index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
55
b) Connect to the threat defense console. connect ftd name If you have multiple application instances, you must specify the name of the instance. To view the instance names, enter the command without a name. Example: Firepower-module1> connect ftd FTD_Instance1 ============================= ATTENTION ==================...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
56
Firepower-module1>connect ftd FTD_Instance1 ============================= ATTENTION ============================== You are connecting to ftd from a serial console. Please avoid executing any commands which may produce large amount of output. Otherwise, data cached along the pipe may take up to 12 minutes to be drained ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
57
Feature Name Version Feature Information You can now deploy multiple logical devices, each with the threat defense container instance, on a single security engine/module. Formerly, you could only deploy a single native application instance. To provide flexible physical interface use, you can create VLAN subinterfaces i...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
58
CHAPTER 4 Threat Defense Deployment with the Device Manager Is This Chapter for You? This chapter describes how to deploy a standalone the threat defense logical device with the device manager. To deploy a High Availability pair, see the Cisco Secure Firewall Device Manager Configuration Guide. The device manager lets ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
59
Workspace Steps Chassis Manager Chassis Manager: Add the Threat Defense Logical Device, on page 58. Device Manager Log Into the Device Manager, on page 62. Cisco Commerce Configure Licensing, on page 62: Buy feature licenses. Workspace Configure Licensing, on page 62: Generate a license token for the device manager. Sm...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
60
Before you begin • Configure a Management interface to use with the threat defense; see Configure Interfaces, on page 21. The Management interface isrequired. Note that this Management interface is not the same asthe chassis management port that is used only for chassis management (and that appears at the top of the In...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
61
You can only assign data interfaces that you previously enabled on the Interfaces page. You will later enable and configure these interfaces in the device manager, including setting the IP addresses. Step 4 Click the device icon in the center of the screen. A dialog box appears where you can configure initial bootstrap...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
62
Set a unique IP address for this interface. d) Enter a Network Mask or Prefix Length. e) Enter a Network Gateway address. Step 6 On the Settings tab, complete the following: a) In the Management type of application instance drop-down list, choose LOCALLY_MANAGED. Native instances also support the management center as a...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
63
Log Into the Device Manager Log into the device manager to configure your threat defense. Before you begin • Use a current version of Firefox, Chrome, Safari, Edge, or Internet Explorer. • Make sure the threat defense logical device Status is online on the chassis manager Logical Devices page. Procedure Step 1 Enter th...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
64
The Essentials license is included automatically. Smart Licensing does not prevent you from using product featuresthat you have not yet purchased. You can start using a license immediately, aslong as you are registered with the Smart Software Manager, and purchase the license later. This allows you to deploy and use a ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
65
• L-FPR4112T-TMC-1Y • L-FPR4112T-TMC-3Y • L-FPR4112T-TMC-5Y • L-FPR4115T-TMC-1Y • L-FPR4115T-TMC-3Y • L-FPR4115T-TMC-5Y • L-FPR4125T-TMC-1Y • L-FPR4125T-TMC-3Y • L-FPR4125T-TMC-5Y • L-FPR4145T-TMC-1Y • L-FPR4145T-TMC-3Y • L-FPR4145T-TMC-5Y • Cisco Secure Client—See the Cisco Secure Client Ordering Guide. Step 2 In the ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
66
• Description • Expire After—Cisco recommends 30 days. • Allow export-controlled functionality on the products registered with this token—Enables the export-compliance flag if you are in a country that allows for strong encryption. You must select this option now if you plan to use this functionality. If you enable thi...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
67
Step 3 In the device manager, click Device, and then in the Smart License summary, click View Configuration. You see the Smart License page. Step 4 Click Register Device. Then follow the instructions on the Smart License Registration dialog box to paste in your token: Step 5 Click Register Device. You return to the Sma...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
68
After the device successfully registers and you refresh the page, you see the following: Step 6 Click the Enable/Disable control for each optional license as desired. • Enable—Registersthe license with your CiscoSmartSoftware Manager account and enablesthe controlled features. You can now configure and deploy policies ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
69
Step 7 Choose Resync Connection from the gear drop-down list to synchronize license information with Cisco Smart Software Manager. Configure a Basic Security Policy To configure a basic security policy, complete the following tasks. Configure Interfaces, on page 69. Assign a static IP address to the inside interface, a...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
70
Configure Interfaces Enable the threat defense interfaces and set the IPaddresses. Typically, you must configure at least a minimum of two interfacesto have a system that passes meaningful traffic. Normally, you would have an outside interface that faces the upstream router or internet, and one or more inside interface...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
71
a) Set the Interface Name. Set the name for the interface, up to 48 characters. Alphabetic characters must be lower case.For example, inside or outside. Without a name, the rest of the interface configuration is ignored. Unless you configure subinterfaces, the interface should have a name. b) Set the Mode to Routed. If...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
72
Step 5 Click the edit icon ( ) for the interface that you want to use for outside, and set the same fields as for inside; for this interface, choose DHCP for the IPv4 Address. If you use a static IP address or do not receive the default route from DHCP, you will need to manually set a default route;see the CiscoSecureF...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
73
Procedure Step 1 Select Objects, then select Security Zones from the table of contents. Step 2 Click the edit icon ( ) for the inside_zone. Step 3 In the Interfaces list, click and select the inside interface to add to the zone. Step 4 Click OK to save your changes. Step 5 Repeat these steps to add the outside interfac...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
74
Add the Default Route The default route normally pointsto the upstream router reachable from the outside interface. If you use DHCP for the outside interface, your device might have already received a default route. If you need to manually add the route, complete this procedure. If you received a default route from the...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
75
a) Enter a Name, for example, default. b) Click either the IPv4 or IPv6 radio button. You need to create separate default routes for IPv4 and IPv6. c) Click Gateway, and then click Create New Network to add the gateway IP address as a host object. Cisco Firepower 4100 Getting Started Guide 74 Threat Defense Deployment ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
76
d) Choose the gateway Interface, for example outside. e) Click the Networks icon, and choose any-ipv4 for an IPv4 default route or any-ipv6 for an IPv6 default route. Step 4 Click OK. Configure NAT A typical NAT rule converts internal addresses to a port on the outside interface IP address. This type of NAT rule is cal...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
77
a) Set the Title. b) Choose Create Rule For > Auto NAT. c) Choose Type > Dynamic. Step 4 Configure the following packet translation options: a) For the Original Packet, set the Original Address as any-ipv4. This rule will translate all IPv4 traffic originating on any interface. If you want to restrict the interfaces or...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
78
Step 6 Click OK. Allow Traffic from Inside to Outside By default, traffic is blocked between security zones. This procedure shows how to allow traffic from inside to outside. Procedure Step 1 Choose Policies > Access Control. Step 2 Click or Create Access Rule. Step 3 Configure the basic rule options: a) Set the Title....
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
79
c) For the Destination, click the Zones icon, and choose the outside zone. d) (Optional) Click Show Diagram to view a visual representation of the rule. e) Click OK. (Optional) Configure the DHCP Server Enable the DHCP server if you want clients to use DHCP to obtain IP addresses from the threat defense. Procedure Step...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
80
DHCPauto configuration enables the DHCPServer to provide DHCPclients with DNSserver, domain name, and WINSserver information obtained from a DHCPclient that isrunning on the specified interface. Typically, you would use auto-configuration if you are obtaining an address using DHCP on the outside interface, but you coul...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
81
the threat defense if you are on a directly-connected management network, but management traffic destined for any other network will be routed out the data interfaces instead of through management. Also, by default, you can only manage the threat defense through the management interface (device manager or CLI access). ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
82
c) Click Save, read the warning, and click OK. Deploy the Configuration Deploy the configuration changes to the threat defense; none of your changes are active on the device until you deploy them. Procedure Step 1 Click the Deploy Changes icon in the upper right of the web page. The icon is highlighted with a dot when ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
83
Procedure Step 1 (Option 1) SSH directly to the threat defense management interface IP address. You set the management IP address when you deployed the logical device. Log into the threat defense with the admin account and the password you set during initial deployment. If you forgot the password, you can change it by ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
84
d) Return to the supervisor level of the FXOS CLI. To exit the console: 1. Enter ~ You exit to the Telnet application. 2. To exit the Telnet application, enter: telnet>quit To exit the Telnet session: Enter Ctrl-], . Example The following example connects to the threat defense and then exits back to the supervisor leve...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
85
For information related to using the device manager,see CiscoFirepower Threat Defense Configuration Guide for Firepower Device Manager. History for Threat Defense with the Device Manager Feature Name Version Feature Information You can now deploy a native instance using the device manager. New/Modified screens: Logical...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
86
CHAPTER 5 Threat Defense Deployment with CDO Is This Chapter for You? To see all available operating systems and managers, see Which Application and Manager is Right for You?, on page 1. This chapter appliesto the threat defense using Cisco Defense Orchestrator (CDO)'s cloud-delivered Secure Firewall Management Center....
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
87
• Access the Threat Defense and FXOS CLI, on page 109 • What's Next, on page 111 About Threat Defense Management by CDO The cloud-delivered management center management center offers many of the same functions as an on-premises management center and has the same look and feel. When you use CDO as the primary manager, y...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
88
CDO Onboard a Device with the Onboarding Wizard, on page 93. Chassis Manager Chassis Manager: Add the Threat Defense Logical Device, on page 94. CDO Configure a Basic Security Policy, on page 42. Obtain Licenses All licenses are supplied to the threat defense by CDO. You can optionally purchase the following feature li...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
89
Figure 11: License Search Note If a PID is not found, you can add the PID manually to your order. • IPS, Malware Defense, and URL license combination: • L-FPR4112T-TMC= • L-FPR4115T-TMC= • L-FPR4125T-TMC= • L-FPR4145T-TMC= When you add one of the above PIDs to your order, you can then choose a term-based subscription c...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
90
Registering requires you to generate a registration token in the Smart Software Manager. See the CDO documentation for detailed instructions. Log Into CDO CDO uses Cisco Secure Sign-On as its identity provider and Duo Security for multi-factor authentication (MFA). CDO requires MFA which provides an added layer of secu...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
91
Figure 12: Cisco SSO Sign Up c) Fill in the fields of the Create Account dialog and click Register. Figure 13: Create Account Enter the email address that you plan to use to log in to CDO and add an Organization name to represent your company. Tip Cisco Firepower 4100 Getting Started Guide 90 Threat Defense Deployment ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
92
d) After you click Register, Cisco sends you a verification email to the address you registered with. Open the email and click Activate Account. Step 2 Set up Multi-factor Authentication Using Duo. a) In the Set up multi-factor authentication screen, click Configure. b) Click Start setup and follow the prompts to choos...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
93
Before you begin Cisco Defense Orchestrator (CDO) uses Cisco Secure Sign-On as its identity provider and Duo Security for multi-factor authentication (MFA). • To log into CDO, you must first create your account in Cisco Secure Sign-On and configure MFA using Duo; see Create a New Cisco Secure Sign-On Account, on page 8...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
94
Onboard a Device with the Onboarding Wizard Onboard the threat defense using CDO's onbaording wizard using a CLI registration key. Procedure Step 1 In the CDO navigation pane, click Inventory, then click the blue plus button ( ) to Onboard a device. Step 2 Select the FTD tile. Step 3 Under Management Mode, be sure FTD ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
95
Step 10 (Optional) Add labels to your device to help sort and filter the Inventory page. Enter a label and select the blue plus button ( ). Labels are applied to the device after it's onboarded to CDO. What to do next From the Inventory page, select the device you just onboarded and select any of the option listed unde...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
96
Figure 17: Add a Standalone Device a) Provide a Device Name. This name is used by the chassis supervisor to configure management settings and to assign interfaces; it is not the device name used in the application configuration. Note You cannot change this name after you add the logical device. b) For the Template, cho...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
97
continues to flow between an inline interface pair during a power outage. This feature can be used to maintain network connectivity in the case of software or hardware failures. If you do not assign both interfaces in a Hardware Bypass pair, you see a warning message to make sure your assignment is intentional. You do ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
98
Figure 19: Settings a) In the Management type of application instance drop-down list, choose CDO. b) Enter the Search Domains as a comma-separated list. c) Choose the Firewall Mode: Transparent or Routed. In routed mode, the threat defense is considered to be a router hop in the network. Each interface that you want to...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
99
for the status of the new logical device. When the logical device shows its Status as online, you can start configuring the security policy in the application. Configure a Basic Security Policy This section describes how to configure a basic security policy with the following settings: • Inside and outside interfaces—A...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
100
Configure Interfaces Enable the threat defense interfaces, assign them to security zones, and set the IP addresses. Typically, you must configure at least a minimum of two interfacesto have a system that passes meaningful traffic. Normally, you would have an outside interface that facesthe upstream router or internet, ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
101
a) Enter a Name up to 48 characters in length. For example, name the interface inside. b) Check the Enabled check box. c) Leave the Mode set to None. d) From the Security Zone drop-down list, choose an existing inside security zone or add a new one by clicking New. For example, add a zone called inside_zone. Each inter...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
102
• IPv6—Check the Autoconfiguration check box for stateless autoconfiguration. f) Click OK. Step 4 Click the Edit ( ) for the interface that you want to use for outside. The General tab appears. If you pre-configured this interface for manager access, then the interface will already be named, enabled, and addressed. You...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
103
• IPv6—Check the Autoconfiguration check box for stateless autoconfiguration. f) Click OK. Step 5 Click Save. Configure the DHCP Server Enable the DHCP server if you want clients to use DHCP to obtain IP addresses from the threat defense. Procedure Step 1 Choose Devices > Device Management, and click the Edit ( ) for t...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
104
Add the Default Route The default route normally pointsto the upstream router reachable from the outside interface. If you use DHCP for the outside interface, your device might have already received a default route. If you need to manually add the route, complete this procedure. If you received a default route from the...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
105
The route is added to the static route table. Step 4 Click Save. Configure NAT A typical NAT rule converts internal addresses to a port on the outside interface IP address. This type of NAT rule is called interface Port Address Translation (PAT). Procedure Step 1 Choose Devices > NAT, and click New Policy > Threat Defe...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
106
The policy is added the management center. You still have to add rules to the policy. Step 3 Click Add Rule. The Add NAT Rule dialog box appears. Step 4 Configure the basic rule options: • NAT Rule—Choose Auto NAT Rule. • Type—Choose Dynamic. Step 5 On the Interface Objects page, add the outside zone from the Available...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
107
• Original Source—Click Add ( ) to add a network object for all IPv4 traffic (0.0.0.0/0). You cannot use the system-defined any-ipv4 object, because Auto NAT rules add NAT as part of the object definition, and you cannot edit system-defined objects. Note • Translated Source—Choose Destination Interface IP. Step 7 Click...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
108
Step 2 Click Add Rule, and set the following parameters: • Name—Name this rule, for example, inside_to_outside. • Source Zones—Select the inside zone from Available Zones, and click Add to Source. • Destination Zones—Select the outside zone from Available Zones, and click Add to Destination. Leave the other settings as...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
109
Figure 20: Deploy Step 2 Either click Deploy All to deploy to all devices or click Advanced Deploy to deploy to selected devices. Figure 21: Deploy All Figure 22: Advanced Deploy Step 3 Ensure that the deployment succeeds. Click the icon to the right of the Deploy button in the menu bar to see status for deployments. C...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
110
Figure 23: Deployment Status Access the Threat Defense and FXOS CLI You can use the threat defense CLI to change management interface parameters and for troubleshooting purposes. You can access the CLI using SSH to the Management interface, or by connecting from the FXOS CLI. Procedure Step 1 (Option 1) SSH directly to...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
111
b) Connect to the threat defense console. connect ftd name If you have multiple application instances, you must specify the name of the instance. To view the instance names, enter the command without a name. Example: Firepower-module1> connect ftd FTD_Instance1 ============================= ATTENTION ==================...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
112
Firepower-module1>connect ftd FTD_Instance1 ============================= ATTENTION ============================== You are connecting to ftd from a serial console. Please avoid executing any commands which may produce large amount of output. Otherwise, data cached along the pipe may take up to 12 minutes to be drained ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
113
Cisco Firepower 4100 Getting Started Guide 112 Threat Defense Deployment with CDO What's Next
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
114
CHAPTER 6 ASA Deployment with ASDM Is This Chapter for You? This chapter describes how to deploy a standalone ASA logical device, including how to configure smart licensing. This chapter does not cover the following deployments, for which you should refer to the ASA configuration guide: • Clustering • Failover • CLI co...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
115
Chassis Manager: Register the Chassis with the Licensing Server, on page 114: Obtain feature licenses. Cisco Commerce Workspace Chassis Manager: Register the Chassis with the Licensing Server, on page 114: Generate a license token for the chassis. Smart Software Manager Chassis Manager: Register the Chassis with the Li...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
116
(formerly known as a Satellite server). For more information about these offline licensing methods, see Cisco ASA Series Feature Licenses; this guide applies to regular Smart Licensing. For a more detailed overview on Cisco Licensing, go to cisco.com/go/licensingguide For the ASA on the Firepower 4100, Smart Software L...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
117
Procedure Step 1 Make sure your Smart Licensing account contains the available licenses you need, including at a minimum the Essentials license. When you bought your device from Cisco or a reseller, your licenses should have been linked to your Smart Software Manager account. However, if you need to add licenses yourse...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
118
c) On the Create Registration Tokendialog box enter the following settings, and then click Create Token: • Description • Expire After—Cisco recommends 30 days. • Allow export-controlled functionaility on the products registered with this token—Enables the export-compliance flag. The token is added to your inventory. d)...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
119
Figure 25: View Token Figure 26: Copy Token Step 3 In the chassis manager, choose System > Licensing > Smart License. Step 4 Enter the registration token in the Enter Product Instance Registration Token field. Step 5 Click Register. The Firepower 4100 registers with the License Authority. Successful registration can ta...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
120
Figure 28: Registration Successful Chassis Manager: Add an ASA Logical Device You can deploy an ASA from the Firepower 4100 as a native instance. To add a failover pair or cluster, see the ASA general operations configuration guide. This procedure lets you configure the logical device characteristics, including the boo...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
121
a) Provide a Device Name. This name is used by the chassis supervisor to configure management settings and to assign interfaces; it is not the device name used in the application configuration. Note You cannot change this name after you add the logical device. b) For the Template, choose Cisco: Adaptive Security Applia...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
122
A dialog box appears where you can configure initial bootstrap settings. These settings are meant for initial deployment only, or for disaster recovery. For normal operation, you can later change most values in the application CLI configuration. Step 5 On the General Information page, complete the following: a) Choose ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
123
The firewall mode is only set at initial deployment. If you re-apply the bootstrap settings, this setting is not used. b) Enter and confirm a Password for the admin user and for the enable password. The preconfigured ASA admin user/password and enable password are useful for password recovery; if you have FXOS access, ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
124
The Cisco ASDM web page appears. You may see browser security warnings because the ASA does not have a certificate installed; you can safely ignore these warnings and visit the web page. Step 2 Click one of these available options: Install ASDM Launcher or Run ASDM. Step 3 Follow the onscreen instructions to launch ASD...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
125
Step 3 Click Apply. If you do not have the appropriate licenses in your account, you cannot apply your license changes. Step 4 Click the Save icon in the toolbar. Step 5 Quit ASDM and relaunch it. When you change licenses, you need to relaunch ASDM to show updated screens. Configure the ASA Using ASDM, you can use wiza...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
126
Step 2 The Startup Wizard walks you through configuring: • The enable password • Interfaces, including setting the inside and outside interface IP addresses and enabling interfaces. • Static routes • The DHCP server • And more... Step 3 (Optional) From the Wizards menu, run other wizards. Step 4 To continue configuring...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
127
Access the ASA CLI You can use the ASA CLI to troubleshoot or configure the ASA instead of using ASDM. You can access the CLI by connecting from the FXOS CLI. You can later configure SSH access to the ASA on any interface. See the ASA general operations configuration guide for more information. Procedure Step 1 From th...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
128
a) Enter Ctrl-], . Example The following example shows how to connect to an ASA and then exit back to the supervisor level of the FXOS CLI. Firepower# connect module 1 console Telnet escape character is '~'. Trying 127.5.1.1... Connected to 127.5.1.1. Escape character is '~'. CISCO Serial Over LAN: Close Network Connec...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
129
Feature Version Details The smart agent was upgraded from Version 1.1 to Version 1.6. This upgrade supports permanent license reservation and also supports setting the Strong Encryption (3DES/AES) license entitlement according to the permission set in your license account. Smart Agent Upgrade to 9.6(2) v1.6 The new Car...
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
130
© 2023 Cisco Systems, Inc. All rights reserved.
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
131
null
https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf
0
Secure Firewall Management Center and Threat Defense Management Network Administration First Published: 2020-04-22 Last Modified: 2022-02-16 Secure Firewall Management Center and Threat Defense Management Network Administration This document describesthe management connection between the CiscoSecureFirewall Management ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
1
Although the management center can manage devices running certain previous releases as specified in the compatibility matrix available at http://www.cisco.com/c/en/us/support/security/defense-center/ products-device-support-tables-list.html, new features that require the latest version of threat defense software are no...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
2
You can also configure additional management interfaces. When the management center manages large numbers of devices on different networks, adding more management interfaces can improve throughput and performance. You can also use these interfaces for all other management functions. You might want to use each managemen...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
3
Using the Threat Defense Data Interface for Management You can use either the dedicated Management interface or a regular data interface for communication with the management center. Manager access on a data interface is useful if you want to manage the threat defense remotely from the outside interface, or you do not ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
4
Management Interface Support Per Management Center Model See the hardware installation guide for your model for the management interface locations. See the following table for supported management interfaces on each management center model. Table 1: Management Interface Support on the Management Center Model Management...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
5
Model Management Interface Optional Event Interface management1 management1 is the internal name of this interface, regardless of the physical interface ID. Note management0 management0 is the internal name of this interface, regardless of the physical interface ID. Note Firepower 4100 and 9300 br1 No support br1 is th...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
6
You can configure multiple management interfaces on some platforms (a management interface and an event-only interface). The default route does not include an egress interface, so the interface chosen depends on the gateway address you specify, and which interface's network the gateway belongs to. In the case of multip...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
7
Figure 1: NAT ID for Managed Devices Behind PAT The following example shows the management center behind a PAT IP address. In this case, specify a unique NAT ID per device on both the management center and the devices, and specify the device IP addresses on the management center. Figure 2: NAT ID for Management Center ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
8
Management and Event Traffic Channel Examples If you use a data interface for management on a threat defense, you cannot use separate management and event interfaces for that device. Note The following example showsthe management center and managed devices using only the default management interfaces. Figure 3: Single ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
9
Figure 5: Separate Event Interface on the Secure Firewall Management Center and Managed Devices The following example shows a mix of multiple management interfaces and a separate event interface on the management center and a mix of managed devices using a separate event interface, or using a single management interfac...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
10
• Ethernet 1/2 (or for the Firepower 1010, the VLAN1 interface)— "inside", 192.168.95.1/24 • Default route—Obtained through DHCP on the outside interface Note that other settings, such as the DHCP server on inside, access control policy, or security zones, are not configured. If you perform additional interface-specifi...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
11
If you want to use a different interface from outside (or inside) for manager access, you will have to configure it manually after completing the setup wizard. Configure IPv4—The IPv4 address for the outside interface. You can use DHCP or manually enter a static IPaddress,subnet mask, and gateway. You can also select O...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
12
• Management interface for manager access—If you want to configure a static IP address, be sure to also set the default gateway to be a unique gateway instead of the data interfaces. If you use DHCP, then you do not need to configure anything assuming you successfully get the gateway from DHCP. Step 4 If you want to co...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
13
Figure 7: Management Center/CDO Details a) For Do you know the Management Center/CDO hostname or IP address, click Yes if you can reach the management center using an IP address or hostname, or No if the management center is behind NAT or does not have a public IP address or hostname. Secure Firewall Management Center ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
14
At least one of the devices, either the management center or the threat defense device, must have a reachable IPaddressto establish the two-way, TLS-1.3-encrypted communication channel between the two devices. b) If you chose Yes, then enter the Management Center/CDO Hostname/IP Address. c) Specify the Management Cente...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
15
Step 8 (Optional) If you chose a data interface, and it was not the outside interface, then add a default route. You will see a message telling you to check that you have a default route through the interface. If you chose outside, you already configured this route as part of the setup wizard. If you chose a different ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
16
Complete the Threat Defense Initial Configuration Using the CLI Connect to the threat defense CLI to perform initial setup, including setting the Management IP address, gateway, and other basic networking settings using the setup wizard. The dedicated Management interface is a special interface with its own network set...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
17
Step 3 (Firepower and Secure Firewall hardware models) If you connected to FXOS on the console port, connect to the threat defense CLI. connect ftd Example: firepower# connect ftd > Step 4 The first time you log in to the threat defense, you are prompted to accept the End User License Agreement (EULA) and, if using an ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
18
You must accept the EULA to continue. Press <ENTER> to display the EULA: End User License Agreement [...] Please enter 'YES' or press <ENTER> to AGREE to the EULA: System initialization in progress. Please stand by. You must configure the network to continue. Configure at least one of IPv4 or IPv6 unless managing via d...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
19
this sensor to the Firepower Management Center. > Step 5 Identify the management center that will manage this threat defense. configure manager add {hostname | IPv4_address | IPv6_address | DONTRESOLVE} reg_key [nat_id] [display_name] If you are using CDO for management, use the CDO-generated configure manager add comm...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
20
If the threat defense is behind a NAT device, enter a unique NAT ID along with the management center IP address or hostname, for example: > configure manager add 10.70.45.5 regk3y78 natid56 Manager successfully configured. Step 6 If you are using CDO as your primary manager and want to use an on-prem management center ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
21
• This command sets the data interface DNS server. The Management DNS server that you set with the setup script (or using the configure network dns servers command) is used for management traffic. The data DNS server is used for DDNS (if configured) or for security policies applied to this interface. On the management ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
22
Configuration done with option to allow manager access from any network, if you wish to change the manager access network use the 'client' option in the command 'configure network management-data-interface'. Setting IPv4 network configuration. Network settings changed. > Step 8 (Optional) Limit data interface access to...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf