index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
51
• Baffles can help to isolate exhaust air from intake air, which also helps to draw cooling air through the chassis. The best placement of the baffles depends on the airflow patterns in the rack. Experiment with different arrangements to position the baffles effectively. Cisco Firepower 9300 Hardware Installation Guide...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
52
CHAPTER 3 Rack-Mount and Ground the Chassis • Unpack and Inspect the Chassis, on page 49 • Rack-Mount the Chassis, on page 50 • Ground the Chassis, on page 55 Unpack and Inspect the Chassis The chassis is thoroughly inspected before shipment. If any damage occurred during transportation or any items are missing, contac...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
53
Rack-Mount the Chassis Before you begin The fully populated Firepower 9300 chassis is heavy. For safety concerns, remove the heavy components such as the security modules, power supply modules, and fan modules from the chassis before placing the chassis in the rack. For information on removing Firepower 9300 components...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
54
Statement 1032—Lifting the Chassis To prevent personal injury or damage to the chassis, never attempt to lift or tilt the chassis using the handles on modules, such as power supplies, fans, or cards. These types of handles are not designed to support the weight of the unit. Warning Statement 1047—Overheating Prevention...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
55
Figure 34: Secure the Left and Right Rails with the Screws Step 3 Press the end of the latch to retract and slide the latch on to the rail. Step 4 Repeat Steps 2 and 3 to attach the rails to the rear post of the rack. Step 5 Secure the rails to the rack using the four 10-32-inch screws from the rail kit. Note Depending...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
56
Figure 35: Push the Rear of the Empty Chassis into the Rack Posts Step 8 Secure the chassis ears to the rack with the four 10-32-inch screws and retention nuts (if you did not already install them in Step 5) that were provided in the Firepower 9300 accessory kit. Cisco Firepower 9300 Hardware Installation Guide 53 Rack...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
57
Figure 36: Secure Chassis Ears to Rack with Screws What to do next Replace the components that you removed to rack-mount the chassis.For information on replacingFirepower 9300 components, see Installation, Maintenance, and Upgrade, on page 59. Ground the chassis. See Ground the Chassis, on page 55 for the procedure. In...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
58
Ground the Chassis Grounding the chassis is required, even if the rack is already grounded. A grounding pad with two threaded M4 holes is provided on the chassis for attaching a grounding lug. The grounding lug must be Nationally Recognized Testing Laboratory (NRTL)-listed. In addition, a copper conductor (wires) must ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
59
Figure 37: Insert the Cable into the Grounding Lug Step 3 Use the crimping tool to secure the grounding cable in the grounding lug. Step 4 Remove the adhesive label from the grounding pad on the chassis. Step 5 Place the grounding lug against the grounding pad so that there is solid metal-to-metal contact, and insert t...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
60
Install the cables according to your default software configuration as described in the Cisco Firepower 9300 Getting Started Guide. Cisco Firepower 9300 Hardware Installation Guide 57 Rack-Mount and Ground the Chassis Ground the Chassis
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
61
Cisco Firepower 9300 Hardware Installation Guide 58 Rack-Mount and Ground the Chassis Ground the Chassis
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
62
CHAPTER 4 Installation, Maintenance, and Upgrade • Remove and Replace the Supervisor, on page 59 • Install, Remove, and Replace the Security Module, on page 61 • Remove and Replace the SSD, on page 64 • Install, Remove, and Replace the Single-Wide Network Module, on page 66 • Install, Remove, and Replace the Double-Wid...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
63
Statement 1073—No User-Serviceable Parts There are no serviceable parts inside. To avoid risk of electric shock, do not open. Warning Statement 1089—Instructed and Skilled Person Definitions An instructed person is someone who has been instructed and trained by a skilled person and takes the necessary precautions when ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
64
Figure 39: Remove and Replace the Supervisor Step 4 To install a new Supervisor tray, grasp the front of the tray and place your other hand under the tray to support it. Step 5 Open the handle on the front of the tray. Step 6 Gently slide the tray into the opening until you cannot push it any farther. Step 7 Press the ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
65
If you want to replace an existing security module with another security module, you must decommission the old security module before removing it. See the "Security Module/Engine Management" chapter in the Cisco FXOS Firepower Chassis Manager Configuration Guide for the instructions. After you decommission the old secu...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
66
Statement 1091—Installation by an Instructed Person Only an instructed person orskilled person should be allowed to install, replace, orservice this equipment. See statement 1089 for the definition of an instructed or skilled person. There are no serviceable parts inside. To avoid risk of electric shock, do not open. W...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
67
Step 6 To install a new security module, grasp the front of the security module and place your other hand under the security module to support it. Step 7 Open the handle in the front of the security module. Step 8 Gently slide the security module into the opening until you cannot push it any farther. Step 9 Press the h...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
68
Statement 1073—No User-Serviceable Parts There are no serviceable parts inside. To avoid risk of electric shock, do not open. Warning Statement 1089—Instructed and Skilled Person Definitions An instructed person is someone who has been instructed and trained by a skilled person and takes the necessary precautions when ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
69
Figure 41: Remove the SSD 1 Handle 2 Handle release Step 3 To replace the SSD, hold the SSD in front of slot 1, push it in gently until it is seated, and close the handle. Step 4 Tighten the captive screws on either side of the SSD. Step 5 Acknowledge the slot to start the SSD installation. Install, Remove, and Replace...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
70
Verify that you have the correct ROMMON on the Supervisor to support hot swapping. For instructions on how to verify your firmware package version and to upgrade the firmware if necessary, see the Cisco Firepower 4100/9300 FXOS Firmware Upgrade Guide. Note To remove and replace the network modulesthat do not currently ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
71
Safety Warnings Take note of the following component replacement safety warnings: Statement 1028—More Than One Power Supply This unit might have more than one power supply connection. To reduce risk of electric shock, remove all connections to de-energize the unit. Warning Statement 1073—No User-Serviceable Parts There...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
72
Procedure Step 1 To install a new network module for the first time into an empty slot, do the following: a) Power down the chassis by moving the power switch to the OFF position. b) Follow Steps 5 through 7 to install the new network module. c) Power on the chassis by moving the power switch to the ON position. The st...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
73
Figure 43: Remove and Replace the Single-Wide Network Module If the slot is to remain empty, install a blank faceplate to ensure proper airflow and to keep dust out of the chassis; otherwise, install another network module. Step 4 (Optional) If you are installing a single-wide network module into a double-wide slot, yo...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
74
a) Power up the chassis so that the new network module is recognized (if the new network module does not support hot swapping). b) Bring the new network module online using the appropriate CLI command (if the new network module supports hot swapping). The saved network module configuration is automatically reapplied wh...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
75
Figure 44: 100-Gb Network Module 100-Gigabit Ethernet QSFP28 fiber port Ethernet X/1 1 Captive screw on handle 2 Network activity LEDs • Off—No connection or port is not in use. • Amber—No link or network failure. • Green, flashing—Network activity. 100-Gigabit Ethernet QSFP28 fiber port 4 Ethernet X/2 3 Safety Warning...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
76
Statement 1089—Instructed and Skilled Person Definitions An instructed person is someone who has been instructed and trained by a skilled person and takes the necessary precautions when working with equipment. A skilled person or qualified personnel is someone who has training or experience in the equipment technology ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
77
Note Save the divider in case you ever want to replace the 100-Gb double-wide network module with one or two single-wide network modules. Or you can order the divider kit (FPR9K-NM-DIV=), which contains two dividers, one for the original 9300 chassis and one for the newer 9300 chassis. Figure 45: Remove the Network Mod...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
78
Figure 46: Install the 100-Gb Network Module Step 5 Gently push on the handle until it is fully seated on the network module faceplate and the module is fully seated in the chassis. Step 6 Tighten the captive screw on the left of the network module. Step 7 Power on the chassis so that the new network module is recogniz...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
79
Safety Warnings Take note of the following power and component removal safety warnings: Statement 1003—DC Power Disconnection To reduce risk of electric shock or personal injury, disconnect DC power before removing or replacing components or performing upgrades. Warning Statement 1005—Circuit Breaker This product relie...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
80
Statement 1029—Blank Faceplates and Cover Panels Blank faceplates and cover panels serve three important functions: they reduce the risk of electric shock and fire, they contain electromagnetic interference (EMI) that might disrupt other equipment, and they direct the flow of cooling air through the chassis. Do not ope...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
81
Procedure Step 1 To remove the power supply module, face the front of the chassis, and loosen the captive screw on the right side of the power supply module. Step 2 Lift up the handle of the power supply to unseat it. Step 3 Using the handle, pull the power supply module from its slot. Place your other hand under the p...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
82
Step 8 Verify the power supply module is operating correctly by checking the power supply module LED. See Power Supply Modules, on page 26 for more information. Connect the DC Power Supply Module Note Replace power supplies immediately. Power supply blanks are not available. This procedure describes how to install and ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
83
Statement 1028—More Than One Power Supply This unit might have more than one power supply connection. To reduce risk of electric shock, remove all connections to de-energize the unit. Warning Statement 1029—Blank Faceplates and Cover Panels Blank faceplates and cover panels serve three important functions: they reduce ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
84
Statement 1090—Installation by Skilled Person Only a skilled person should be allowed to install, replace, or service this equipment.See statement 1089 for the definition of a skilled person. There are no serviceable parts inside. To avoid risk of electric shock, do not open. Warning Statement 1091—Installation by an I...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
85
Figure 48: Connect the DC Power Connectors and Ground Lugs 1 DC terminal covers 2 Nuts 3 Two 2-hole lugs (not provided in accessory kit) 4 DC terminals 5 Chassis ground lug Step 7 Connect the DC-input wiresto the power entry module terminal block. The proper wiring sequence is positive to positive (red wire) and negati...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
86
This procedure describes how to install and connect the high-voltage (HV) DC power supply module to the rear powersupply power feeds on the chassis. The load isshared when both powersupply modules are plugged in and running at the same time. The HVDC power supply modules are hot swappable. Safety Warnings Take note of ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
87
Statement 1029—Blank Faceplates and Cover Panels Blank faceplates and cover panels serve three important functions: they reduce the risk of electric shock and fire, they contain electromagnetic interference (EMI) that might disrupt other equipment, and they direct the flow of cooling air through the chassis. Do not ope...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
88
Procedure Step 1 Install the HVDC power supply module in the chassis and make note of the bay number so you can connect the HVDC power cord to the correct power feed on the HVDC power supply module at the rear of the chassis. See Remove and Replace the Power Supply Module, on page 75 for the procedure. Step 2 Verify th...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
89
Step 6 Verify power supply operation by checking the power supply LED on the front of the chassis. See Power Supply Modules, on page 26 for the LED values. Remove and Replace the Fan Module You can remove and replace fan modules while the system is running. The airflow moves from front to back. See Fan Modules, on page...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
90
Statement 1090—Installation by Skilled Person Only a skilled person should be allowed to install, replace, or service this equipment.See statement 1089 for the definition of a skilled person. There are no serviceable parts inside. To avoid risk of electric shock, do not open. Warning Statement 1091—Installation by an I...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
91
Step 4 To install a new fan module, hold the fan module with the spring latch at the top of the module. Step 5 Push the fan module into the chassis until it is properly seated and the spring latch snaps into place. If the system is powered on, listen for the fans. You should immediately hear the fans operating. If you ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
92
Step 2 Using the four 10-32 x .75-in.screwsfrom theFIPSkit, attach theFIPSopacity shield to the left and right chassis brackets, two for each side. Figure 51: Install the FIPS Opacity Shield to the Rack-Mount Rails 1 Screws 2 FIPS opacity shield 3 Rack-mount rails Step 3 Unscrew the two captive screws on the front of t...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
93
Figure 52: Remove the FIPS Access Cover 1 Captive screws 2 Access cover Step 4 Connect the cables to the ports. See the getting started guides listed in Step 9 for the procedure. Step 5 Run the cables through the openings on either side of the FIPS opacity shield and reattach the FIPS access cover by tightening the cap...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
94
Figure 53: Run the Cables Through the FIPS Opacity Shield 1 Cable exit Step 6 Attach the TELs. For information on the procedure and correct placement of the TELs, see the Tamper Evidence Label (TEL) Placement section in the FIPS 140-2 Non Proprietary Security Policy Level 2 Validation document. Step 7 Connect the power...
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
95
Cisco Firepower 9300 Hardware Installation Guide 92 Installation, Maintenance, and Upgrade Install the FIPS Opacity Shield
https://www.cisco.com/c/en/us/td/docs/security/firepower/9300/hw/guide/b_install_guide_9300.pdf
0
Cisco Firepower 4100 Getting Started Guide First Published: 2019-03-05 Last Modified: 2023-01-23 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
1
null
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
2
CHAPTER 1 WhichApplication and Manageris Right for You? Your hardware platform can run one of two applications.For each application, you have a choice of managers. This chapter explains the application and manager choices. • Applications, on page 1 • Managers, on page 1 Applications You can use either theSecureFirewall...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
3
Threat Defense Managers Table 1: Threat Defense Managers Manager Description The management center is a powerful, web-based, multi-device manager that runs on its own server hardware, or as a virtual device on a hypervisor. You should use the management center if you want a multi-device manager, and you require all fea...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
4
Manager Description The threat defense REST API lets you automate direct configuration of the threat defense. This API is compatible with the device manager and CDO use because they can both discover the configuration on the firewall. You cannot use this API if you are managing the threat defense using the management c...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
5
Manager Description The ASA REST API lets you automate ASA configuration. However, the API does not include all ASA features, and is no longer being enhanced. The ASA REST API is not covered in this guide. For more information, see the Cisco ASA REST API Quick Start Guide. ASA REST API Cisco Firepower 4100 Getting Star...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
6
CHAPTER 2 Firepower 4100 Chassis Initial Configuration Is This Chapter for You? This chapter describes how to perform the initial setup for the Cisco Firepower 4100 chassis, including configuring interfaces for use with the ASA and the threat defense logical devices. • Is This Guide for You?, on page 5 • About the Fire...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
7
• Standalone ASA using ASDM This guide does not cover the following deployments, for which you should refer to the FXOS, ASA, FDM, CDO, and FMC configuration guides: • High Availability/Failover • Clustering (ASA, or threat defense using the management center only) • Multi-instance (threat defense using the management ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
8
You can manage the threat defense using one of the following managers: • Management Center—A full-featured, multidevice manager on a separate server. • Device Manager—A simplified, single device manager included on the device. • CDO—A cloud-based, multidevice manager. ASA The ASA provides advanced stateful firewall and...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
9
• Firepower 4150—7 End-to-End Procedure See the following tasks to set up the Firepower 4100 chassis, and to deploy logical devices on your chassis. Pre-Configuration Set up the Firepower 4100 hardware. See the Firepower 4100 hardware guide. Pre-Configuration Cable the Chassis, on page 9. FXOS CLI or Web Perform Initia...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
10
Chassis Manager Add FXOS Users, on page 19. Chassis Manager Configure Interfaces, on page 21. Create logical devices: • Threat Defense with the management center—See Threat Defense Deployment with the Management Center, on page 29. • Threat Defense with the device manager—See Threat Defense Deployment with the Device M...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
11
interface with all logical devices, or if you use separate interfaces, put them on a single management network. But your exact network requirements may vary.For the threat defense, the Management interface is a separate interface from data interfaces, with its own network settings. In 6.7 and later, you can optionally ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
12
Place the management center on (or accessible from) the logical device management network. The threat defense and the management center need access to the internet via the Management network for updates and licensing. In 6.7 and later, you can optionally configure a data interface for the management center management i...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
13
Threat Defense with CDO Cabling This guide assumes that you have a separate management network with its own internet access. By default, the Management interface is preconfigured when you deploy, but you have to configure data interfaces later. Make sure the internet is accessible from the logical device management net...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
14
Perform initial ASA configuration on the logical device Management interface. You can later enable management from any data interface. Perform Initial Chassis Setup Before you can use the chassis manager to configure and manage your system, you must perform some initial configuration tasks. You can perform the initial ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
15
Step 2 Power on the chassis. Step 3 Enter the following URL in your browser: https://ip_address/api Specify the IP address assigned by the DHCP server to the chassis Management port. Step 4 When prompted, log in with the username install and the password chassis_serial_number. The chassis_serial_number can be found on ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
16
• Management IP address and subnet mask • Gateway IP address • Subnets from which you want to allow HTTPS and SSH access • Hostname and domain name • DNS server IP address Procedure Step 1 Power on the chassis. Step 2 Connect to the serial console port using a terminal emulator or use SSH to the chassis Management port...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
17
The system cannot be accessed via SSH if SSH Mgmt Access is not configured. Do you want to configure SSH Mgmt Access? (yes/no) [y]: y SSH Mgmt Access host/network address (IPv4/IPv6): 10.0.0.0 SSH Mgmt Access IPv4 netmask: 255.0.0.0 Firepower Chassis Manager cannot be accessed if HTTPS Mgmt Access is not configured. Do...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
18
Log Into the Chassis Manager Use the chassis manager to configure chassis settings, including enabling interfaces and deploying logical devices. Before you begin • For information on supported browsers, refer to the release notes for the version you are using (see http://www.cisco.com/c/en/us/support/security/firepower...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
19
Step 2 Click the Use NTP Server radio button. Step 3 (Optional) Check the NTP Server Authentication: Enable check box if you need to authenticate the NTP server. You are prompted to enable NTP authentication. Click Yes to require an authentication key ID and value for all NTP server entries. Only SHA1 is supported for ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
20
Step 8 Click Save. If you modify the system time by more than 10 minutes, the system will log you out and you will need to log in to the chassis manager again. Note Add FXOS Users Add local users for the chassis manager and FXOS CLI logins. Procedure Step 1 Choose System > User Management. Step 2 Click Local Users. Ste...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
21
Step 4 Complete the following fields with the required information about the user: • User Name—Sets the username, up to 32 characters. After you save the user, the login ID cannot be changed. You must delete the user account and create a new one. • (Optional) First Name—Sets the first name of the user, up to 32 charact...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
22
• Admin—Complete read-and-write access to the entire system. • Read-Only—Read-only access to system configuration with no privileges to modify the system state. • Operations—Read-and-write access to NTP configuration, Smart Call Home configuration for Smart Licensing, and system logs, including syslog servers and fault...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
23
but you must assign a Management interface to the logical device even if you don't intend to use it after you enable data management. Mgmt interface change will cause reboot of the logical device, for example one change mgmt from e1/1 to e1/2 will cause the logical device to reboot to apply the new management. Note • E...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
24
The All Interfaces page shows a visual representation of the currently-installed interfaces at the top of the page and provides a listing of the installed interfaces in the table below. Step 2 Click the Edit ( ) for the interface you want to edit to open the Edit Interface dialog box. Step 3 Check the Enable check box....
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
25
Step 3 Enter a Port Channel ID, between 1 and 47. Step 4 Check the Enable check box. Step 5 Choose the interface Type: • Data • Data-sharing—For container instances only. • Mgmt • Firepower-eventing—For threat defense only. • Cluster—For clustering only. There are limitations when using Data-sharing type interfaces; se...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
26
You can add multiple interfaces at a time. Click on the desired interfaces while holding down the Ctrl key. To select a range of interfaces, select the first interface in the range, and then, while holding down the Shift key, click to select the last interface in the range. Tip Step 10 To remove an interface from the p...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
27
For Data and Data-sharing interfaces: The type is independent of the parent interface type; you can have a Data-sharing parent and a Data subinterface, for example. There are limitations when using Data-sharing type interfaces; see the FXOS configuration guide for more information. Step 4 Choose the parent Interface fr...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
28
Procedure Step 1 Check your current FXOS version by looking at the Overview page. You can view application images currently available on the chassis in the next step. Step 2 Choose System > Updates. The Available Updates page shows a list of the FXOS platform bundle images and application images. Step 3 Click Upload Im...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
29
Feature Name Version Feature Information To provide flexible physical interface use, you can share interfaces between multiple instances. Note Requires the threat defense Version 6.3 or later. New/Modified screens: Interfaces > All Interfaces > Type Data-sharing interfaces 2.4.1 for container instances You can now set ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
30
CHAPTER 3 Threat Defense Deployment with the Management Center Is This Chapter for You? This chapter describes how to deploy a standalone threat defense logical device with the management center. To deploy a High Availability pair or a cluster, see the Firepower Management Center Configuration Guide. In a typical deplo...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
31
Before You Start Deploy and perform initial configuration of the management center. See the Cisco Firepower Management Center 1600, 2600, and 4600 Hardware Installation Guide or Cisco Secure Firewall Management Center Virtual Getting Started Guide. End-to-End Procedure See the following tasks to deploy and configure th...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
32
Workspace Steps Management Center Register the Threat Defense with the Management Center, on page 39. Management Center Configure a Basic Security Policy, on page 42. Chassis Manager: Add the Threat Defense Logical Device You can deploy the threat defense from the Firepower 4100 as either a native or container instance...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
33
Procedure Step 1 In the chassis manager, choose Logical Devices. Step 2 Click Add > Standalone, and set the following parameters: a) Provide a Device Name. This name is used by the chassis supervisor to configure management settings and to assign interfaces; it is not the device name used in the application configurati...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
34
You can only assign Data and Data-sharing interfaces that you previously enabled on the Interfaces page. You will later enable and configure these interfaces in the management center, including setting the IP addresses. You can only assign up to 10 Data-sharing interfacesto a container instance. Also, each Data-sharing...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
35
a) For a container instance, specify the Resource Profile. If you later assign a different resource profile, then the instance will reload, which can take approximately 5 minutes. Note that for established High Availability pairs or clusters, if you assign a different-sized resource profile, be sure to make all members...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
36
a) For a native instance, in the Management type of application instance drop-down list, choose FMC. Native instances also support the device manager as a manager. After you deploy the logical device, you cannot change the manager type. b) Enter the Firepower Management Center IP or hostname of the managing the managem...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
37
h) Enter a Registration Key to be shared between the management center and the device during registration. You can choose any text string for this key between 1 and 37 characters; you will enter the same key on the management center when you add the threat defense. i) Enter a Password for the threat defense admin user ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
38
Procedure Step 1 Using a supported browser, enter the following URL. https://fmc_ip_address Step 2 Enter your username and password. Step 3 Click Log In. Obtain Licenses for the Management Center All licenses are supplied to the threat defense by the management center. You can purchase the following licenses: • IPS—Sec...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
39
Figure 1: License Search Note If a PID is not found, you can add the PID manually to your order. • IPS, Malware Defense, and URL license combination: • L-FPR4112T-TMC= • L-FPR4115T-TMC= • L-FPR4125T-TMC= • L-FPR4145T-TMC= When you add one of the above PIDs to your order, you can then choose a term-based subscription co...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
40
Registering requires you to generate a registration token in theSmartSoftware Manager.See the CiscoSecure Firewall Management Center Administration Guide for detailed instructions. Register the Threat Defense with the Management Center Register each logical device individually to the same management center. Before you ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
41
Set the following parameters: • Host—Enter the IP address or hostname of the threat defense you want to add. You can leave this field blank if you specified both the management center IP address and a NAT ID in the threat defense initial bootstrap configuration. In an HA environment, when both the management centers ar...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
42
Figure 2: New Policy • Smart Licensing—Assign the Smart Licenses you need for the features you want to deploy: Malware (if you intend to use malware inspection), Threat (if you intend to use intrusion prevention), and URL (if you intend to implement category-based URL filtering). Note: You can apply anSecure Client rem...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
43
• Registration key, NAT ID, and the management center IP address—Make sure you are using the same registration key, and if used, NAT ID, on both devices. You can set the registration key and NAT ID on the management center using the configure manager add command. For more troubleshooting information, see https://cisco....
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
44
The following example configures a routed mode inside interface with a static address and a routed mode outside interface using DHCP. Procedure Step 1 Choose Devices > Device Management, and click the Edit ( ) for the firewall. Step 2 Click Interfaces. Step 3 Click Edit ( ) for the interface that you want to use for in...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
45
d) From the Security Zone drop-down list, choose an existing inside security zone or add a new one by clicking New. For example, add a zone called inside_zone. Each interface must be assigned to a security zone and/or interface group. An interface can belong to only one security zone, but can also belong to multiple in...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
46
If you pre-configured this interface for manager access, then the interface will already be named, enabled, and addressed. You should not alter any of these basic settings because doing so will disrupt the management center management connection. You can still configure the Security Zone on this screen for through traf...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
47
• IPv6—Check the Autoconfiguration check box for stateless autoconfiguration. f) Click OK. Step 5 Click Save. Configure the DHCP Server Enable the DHCP server if you want clients to use DHCP to obtain IP addresses from the threat defense. Procedure Step 1 Choose Devices > Device Management, and click the Edit ( ) for t...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
48
Add the Default Route The default route normally pointsto the upstream router reachable from the outside interface. If you use DHCP for the outside interface, your device might have already received a default route. If you need to manually add the route, complete this procedure. If you received a default route from the...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
49
The route is added to the static route table. Step 4 Click Save. Configure NAT A typical NAT rule converts internal addresses to a port on the outside interface IP address. This type of NAT rule is called interface Port Address Translation (PAT). Procedure Step 1 Choose Devices > NAT, and click New Policy > Threat Defe...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
50
The policy is added the management center. You still have to add rules to the policy. Step 3 Click Add Rule. The Add NAT Rule dialog box appears. Step 4 Configure the basic rule options: • NAT Rule—Choose Auto NAT Rule. • Type—Choose Dynamic. Step 5 On the Interface Objects page, add the outside zone from the Available...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
51
• Original Source—Click Add ( ) to add a network object for all IPv4 traffic (0.0.0.0/0). You cannot use the system-defined any-ipv4 object, because Auto NAT rules add NAT as part of the object definition, and you cannot edit system-defined objects. Note • Translated Source—Choose Destination Interface IP. Step 7 Click...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
52
Step 2 Click Add Rule, and set the following parameters: • Name—Name this rule, for example, inside_to_outside. • Source Zones—Select the inside zone from Available Zones, and click Add to Source. • Destination Zones—Select the outside zone from Available Zones, and click Add to Destination. Leave the other settings as...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
53
Figure 3: Deploy Step 2 Either click Deploy All to deploy to all devices or click Advanced Deploy to deploy to selected devices. Figure 4: Deploy All Figure 5: Advanced Deploy Step 3 Ensure that the deployment succeeds. Click the icon to the right of the Deploy button in the menu bar to see status for deployments. Cisc...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
54
Figure 6: Deployment Status Access the Threat Defense CLI You can use the threat defense CLI to change management interface parameters and for troubleshooting purposes. You can access the CLI using SSH to the Management interface, or by connecting from the FXOS CLI. Procedure Step 1 (Option 1) SSH directly to the threa...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf