index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
51 | • Baffles can help to isolate exhaust air from intake air, which also helps to draw cooling air through the
chassis. The best placement of the baffles depends on the airflow patterns in the rack. Experiment with
different arrangements to position the baffles effectively.
Cisco Firepower 9300 Hardware Installation Guide... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
52 | CHAPTER 3
Rack-Mount and Ground the Chassis
• Unpack and Inspect the Chassis, on page 49
• Rack-Mount the Chassis, on page 50
• Ground the Chassis, on page 55
Unpack and Inspect the Chassis
The chassis is thoroughly inspected before shipment. If any damage occurred during transportation or any
items are missing, contac... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
53 | Rack-Mount the Chassis
Before you begin
The fully populated Firepower 9300 chassis is heavy. For safety concerns, remove the heavy components
such as the security modules, power supply modules, and fan modules from the chassis before placing the
chassis in the rack. For information on removing Firepower 9300 components... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
54 | Statement 1032—Lifting the Chassis
To prevent personal injury or damage to the chassis, never attempt to lift or tilt the chassis using the
handles on modules, such as power supplies, fans, or cards. These types of handles are not designed to
support the weight of the unit.
Warning
Statement 1047—Overheating Prevention... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
55 | Figure 34: Secure the Left and Right Rails with the Screws
Step 3 Press the end of the latch to retract and slide the latch on to the rail.
Step 4 Repeat Steps 2 and 3 to attach the rails to the rear post of the rack.
Step 5 Secure the rails to the rack using the four 10-32-inch screws from the rail kit.
Note
Depending... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
56 | Figure 35: Push the Rear of the Empty Chassis into the Rack Posts
Step 8 Secure the chassis ears to the rack with the four 10-32-inch screws and retention nuts (if you did not already install them
in Step 5) that were provided in the Firepower 9300 accessory kit.
Cisco Firepower 9300 Hardware Installation Guide
53
Rack... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
57 | Figure 36: Secure Chassis Ears to Rack with Screws
What to do next
Replace the components that you removed to rack-mount the chassis.For information on replacingFirepower
9300 components, see Installation, Maintenance, and Upgrade, on page 59.
Ground the chassis. See Ground the Chassis, on page 55 for the procedure.
In... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
58 | Ground the Chassis
Grounding the chassis is required, even if the rack is already grounded. A grounding pad with two threaded
M4 holes is provided on the chassis for attaching a grounding lug. The grounding lug must be Nationally
Recognized Testing Laboratory (NRTL)-listed. In addition, a copper conductor (wires) must ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
59 | Figure 37: Insert the Cable into the Grounding Lug
Step 3 Use the crimping tool to secure the grounding cable in the grounding lug.
Step 4 Remove the adhesive label from the grounding pad on the chassis.
Step 5 Place the grounding lug against the grounding pad so that there is solid metal-to-metal contact, and insert t... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
60 | Install the cables according to your default software configuration as described in the Cisco Firepower 9300
Getting Started Guide.
Cisco Firepower 9300 Hardware Installation Guide
57
Rack-Mount and Ground the Chassis
Ground the Chassis | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
61 | Cisco Firepower 9300 Hardware Installation Guide
58
Rack-Mount and Ground the Chassis
Ground the Chassis | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
62 | CHAPTER 4
Installation, Maintenance, and Upgrade
• Remove and Replace the Supervisor, on page 59
• Install, Remove, and Replace the Security Module, on page 61
• Remove and Replace the SSD, on page 64
• Install, Remove, and Replace the Single-Wide Network Module, on page 66
• Install, Remove, and Replace the Double-Wid... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
63 | Statement 1073—No User-Serviceable Parts
There are no serviceable parts inside. To avoid risk of electric shock, do not open.
Warning
Statement 1089—Instructed and Skilled Person Definitions
An instructed person is someone who has been instructed and trained by a skilled person and takes the
necessary precautions when ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
64 | Figure 39: Remove and Replace the Supervisor
Step 4 To install a new Supervisor tray, grasp the front of the tray and place your other hand under the tray to support it.
Step 5 Open the handle on the front of the tray.
Step 6 Gently slide the tray into the opening until you cannot push it any farther.
Step 7 Press the ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
65 | If you want to replace an existing security module with another security module, you must decommission the
old security module before removing it. See the "Security Module/Engine Management" chapter in the Cisco
FXOS Firepower Chassis Manager Configuration Guide for the instructions. After you decommission the old
secu... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
66 | Statement 1091—Installation by an Instructed Person
Only an instructed person orskilled person should be allowed to install, replace, orservice this equipment.
See statement 1089 for the definition of an instructed or skilled person.
There are no serviceable parts inside. To avoid risk of electric shock, do not open.
W... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
67 | Step 6 To install a new security module, grasp the front of the security module and place your other hand under the security
module to support it.
Step 7 Open the handle in the front of the security module.
Step 8 Gently slide the security module into the opening until you cannot push it any farther.
Step 9 Press the h... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
68 | Statement 1073—No User-Serviceable Parts
There are no serviceable parts inside. To avoid risk of electric shock, do not open.
Warning
Statement 1089—Instructed and Skilled Person Definitions
An instructed person is someone who has been instructed and trained by a skilled person and takes the
necessary precautions when ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
69 | Figure 41: Remove the SSD
1 Handle 2 Handle release
Step 3 To replace the SSD, hold the SSD in front of slot 1, push it in gently until it is seated, and close the handle.
Step 4 Tighten the captive screws on either side of the SSD.
Step 5 Acknowledge the slot to start the SSD installation.
Install, Remove, and Replace... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
70 | Verify that you have the correct ROMMON on the Supervisor to support hot swapping. For instructions
on how to verify your firmware package version and to upgrade the firmware if necessary, see the Cisco
Firepower 4100/9300 FXOS Firmware Upgrade Guide.
Note
To remove and replace the network modulesthat do not currently ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
71 | Safety Warnings
Take note of the following component replacement safety warnings:
Statement 1028—More Than One Power Supply
This unit might have more than one power supply connection. To reduce risk of electric shock, remove
all connections to de-energize the unit.
Warning
Statement 1073—No User-Serviceable Parts
There... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
72 | Procedure
Step 1 To install a new network module for the first time into an empty slot, do the following:
a) Power down the chassis by moving the power switch to the OFF position.
b) Follow Steps 5 through 7 to install the new network module.
c) Power on the chassis by moving the power switch to the ON position.
The st... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
73 | Figure 43: Remove and Replace the Single-Wide Network Module
If the slot is to remain empty, install a blank faceplate to ensure proper airflow and to keep dust out of the chassis;
otherwise, install another network module.
Step 4 (Optional) If you are installing a single-wide network module into a double-wide slot, yo... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
74 | a) Power up the chassis so that the new network module is recognized (if the new network module does not support hot
swapping).
b) Bring the new network module online using the appropriate CLI command (if the new network module supports hot
swapping). The saved network module configuration is automatically reapplied wh... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
75 | Figure 44: 100-Gb Network Module
100-Gigabit Ethernet QSFP28 fiber port
Ethernet X/1
1 Captive screw on handle 2
Network activity LEDs
• Off—No connection or port is not in use.
• Amber—No link or network failure.
• Green, flashing—Network activity.
100-Gigabit Ethernet QSFP28 fiber port 4
Ethernet X/2
3
Safety Warning... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
76 | Statement 1089—Instructed and Skilled Person Definitions
An instructed person is someone who has been instructed and trained by a skilled person and takes the
necessary precautions when working with equipment.
A skilled person or qualified personnel is someone who has training or experience in the equipment
technology ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
77 | Note
Save the divider in case you ever want to replace the 100-Gb double-wide network module with one or two single-wide
network modules. Or you can order the divider kit (FPR9K-NM-DIV=), which contains two dividers, one for the
original 9300 chassis and one for the newer 9300 chassis.
Figure 45: Remove the Network Mod... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
78 | Figure 46: Install the 100-Gb Network Module
Step 5 Gently push on the handle until it is fully seated on the network module faceplate and the module is fully seated in the
chassis.
Step 6 Tighten the captive screw on the left of the network module.
Step 7 Power on the chassis so that the new network module is recogniz... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
79 | Safety Warnings
Take note of the following power and component removal safety warnings:
Statement 1003—DC Power Disconnection
To reduce risk of electric shock or personal injury, disconnect DC power before removing or replacing
components or performing upgrades.
Warning
Statement 1005—Circuit Breaker
This product relie... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
80 | Statement 1029—Blank Faceplates and Cover Panels
Blank faceplates and cover panels serve three important functions: they reduce the risk of electric shock
and fire, they contain electromagnetic interference (EMI) that might disrupt other equipment, and they
direct the flow of cooling air through the chassis. Do not ope... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
81 | Procedure
Step 1 To remove the power supply module, face the front of the chassis, and loosen the captive screw on the right side of the
power supply module.
Step 2 Lift up the handle of the power supply to unseat it.
Step 3 Using the handle, pull the power supply module from its slot. Place your other hand under the p... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
82 | Step 8 Verify the power supply module is operating correctly by checking the power supply module LED. See Power Supply
Modules, on page 26 for more information.
Connect the DC Power Supply Module
Note Replace power supplies immediately. Power supply blanks are not available.
This procedure describes how to install and ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
83 | Statement 1028—More Than One Power Supply
This unit might have more than one power supply connection. To reduce risk of electric shock, remove
all connections to de-energize the unit.
Warning
Statement 1029—Blank Faceplates and Cover Panels
Blank faceplates and cover panels serve three important functions: they reduce ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
84 | Statement 1090—Installation by Skilled Person
Only a skilled person should be allowed to install, replace, or service this equipment.See statement 1089
for the definition of a skilled person.
There are no serviceable parts inside. To avoid risk of electric shock, do not open.
Warning
Statement 1091—Installation by an I... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
85 | Figure 48: Connect the DC Power Connectors and Ground Lugs
1 DC terminal covers 2 Nuts
3 Two 2-hole lugs (not provided in accessory kit) 4 DC terminals
5 Chassis ground lug
Step 7 Connect the DC-input wiresto the power entry module terminal block. The proper wiring sequence is positive to positive
(red wire) and negati... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
86 | This procedure describes how to install and connect the high-voltage (HV) DC power supply module to the
rear powersupply power feeds on the chassis. The load isshared when both powersupply modules are plugged
in and running at the same time. The HVDC power supply modules are hot swappable.
Safety Warnings
Take note of ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
87 | Statement 1029—Blank Faceplates and Cover Panels
Blank faceplates and cover panels serve three important functions: they reduce the risk of electric shock
and fire, they contain electromagnetic interference (EMI) that might disrupt other equipment, and they
direct the flow of cooling air through the chassis. Do not ope... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
88 | Procedure
Step 1 Install the HVDC power supply module in the chassis and make note of the bay number so you can connect the HVDC
power cord to the correct power feed on the HVDC power supply module at the rear of the chassis. See Remove and
Replace the Power Supply Module, on page 75 for the procedure.
Step 2 Verify th... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
89 | Step 6 Verify power supply operation by checking the power supply LED on the front of the chassis.
See Power Supply Modules, on page 26 for the LED values.
Remove and Replace the Fan Module
You can remove and replace fan modules while the system is running. The airflow moves from front to back.
See Fan Modules, on page... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
90 | Statement 1090—Installation by Skilled Person
Only a skilled person should be allowed to install, replace, or service this equipment.See statement 1089
for the definition of a skilled person.
There are no serviceable parts inside. To avoid risk of electric shock, do not open.
Warning
Statement 1091—Installation by an I... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
91 | Step 4 To install a new fan module, hold the fan module with the spring latch at the top of the module.
Step 5 Push the fan module into the chassis until it is properly seated and the spring latch snaps into place.
If the system is powered on, listen for the fans. You should immediately hear the fans operating. If you ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
92 | Step 2 Using the four 10-32 x .75-in.screwsfrom theFIPSkit, attach theFIPSopacity shield to the left and right chassis brackets,
two for each side.
Figure 51: Install the FIPS Opacity Shield to the Rack-Mount Rails
1 Screws 2 FIPS opacity shield
3 Rack-mount rails
Step 3 Unscrew the two captive screws on the front of t... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
93 | Figure 52: Remove the FIPS Access Cover
1 Captive screws 2 Access cover
Step 4 Connect the cables to the ports. See the getting started guides listed in Step 9 for the procedure.
Step 5 Run the cables through the openings on either side of the FIPS opacity shield and reattach the FIPS access cover by
tightening the cap... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
94 | Figure 53: Run the Cables Through the FIPS Opacity Shield
1 Cable exit
Step 6 Attach the TELs. For information on the procedure and correct placement of the TELs, see the Tamper Evidence Label
(TEL) Placement section in the FIPS 140-2 Non Proprietary Security Policy Level 2 Validation document.
Step 7 Connect the power... | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
95 | Cisco Firepower 9300 Hardware Installation Guide
92
Installation, Maintenance, and Upgrade
Install the FIPS Opacity Shield | https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf |
0 | Cisco Firepower 4100 Getting Started Guide
First Published: 2019-03-05
Last Modified: 2023-01-23
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883 | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
1 | null | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
2 | CHAPTER 1
WhichApplication and Manageris Right for You?
Your hardware platform can run one of two applications.For each application, you have a choice of managers.
This chapter explains the application and manager choices.
• Applications, on page 1
• Managers, on page 1
Applications
You can use either theSecureFirewall... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
3 | Threat Defense Managers
Table 1: Threat Defense Managers
Manager Description
The management center is a powerful, web-based, multi-device manager that runs on
its own server hardware, or as a virtual device on a hypervisor. You should use the
management center if you want a multi-device manager, and you require all fea... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
4 | Manager Description
The threat defense REST API lets you automate direct configuration of the threat defense.
This API is compatible with the device manager and CDO use because they can both
discover the configuration on the firewall. You cannot use this API if you are managing
the threat defense using the management c... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
5 | Manager Description
The ASA REST API lets you automate ASA configuration. However, the API does not
include all ASA features, and is no longer being enhanced.
The ASA REST API is not covered in this guide. For more information, see the Cisco
ASA REST API Quick Start Guide.
ASA REST API
Cisco Firepower 4100 Getting Star... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
6 | CHAPTER 2
Firepower 4100 Chassis Initial Configuration
Is This Chapter for You?
This chapter describes how to perform the initial setup for the Cisco Firepower 4100 chassis, including
configuring interfaces for use with the ASA and the threat defense logical devices.
• Is This Guide for You?, on page 5
• About the Fire... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
7 | • Standalone ASA using ASDM
This guide does not cover the following deployments, for which you should refer to the FXOS, ASA, FDM,
CDO, and FMC configuration guides:
• High Availability/Failover
• Clustering (ASA, or threat defense using the management center only)
• Multi-instance (threat defense using the management ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
8 | You can manage the threat defense using one of the following managers:
• Management Center—A full-featured, multidevice manager on a separate server.
• Device Manager—A simplified, single device manager included on the device.
• CDO—A cloud-based, multidevice manager.
ASA
The ASA provides advanced stateful firewall and... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
9 | • Firepower 4150—7
End-to-End Procedure
See the following tasks to set up the Firepower 4100 chassis, and to deploy logical devices on your chassis.
Pre-Configuration Set up the Firepower 4100 hardware. See the Firepower 4100 hardware guide.
Pre-Configuration Cable the Chassis, on page 9.
FXOS CLI or Web Perform Initia... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
10 | Chassis Manager Add FXOS Users, on page 19.
Chassis Manager Configure Interfaces, on page 21.
Create logical devices:
• Threat Defense with the management center—See Threat Defense
Deployment with the Management Center, on page 29.
• Threat Defense with the device manager—See Threat Defense Deployment
with the Device M... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
11 | interface with all logical devices, or if you use separate interfaces, put them on a single management
network. But your exact network requirements may vary.For the threat defense, the Management interface
is a separate interface from data interfaces, with its own network settings. In 6.7 and later, you can
optionally ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
12 | Place the management center on (or accessible from) the logical device management network. The threat
defense and the management center need access to the internet via the Management network for updates and
licensing. In 6.7 and later, you can optionally configure a data interface for the management center management
i... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
13 | Threat Defense with CDO Cabling
This guide assumes that you have a separate management network with its own internet access. By default,
the Management interface is preconfigured when you deploy, but you have to configure data interfaces later.
Make sure the internet is accessible from the logical device management net... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
14 | Perform initial ASA configuration on the logical device Management interface. You can later enable
management from any data interface.
Perform Initial Chassis Setup
Before you can use the chassis manager to configure and manage your system, you must perform some initial
configuration tasks. You can perform the initial ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
15 | Step 2 Power on the chassis.
Step 3 Enter the following URL in your browser:
https://ip_address/api
Specify the IP address assigned by the DHCP server to the chassis Management port.
Step 4 When prompted, log in with the username install and the password chassis_serial_number.
The chassis_serial_number can be found on ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
16 | • Management IP address and subnet mask
• Gateway IP address
• Subnets from which you want to allow HTTPS and SSH access
• Hostname and domain name
• DNS server IP address
Procedure
Step 1 Power on the chassis.
Step 2 Connect to the serial console port using a terminal emulator or use SSH to the chassis Management port... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
17 | The system cannot be accessed via SSH if SSH Mgmt Access is not configured.
Do you want to configure SSH Mgmt Access? (yes/no) [y]: y
SSH Mgmt Access host/network address (IPv4/IPv6): 10.0.0.0
SSH Mgmt Access IPv4 netmask: 255.0.0.0
Firepower Chassis Manager cannot be accessed if HTTPS Mgmt Access is not configured.
Do... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
18 | Log Into the Chassis Manager
Use the chassis manager to configure chassis settings, including enabling interfaces and deploying logical
devices.
Before you begin
• For information on supported browsers, refer to the release notes for the version you are using (see
http://www.cisco.com/c/en/us/support/security/firepower... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
19 | Step 2 Click the Use NTP Server radio button.
Step 3 (Optional) Check the NTP Server Authentication: Enable check box if you need to authenticate the NTP
server.
You are prompted to enable NTP authentication. Click Yes to require an authentication key ID and value for
all NTP server entries.
Only SHA1 is supported for ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
20 | Step 8 Click Save.
If you modify the system time by more than 10 minutes, the system will log you out and you will
need to log in to the chassis manager again.
Note
Add FXOS Users
Add local users for the chassis manager and FXOS CLI logins.
Procedure
Step 1 Choose System > User Management.
Step 2 Click Local Users.
Ste... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
21 | Step 4 Complete the following fields with the required information about the user:
• User Name—Sets the username, up to 32 characters. After you save the user, the login ID cannot be
changed. You must delete the user account and create a new one.
• (Optional) First Name—Sets the first name of the user, up to 32 charact... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
22 | • Admin—Complete read-and-write access to the entire system.
• Read-Only—Read-only access to system configuration with no privileges to modify the system
state.
• Operations—Read-and-write access to NTP configuration, Smart Call Home configuration for
Smart Licensing, and system logs, including syslog servers and fault... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
23 | but you must assign a Management interface to the logical device even if you don't intend to use it after
you enable data management.
Mgmt interface change will cause reboot of the logical device, for example one
change mgmt from e1/1 to e1/2 will cause the logical device to reboot to apply
the new management.
Note
• E... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
24 | The All Interfaces page shows a visual representation of the currently-installed interfaces at the top of the
page and provides a listing of the installed interfaces in the table below.
Step 2 Click the Edit ( ) for the interface you want to edit to open the Edit Interface dialog box.
Step 3 Check the Enable check box.... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
25 | Step 3 Enter a Port Channel ID, between 1 and 47.
Step 4 Check the Enable check box.
Step 5 Choose the interface Type:
• Data
• Data-sharing—For container instances only.
• Mgmt
• Firepower-eventing—For threat defense only.
• Cluster—For clustering only.
There are limitations when using Data-sharing type interfaces; se... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
26 | You can add multiple interfaces at a time. Click on the desired interfaces while holding down
the Ctrl key. To select a range of interfaces, select the first interface in the range, and then, while
holding down the Shift key, click to select the last interface in the range.
Tip
Step 10 To remove an interface from the p... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
27 | For Data and Data-sharing interfaces: The type is independent of the parent interface type; you can have a
Data-sharing parent and a Data subinterface, for example.
There are limitations when using Data-sharing type interfaces; see the FXOS configuration guide for more
information.
Step 4 Choose the parent Interface fr... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
28 | Procedure
Step 1 Check your current FXOS version by looking at the Overview page.
You can view application images currently available on the chassis in the next step.
Step 2 Choose System > Updates.
The Available Updates page shows a list of the FXOS platform bundle images and application images.
Step 3 Click Upload Im... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
29 | Feature Name Version Feature Information
To provide flexible physical interface use, you can share interfaces between multiple instances.
Note Requires the threat defense Version 6.3 or later.
New/Modified screens:
Interfaces > All Interfaces > Type
Data-sharing interfaces 2.4.1
for container instances
You can now set ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
30 | CHAPTER 3
Threat Defense Deployment with the
Management Center
Is This Chapter for You?
This chapter describes how to deploy a standalone threat defense logical device with the management center.
To deploy a High Availability pair or a cluster, see the Firepower Management Center Configuration Guide.
In a typical deplo... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
31 | Before You Start
Deploy and perform initial configuration of the management center. See the Cisco Firepower Management
Center 1600, 2600, and 4600 Hardware Installation Guide or Cisco Secure Firewall Management Center
Virtual Getting Started Guide.
End-to-End Procedure
See the following tasks to deploy and configure th... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
32 | Workspace Steps
Management Center Register the Threat Defense with the Management Center, on page 39.
Management Center Configure a Basic Security Policy, on page 42.
Chassis Manager: Add the Threat Defense Logical Device
You can deploy the threat defense from the Firepower 4100 as either a native or container instance... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
33 | Procedure
Step 1 In the chassis manager, choose Logical Devices.
Step 2 Click Add > Standalone, and set the following parameters:
a) Provide a Device Name.
This name is used by the chassis supervisor to configure management settings and to assign interfaces; it
is not the device name used in the application configurati... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
34 | You can only assign Data and Data-sharing interfaces that you previously enabled on the Interfaces page.
You will later enable and configure these interfaces in the management center, including setting the IP
addresses.
You can only assign up to 10 Data-sharing interfacesto a container instance. Also, each Data-sharing... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
35 | a) For a container instance, specify the Resource Profile.
If you later assign a different resource profile, then the instance will reload, which can take approximately
5 minutes. Note that for established High Availability pairs or clusters, if you assign a different-sized
resource profile, be sure to make all members... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
36 | a) For a native instance, in the Management type of application instance drop-down list, choose FMC.
Native instances also support the device manager as a manager. After you deploy the logical device, you
cannot change the manager type.
b) Enter the Firepower Management Center IP or hostname of the managing the managem... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
37 | h) Enter a Registration Key to be shared between the management center and the device during registration.
You can choose any text string for this key between 1 and 37 characters; you will enter the same key on
the management center when you add the threat defense.
i) Enter a Password for the threat defense admin user ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
38 | Procedure
Step 1 Using a supported browser, enter the following URL.
https://fmc_ip_address
Step 2 Enter your username and password.
Step 3 Click Log In.
Obtain Licenses for the Management Center
All licenses are supplied to the threat defense by the management center. You can purchase the following
licenses:
• IPS—Sec... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
39 | Figure 1: License Search
Note If a PID is not found, you can add the PID manually to your order.
• IPS, Malware Defense, and URL license combination:
• L-FPR4112T-TMC=
• L-FPR4115T-TMC=
• L-FPR4125T-TMC=
• L-FPR4145T-TMC=
When you add one of the above PIDs to your order, you can then choose a term-based subscription
co... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
40 | Registering requires you to generate a registration token in theSmartSoftware Manager.See the CiscoSecure
Firewall Management Center Administration Guide for detailed instructions.
Register the Threat Defense with the Management Center
Register each logical device individually to the same management center.
Before you ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
41 | Set the following parameters:
• Host—Enter the IP address or hostname of the threat defense you want to add. You can leave this field
blank if you specified both the management center IP address and a NAT ID in the threat defense initial
bootstrap configuration.
In an HA environment, when both the management centers ar... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
42 | Figure 2: New Policy
• Smart Licensing—Assign the Smart Licenses you need for the features you want to deploy: Malware
(if you intend to use malware inspection), Threat (if you intend to use intrusion prevention), and URL
(if you intend to implement category-based URL filtering). Note: You can apply anSecure Client rem... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
43 | • Registration key, NAT ID, and the management center IP address—Make sure you are using the same
registration key, and if used, NAT ID, on both devices. You can set the registration key and NAT ID on
the management center using the configure manager add command.
For more troubleshooting information, see https://cisco.... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
44 | The following example configures a routed mode inside interface with a static address and a routed mode
outside interface using DHCP.
Procedure
Step 1 Choose Devices > Device Management, and click the Edit ( ) for the firewall.
Step 2 Click Interfaces.
Step 3 Click Edit ( ) for the interface that you want to use for in... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
45 | d) From the Security Zone drop-down list, choose an existing inside security zone or add a new one by
clicking New.
For example, add a zone called inside_zone. Each interface must be assigned to a security zone and/or
interface group. An interface can belong to only one security zone, but can also belong to multiple in... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
46 | If you pre-configured this interface for manager access, then the interface will already be named,
enabled, and addressed. You should not alter any of these basic settings because doing so will
disrupt the management center management connection. You can still configure the Security
Zone on this screen for through traf... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
47 | • IPv6—Check the Autoconfiguration check box for stateless autoconfiguration.
f) Click OK.
Step 5 Click Save.
Configure the DHCP Server
Enable the DHCP server if you want clients to use DHCP to obtain IP addresses from the threat defense.
Procedure
Step 1 Choose Devices > Device Management, and click the Edit ( ) for t... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
48 | Add the Default Route
The default route normally pointsto the upstream router reachable from the outside interface. If you use DHCP
for the outside interface, your device might have already received a default route. If you need to manually
add the route, complete this procedure. If you received a default route from the... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
49 | The route is added to the static route table.
Step 4 Click Save.
Configure NAT
A typical NAT rule converts internal addresses to a port on the outside interface IP address. This type of NAT
rule is called interface Port Address Translation (PAT).
Procedure
Step 1 Choose Devices > NAT, and click New Policy > Threat Defe... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
50 | The policy is added the management center. You still have to add rules to the policy.
Step 3 Click Add Rule.
The Add NAT Rule dialog box appears.
Step 4 Configure the basic rule options:
• NAT Rule—Choose Auto NAT Rule.
• Type—Choose Dynamic.
Step 5 On the Interface Objects page, add the outside zone from the Available... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
51 | • Original Source—Click Add ( ) to add a network object for all IPv4 traffic (0.0.0.0/0).
You cannot use the system-defined any-ipv4 object, because Auto NAT rules add NAT as
part of the object definition, and you cannot edit system-defined objects.
Note
• Translated Source—Choose Destination Interface IP.
Step 7 Click... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
52 | Step 2 Click Add Rule, and set the following parameters:
• Name—Name this rule, for example, inside_to_outside.
• Source Zones—Select the inside zone from Available Zones, and click Add to Source.
• Destination Zones—Select the outside zone from Available Zones, and click Add to Destination.
Leave the other settings as... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
53 | Figure 3: Deploy
Step 2 Either click Deploy All to deploy to all devices or click Advanced Deploy to deploy to selected devices.
Figure 4: Deploy All
Figure 5: Advanced Deploy
Step 3 Ensure that the deployment succeeds. Click the icon to the right of the Deploy button in the menu bar to see
status for deployments.
Cisc... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
54 | Figure 6: Deployment Status
Access the Threat Defense CLI
You can use the threat defense CLI to change management interface parameters and for troubleshooting
purposes. You can access the CLI using SSH to the Management interface, or by connecting from the FXOS
CLI.
Procedure
Step 1 (Option 1) SSH directly to the threa... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.