowed
for each host that is matched to the... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
419 | For systems that are operating in a high-availability configuration, we recommend that you do not set
the interval to less than one minute (0:1:0). If the connection needs to be moved between systems, the
changes required take longer than 30 seconds, and the connection might be deleted before the change is
accomplished... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
420 | hostname(config)# service-policy global_policy global
The global keyword applies the policy map to all interfaces, and interface applies the policy to one interface.
Only one global policy is allowed. You can override the global policy on an interface by applying a service
policy to that interface. You can only apply o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
421 | • show threat-detection statistics top tcp-intercept [all | detail]
View the top 10 protected servers under attack. The all keyword shows the history data of all the traced
servers. The detail keyword shows history sampling data. The ASA samples the number of attacks 30
times during the rate interval,so for the default... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
422 | Feature Name Platform Releases Description
You can now configure how long the system should maintain a
connection when the route used by the connection no longer exists or
is inactive. If the route does not become active within this holddown
period, the connection is freed. You can reduce the holddown timer to
make rou... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
423 | Feature Name Platform Releases Description
You can now specify actions for the TCP MSS and MD5 options in a
packet’s TCP header when configuring a TCP map. In addition, the
default handling of the MSS, timestamp, window-size, and selective-ack
options has changed. Previously, these options were allowed, even if
there w... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
424 | CHAPTER 16
Quality of Service
Have you ever participated in a long-distance phone call that involved a satellite connection? The conversation
might be interrupted with brief, but perceptible, gaps at odd intervals. Those gaps are the time, called the
latency, between the arrival of packets being transmitted over the ne... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
425 | • Priority queuing—For critical traffic that cannot tolerate latency, such as Voice over IP (VoIP), you can
identify traffic for Low Latency Queuing (LLQ) so that it is always transmitted ahead of other traffic.
See Priority Queuing, on page 404.
What is a Token Bucket?
A token bucket is used to manage a device that re... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
426 | How QoS Features Interact
You can configure each of the QoSfeatures alone if desired for the ASA. Often, though, you configure multiple
QoSfeatures on the ASA so you can prioritize some traffic, for example, and prevent other traffic from causing
bandwidth problems. You can configure:
Priority queuing (for specific tra... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
427 | Configure QoS
Use the following sequence to implement QoS on the ASA.
Procedure
Step 1 Determine the Queue and TX Ring Limits for a Priority Queue, on page 406.
Step 2 Configure the Priority Queue for an Interface, on page 407.
Step 3 Configure a Service Rule for Priority Queuing and Policing, on page 409.
Determine th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
428 | __________
Queue
limit (# of
packets)
__________ =
Delay
(ms)
__________ x
Average
packetsize
(bytes)
___________ ÷
# of
bytes/ms
from
Step 1
2
TX Ring Limit Worksheet
The following worksheet shows how to calculate the TX ring limit. This limit determines the maximum
number of packets allowed into the Ethernet transmit... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
429 | • (ASA 5512-X through ASA 5555-X)Priority queuing is notsupported on the Management 0/0 interface.
Procedure
Step 1 Create the priority queue for the interface.
priority-queue interface_name
Example:
hostname(config)# priority-queue inside
The interface_name argument specifies the physical interface name on which you w... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
430 | Examples
The following example establishes a priority queue on interface “outside” (the GigabitEthernet0/1
interface), with the default queue-limit and tx-ring-limit:
hostname(config)# priority-queue outside
The following example establishes a priority queue on the interface “outside” (the GigabitEthernet0/1
interface)... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
431 | Step 2 Create an L3/L4 class map to identify the traffic for which you want to perform priority policing.
class-map name
match parameter
Example:
hostname(config)# class-map policing_traffic
hostname(config-cmap)# match access-list policing
If you use an ACL for traffic matching, policing is applied in the direction sp... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
432 | • conform-action—(Optional.) Sets the action to take when the traffic is below the policing rate and burst
size. You can drop or transmit the traffic. The default is to transmit the traffic.
• exceed-action—(Optional.) Sets the action to take when traffic exceeds the policing rate and burst size.
You can drop or transm... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
433 | QoS Priority Statistics
To view statistics for service policies implementing the priority command, use the show service-policy
priority command.
hostname# show service-policy priority
Global policy:
Service-policy: global_fw_policy
Interface outside:
Service-policy: qos
Class-map: TG1-voice
Priority:
Interface outside:... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
434 | Configuration Examples for Priority Queuing and Policing
The following sections provide examples of configuring priority queuing and policing.
Class Map Examples for VPN Traffic
In the following example, the class-map command classifies all non-tunneled TCP traffic, using an ACL
named tcp_traffic:
hostname(config)# acc... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
435 | polices the tunnel. In this example, the “host-specific” traffic is rate-limited before the tunnel, then the tunnel
is rate-limited:
hostname(config)# access-list host-over-l2l extended permit ip any host 192.168.10.10
hostname(config)# class-map host-specific
hostname(config-cmap)# match access-list host-over-l2l
Prio... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
436 | History for QoS
Feature Name Platform Releases Description
We introduced QoS priority queuing and
policing.
We introduced the following commands:
priority-queue,queue-limit, tx-ring-limit,
priority, police, show priority-queue
statistics, show service-policy police,
show service-policy priority, show
running-config pri... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
437 | CLI Book 2: Cisco ASA Series Firewall CLI Configuration Guide, 9.6
416
Connection Management and Threat Detection
History for QoS | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
438 | CHAPTER 17
Threat Detection
The following topics describe how to configure threat detection statistics and scanning threat detection.
• Detecting Threats, on page 417
• Guidelines for Threat Detection, on page 419
• Defaults for Threat Detection, on page 420
• Configure Threat Detection, on page 421
• Monitoring Threat... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
439 | Basic Threat Detection Statistics
Using basic threat detection statistics, the ASA monitors the rate of dropped packets and security events due
to the following reasons:
• Denial by ACLs.
• Bad packet format (such as invalid-ip-header or invalid-tcp-hdr-length).
• Connection limits exceeded (both system-wide resource l... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
440 | Scanning Threat Detection
A typical scanning attack consists of a host that tests the accessibility of every IP address in a subnet (by
scanning through many hosts in the subnet or sweeping through many ports in a host or subnet). The scanning
threat detection feature determines when a host is performing a scan. Unlike... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
441 | Defaults for Threat Detection
Basic threat detection statistics are enabled by default.
The following table lists the default settings. You can view all these default settings using the show
running-config all threat-detection command.
For advanced statistics, by default, statistics for ACLs are enabled.
Table 18: Basi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
442 | Configure Threat Detection
Basic threat detection statistics are enabled by default, and might be the only threat detection service that you
need. Use the following procedure if you want to implement additional threat detection services.
Procedure
Step 1 Configure Basic Threat Detection Statistics, on page 421.
Basic t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
443 | 100
Configure Advanced Threat Detection Statistics
You can configure the ASA to collect extensive statistics. By default, statistics for ACLs are enabled. To
enable other statistics, perform the following steps.
Procedure
Step 1 (Optional) Enable all statistics.
threat-detection statistics
To enable only certain statis... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
444 | Example:
hostname(config)# threat-detection statistics host number-of-rate 2
hostname(config)# threat-detection statistics port number-of-rate 2
hostname(config)# threat-detection statistics protocol number-of-rate 3
Step 4 (Optional) Configure statistics for attacks intercepted by TCP Intercept.
threat-detectionstatis... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
445 | Step 2 (Optional) Set the duration of the shun for attacking hosts.
threat-detection scanning-threat shun duration seconds
Example:
hostname(config)# threat-detection scanning-threat shun duration 2000
Step 3 (Optional) Change the default event limit for when the ASA identifies a host as an attacker or as a target.
thr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
446 | The only exception to this rule is if the number of events in the unfinished burst interval already exceeds the
number of events in the oldest burst interval (#1 of 30) when calculating the total events. In that case, the
ASA calculates the total events as the last 29 complete intervals, plus the events so far in the u... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
447 | Command Purpose
Displays the top 10 statistics. If you do not enter any options, the
top 10 statistics are shown for all categories.
The min-display-rate min_display_rate argument limits the
display to statisticsthat exceed the minimum display rate in events
per second. You can set the min_display_rate between 0 and
21... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
448 | Command Purpose
Displays statistics for all ports or for a specific port or range of
ports.
show threat-detection statistics [min-display-rate
min_display_rate] port [start_port[-end_port]]
Displays statistics for all IP protocols or for a specific protocol.
The protocol_number argument is an integer between 0 and 255.... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
449 | Field Description
tot-ses The total number of sessions for this host since it was added to the database.
act-ses The total number of active sessions that the host is currently involved in.
The number of firewall drops. Firewall drops is a combined rate that includes all
firewall-related packet drops tracked in basic th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
450 | Field Description
The total number of events over each rate interval. The unfinished burst interval
presently occurring is not included in the total events. The only exception to this
rule is if the number of events in the unfinished burst interval already exceeds the
number of events in the oldest burst interval (#1 o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
451 | hostname# show threat-detection scanning-threat
Latest Target Host & Subnet List:
192.168.1.0 (l2l)
192.168.1.249 (l2l)
Latest Attacker Host & Subnet List:
192.168.10.234 (outside)
192.168.10.0 (outside)
192.168.10.2 (outside)
192.168.10.3 (outside)
192.168.10.4 (outside)
192.168.10.5 (outside)
192.168.10.6 (outside)
1... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
452 | History for Threat Detection
Feature Name Platform Releases Description
Basic and advanced threat detection
statistics, scanning threat detection was
introduced.
The following commands were introduced:
threat-detection basic-threat,
threat-detection rate, show
threat-detection rate, clear
threat-detection rate, threat-... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
453 | Feature Name Platform Releases Description
You can now customize the number of rate
intervals for which statistics are collected.
The default number of rates was changed
from 3 to 1.
The following commands were modified:
threat-detection statistics port
number-of-rates, threat-detection
statistics protocol number-of-ra... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config.pdf |
0 | Cisco Firepower 2100 Series Hardware Installation Guide
First Published: 2017-05-25
Last Modified: 2024-12-04
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883 | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
1 | THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
2 | CONTENTS
CHAPTER 1 Overview 1
Features 1
Deployment Options 5
Package Contents 5
QR Code Sticker 8
Serial Number Location 9
Front Panel 10
Front Panel LEDs 12
Rear Panel 17
Network Modules 19
10-Gb Network Module 19
1-Gb Network Module 21
Hardware Bypass Network Modules 22
1-Gb SX/10-Gb SR/10-Gb LR Network Module with ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
3 | Safety Recommendations 47
Maintain Safety with Electricity 47
Prevent ESD Damage 48
Site Environment 48
Site Considerations 48
Power Supply Considerations 49
Rack Configuration Considerations 49
CHAPTER 3 Rack-Mount and Ground the Chassis 51
Unpack and Inspect the Chassis 51
Rack-Mount the Chassis Using Brackets 52
Rac... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
4 | CHAPTER 1
Overview
• Features, on page 1
• Deployment Options, on page 5
• Package Contents, on page 5
• QR Code Sticker, on page 8
• Serial Number Location, on page 9
• Front Panel, on page 10
• Front Panel LEDs, on page 12
• Rear Panel, on page 17
• Network Modules, on page 19
• Hardware Bypass Network Modules, on pa... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
5 | Figure 1: Firepower 2110 and 2120
Figure 2: Firepower 2130 and 2140
The following table lists the features for the Firepower 2100 series.
Table 1: Firepower 2100 Series Features
Feature 2110 2120 2130 2140
1 RU
Fits a standard 19-inch (48.3-cm) square-hole rack
Form factor
4-post EIA-310-D rack
(Optional) Two 2-post mo... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
6 | Feature 2110 2120 2130 2140
Maximum number 16 24
of interfaces
Management port 1 Gigabit Ethernet (10 M/100 M/1 G Base-T)
Console port RJ-45 serial port
USB port USB 2.0 Type A (500 mA)
Network ports 12 fixed RJ-45 1 G/100 M/10 M ports (named Ethernet 1/1 through 1/12 )
Small form-factor Four fixed 1-G SFP ports Four f... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
7 | Feature 2110 2120 2130 2140
Two fixed fans One hot-swappable fan tray with four fans
Internal component only; not
field-replaceable
Fan
Two SSD slots (200 GB )
Ships with one 200-GB SSD installed in
slot 1
Note
We may ship larger capacity SSDs
depending on component supply
availability. The larger capacity SSDs are
for... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
8 | Deployment Options
Here are some examples of how you can deploy the Firepower 2100:
• As a firewall:
• At the enterprise Internet edge deployed in a high availability configuration
• At branch offices in either a high availability pair or standalone
• As a device that provides additional application control, URL filter... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
9 | Figure 3: Firepower 2110 and 2120 Package Contents
Console cable RJ-45 to DB-9 (part number
72-3383-01)
1 Firepower 2110 or 2120 chassis 2
SFP transceiver
(Optional; in package if ordered)
One power cord (country-specific) 4
See Power Cord Specifications, on page 37 for
the list of supported power cords.
3
One ground l... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
10 | Rack-mount screws: —
• Four 12-24 x 0.75-inchPhillipsscrews(part
number 648-0440-01) for securing the
chassis to your rack
• Four 10-32 x 0.75-inchPhillipsscrews(part
number 48-0441-01) forsecuring the chassis
to your rack
• Four M6 x 1 x 19-mm Phillips screws (part
number 48-101022-01) for securing the
chassis to your... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
11 | One ground lug kit (part number 69-100359-01)
• One #6 AWG, 90 degree, #10 post ground
lug (part number 32-0608-01)
• Two 10-32 x 0.38-inch Phillips screws
Two slide rail locking brackets (part number 8
700-105350-01)
7
Cisco Secure Firepower 2100
This document has links to the hardware
installation guide, regulatory a... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
12 | The following figure shows the placement of the QR code sticker on the front panel of the Firepower 2100
chassis.
Figure 6: QR Code Sticker on the Firepower 2100 Front Panel
1 QR code sticker —
Serial Number Location
The serial number for the Firepower 2100 series chassis is located on the pullout asset card on the fro... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
13 | Figure 8: Compliance Label on the Chassis
Front Panel
The following figure shows the front panel of the Firepower 2110 and 2120. See Front Panel LEDs, on page
12 for a description of the LEDs.
Figure 9: Firepower 2110 and 2120 Front Panel
Gigabit Ethernet management port:
• Firepower Threat Defense—Management 0
(also r... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
14 | 5 Locator LED 6 System LEDs
7 Type A USB 2.0 port 8 RJ-45 console port
Four fixed SFP (1 Gb) ports
Fiber ports 1/13 through 1/16 labeled left to right
9 Pullout asset card with chassis serial number 10
11 SSD (slot 2) —
The following figure shows the front panel of the Firepower 2130 and 2140. See Front Panel LEDs, on ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
15 | The RJ-45 (8P8C) port supports RS-232 signaling to an internal UART controller. The console port does
not have any hardware flow control, and does notsupport a remote dial-in modem. The baud rate is 9600.
You can use the standard cable found in your accessory kit to convert the RJ-45 to DB-9 if necessary.
Type A USB Po... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
16 | Figure 11: Firepower 2110 and 2120 Front Panel LEDs
Ethernet Link
• Green—The link partner is detected; no
activity.
• Green, flashing—Network activity is
detected.
PWR 2
• Off—Input power is not detected. Standby
power is off.
• Green, flashing—System has detected a
power switch toggle event, and initiated the
shutdow... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
17 | ACT (Role of a high-availability pair)
• Off—Unit is not configured or enabled in a
high-availability pair.
• Green—Unit is in active mode.
• Amber—Unit is in standby mode.
SYS (Health) 6
• Off—System has not booted up yet.
• Green, flashing quickly—System is booting
up.
• Green—Normal system function.
• Amber—System b... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
18 | SSD2 Alert Status
• Off—SSD has normal activity.
• Amber—SSD failure.
SSD1 Alert Status 12
• Off—SSD has normal activity.
• Amber—SSD failure.
11
The following figure shows the Firepower 2130 and 2140 front panel LEDs.
Figure 12: Firepower 2130 and 2140 Front Panel LEDs
Locator
• Off—Locate is off.
• Blue—Locate is on.... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
19 | Ethernet Speed
• Green, flashing—The number of flashes
determines link speed; 1 flash=10 Mbit,
2=100 Mbit, 3=1 Gbit.
Ethernet Link 4
• Green—The link partner is detected; no
activity.
• Green, flashing—Network activity is
detected.
3
ACT (Role of a high-availability pair)
• Off—The unit is not configured or enabled
in ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
20 | PSU-1
• Off—The power supply module is not
present or not detected.
• Green—The powersupply module is present
and working properly.
• Amber—The power supply module is
present but a fault or problem has been
detected.
Fiber Port 10
• Green—Port is enabled, the link partner is
detected.
• Amber—Port is enabled, but the l... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
21 | Two-post grounding pad
Note
The two-post grounding lug is included in the
accessory kit.
3 Fixed fans 4
The following figure shows the rear panel of the Firepower 2130 and 2140.
Figure 14: Firepower 2130 and 2140 Rear Panel
1 Power on/off switch 2 Power supply module 1 FAIL LED
3 Power supply module 2 FAIL LED 4 Power ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
22 | On theFirepower 2130 and 2140, the OK LEDs on the rear powersuppliesflash after the switch isturned
off; this is expected behavior.
Note
If you move the power switch to the OFF position before the shutdown command sequence is complete
or if you remove the system power cords before the graceful shutdown is complete, dis... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
23 | Make sure you have the correct firmware package and software version installed to support this network
module.See CiscoFXOS Troubleshooting Guide for theFirepower 1000/2100 withFirepower Threat Defense
for the procedure to verify your firmware package and software version. See Cisco Firepower 2100 ASA
Platform ModeFXOS... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
24 | For More Information
• For a list of copper SFPs, see Supported SFP/SFP+ Transceivers, on page 31.
1-Gb Network Module
The following figure shows the front panel of the 1-Gb network module (FPR2K-NM-8X1G). The eight ports
are numbered from top to bottom, left to right.
Make sure you have the correct firmware package an... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
25 | 7 Ethernet X/4 8 Ethernet X/6
Network activity LEDs
• Off—No connection or port is not in use.
• Amber—No link or network failure.
• Green—Link up.
• Green, flashing—Network activity.
9 Ethernet X/8 10
For More Information
• For a list of copper SFPs, see Supported SFP/SFP+ Transceivers, on page 31.
Hardware Bypass Net... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
26 | For the 40-Gb network module, you connect the two ports to form a paired set. For the 1/10-Gb network
modules, you connect the top port to the bottom port to form a hardware bypass paired set. This allows
traffic to flow even if the security appliance fails or loses power.
If you have an inline interface set with a mix... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
27 | Figure 17: FPR2K-NM-6X1SX-F, FPR2K-NM-6X10SR-F, FPR2K-NM-6X10LR-F
Six network activity LEDs:
• Amber—No connection, or port is not in use,
or no link or network failure.
• Green—Link up, no network activity.
• Green, flashing—Network activity.
1 Captive screw/handle 2
Ethernet X/3 (top port)
Ethernet X/4 (bottom port)
... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
28 | Cable distance
Note
Half the distance
specified by the IEEE
standard.
Modal bandwidth
(MHz/km)
Core diameter (microns)
110 m
137 m
250 m
275 m
500 m
160 (FDDI)
200 (OM1)
400
500 (OM2)
2000 (OM3)
62.5
62.5
50
50
50
Cable and operating
distance
Table 3: 10-Gb SR Network Module (FPR2K-NM-6X10SR-F)
Operating Mode Typical M... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
29 | Cable and operating G.652 Single mode 5 km
distance
1-Gb Network Module with Hardware Bypass
The following figure shows the front panel view of the 1-Gb network module with hardware bypass
(FPR-NM-8X1G-F). Pair ports 1 and 2, 3 and 4, 5 and 6, and 7 and 8 to form hardware bypass paired sets.
Make sure you have the corr... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
30 | Ethernet X/2
Ports 7 and 8 are paired together to form a
hardware bypass pair. LED B4 applies to this
paired port.
Ethernet X/2 6
Ports 5 and 6 are paired together to form a
hardware bypass pair. LED B3 applies to this
paired port.
5
Network activity LEDs —
• Left LED—Green indicates network activity
when a 10M/100M/1G... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
31 | The system does not consume more than the capacity of one power supply module, so it will always operate
in full redundancy mode (Firepower 2130 and 2140 only) when two power supply modules are installed.
Note
Table 5: AC Power Supply Module Hardware Specifications
2110 2120 2130 2140
Input voltage 100 to 240 V AC
Maxi... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
32 | Power Supply Module LEDs
The following figure shows the bicolor power supply LEDs on the power supply module. The figure shows
the AC power supply module. The DC power supply module has the same LEDs.
Figure 19: Power Supply Module LEDs
1 Amber FAIL LED 2 Green OK LED
The following describes the power module supply LED... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
33 | Fan Modules
The Firepower 2110 and 2120 have two fixed fans. If the fans fail, you must send your Firepower 2110 or
2120 for RMA.
The Firepower 2130 and 2140 have a removable fan tray with 3 + 1 redundant fans that are hot-swappable.
The fan tray is installed in the rear of the chassis. Any one fan can fail indefinitel... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
34 | Supported SFP/SFP+ Transceivers
The SFP/SFP+ transceiver is a bidirectional device with a transmitter and receiver in the same physical
package. It is a hot-swappable optical or electrical (copper) interface that plugs into the SFP/SFP+ ports on
the fixed ports and the network module ports, and provides Ethernet connec... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
35 | Use appropriate ESD procedures when inserting the transceiver. Avoid touching the contacts at the rear, and
keep the contacts and ports free of dust and dirt. Keep unused transceivers in the ESD packing that they were
shipped in.
Warning
By default autonegotiation is enabled for 1-Gb fiber interfaces. In version 6.7 an... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
36 | 10G-SR SFP-10G-SR Supported on Firepower 2130 and 2140.
10G-LR SFP-10G-LR
10G-LRM SFP-10G-LRM
10G-ER SFP-10G-ER
10G-SR-S SFP-10G-SR-S
10G-LR-S SFP-10G-LR-S
10G-ZR-S SFP-10G-ZR-S
10G-ER-S SFP-10G-ER-S
SFP-H10GB-CU1M
SFP-H10GB-CU1-5M
SFP-H10GB-CU2M
SFP-H10GB-CU2-5
SFP-H10GB-CU3M
SFP-H10GB-CU5M
H10GB-CU 1M, 1.5M, 2M,
2.5M... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
37 | Specification 2110 2120 2130 2140
100/240 V AC 2.9 A (at 100 VAC), 50 to
60 Hz
Note
The power supply module is rated at 6.3
A, but the system power is limited to 2.9
A.
100/240V AC 1.9 A (at 100 VAC), 50 to
60 Hz
Note
The power supply module is rated at 4 A,
but the system power is limited to 1.9 A.
System power
Operat... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
38 | See the show inventory and show inventory expand commands in the Cisco FXOS Troubleshooting Guide
for theFirepower 2100Seriesto display a list of thePIDsfor yourFirepower 2100. Orsee the show inventory
command in the Cisco Firepower Threat Defense Command Reference or the Cisco ASA Series Command
Reference to display a... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
39 | PID Description
FPR2K-SSD100 SSD for Firepower 2110 and 2120
FPR2K-SSD100= SSD for Firepower 2110 and 2120 (spare)
FPR2K-SSD200 SSD for Firepower 2130 and 2140
FPR2K-SSD200= SSD for Firepower 2130 and 2140 (spare)
FPR2K-SSD-BBLKD SSD slot carrier
FPR2K-SSD-BBLKD= SSD slot carrier (spare)
FPR-MSP-SSD MSP SSD
FPR-MSP-SSD... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
40 | PID Description
FPR2K-CBL-MGMT= Cable management brackets (spare)
FPR2K-RM-BRKT= Rack-mount brackets (spare)
FPR2K-SLIDE-RAILS Slide rail kit
FPR2K-SLIDE-RAILS= Slide rail kit (spare)
FPR2K-RAIL-BRKT= Slide rail brackets (spare)
Power Cord Specifications
Each power supply has a separate power cord. Standard power cords... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
41 | Figure 22: Australia CAB-ACA
1 Plug: A.S. 3112 2 Cord set rating: 10 A, 250 V
3 Connector: IEC 60320/C13
Figure 23: Brazil CAB-C13-ACB
1 Plug: NBR 14136 2 Cord set rating: 10 A, 250 V
3 Connector: IEC 60320/C13
Figure 24: China CAB-ACC
1 Plug: GB2099.1-2008/GB1002 2 Cord set rating: 10 A, 250 V
3 Connector: IEC 60320/C... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
42 | Figure 25: Europe CAB-ACE
1 Plug: CEE 7 VII 2 Cord set rating: 10 A, 250 V
3 Connector: IEC 60320/C13
Figure 26: India PWR-CORD-IND-D
1 Plug: IS 6538-1971 2 Cord set rating: 10 A, 250 V
3 Connector: IEC 60320/C13
Figure 27: Italy CAB-ACI
1 Plug: CEI 23-16 2 Cord set rating: 10 A, 250 V
3 Connector: IEC 60320/C13
Cisco ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/2100/hw/guide/b_install_guide_2100.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.