index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
55 | b) Connect to the threat defense console.
connect ftd name
If you have multiple application instances, you must specify the name of the instance. To view the instance
names, enter the command without a name.
Example:
Firepower-module1> connect ftd FTD_Instance1
============================= ATTENTION ==================... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
56 | Firepower-module1>connect ftd FTD_Instance1
============================= ATTENTION ==============================
You are connecting to ftd from a serial console. Please avoid
executing any commands which may produce large amount of output.
Otherwise, data cached along the pipe may take up to 12 minutes to be
drained ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
57 | Feature Name Version Feature Information
You can now deploy multiple logical devices, each with the threat defense container instance,
on a single security engine/module. Formerly, you could only deploy a single native application
instance.
To provide flexible physical interface use, you can create VLAN subinterfaces i... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
58 | CHAPTER 4
Threat Defense Deployment with the Device
Manager
Is This Chapter for You?
This chapter describes how to deploy a standalone the threat defense logical device with the device manager.
To deploy a High Availability pair, see the Cisco Secure Firewall Device Manager Configuration Guide.
The device manager lets ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
59 | Workspace Steps
Chassis Manager Chassis Manager: Add the Threat Defense Logical Device, on page 58.
Device Manager Log Into the Device Manager, on page 62.
Cisco Commerce Configure Licensing, on page 62: Buy feature licenses.
Workspace
Configure Licensing, on page 62: Generate a license token for the device
manager.
Sm... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
60 | Before you begin
• Configure a Management interface to use with the threat defense; see Configure Interfaces, on page 21.
The Management interface isrequired. Note that this Management interface is not the same asthe chassis
management port that is used only for chassis management (and that appears at the top of the In... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
61 | You can only assign data interfaces that you previously enabled on the Interfaces page. You will later enable
and configure these interfaces in the device manager, including setting the IP addresses.
Step 4 Click the device icon in the center of the screen.
A dialog box appears where you can configure initial bootstrap... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
62 | Set a unique IP address for this interface.
d) Enter a Network Mask or Prefix Length.
e) Enter a Network Gateway address.
Step 6 On the Settings tab, complete the following:
a) In the Management type of application instance drop-down list, choose LOCALLY_MANAGED.
Native instances also support the management center as a... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
63 | Log Into the Device Manager
Log into the device manager to configure your threat defense.
Before you begin
• Use a current version of Firefox, Chrome, Safari, Edge, or Internet Explorer.
• Make sure the threat defense logical device Status is online on the chassis manager Logical Devices
page.
Procedure
Step 1 Enter th... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
64 | The Essentials license is included automatically. Smart Licensing does not prevent you from using product
featuresthat you have not yet purchased. You can start using a license immediately, aslong as you are registered
with the Smart Software Manager, and purchase the license later. This allows you to deploy and use a ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
65 | • L-FPR4112T-TMC-1Y
• L-FPR4112T-TMC-3Y
• L-FPR4112T-TMC-5Y
• L-FPR4115T-TMC-1Y
• L-FPR4115T-TMC-3Y
• L-FPR4115T-TMC-5Y
• L-FPR4125T-TMC-1Y
• L-FPR4125T-TMC-3Y
• L-FPR4125T-TMC-5Y
• L-FPR4145T-TMC-1Y
• L-FPR4145T-TMC-3Y
• L-FPR4145T-TMC-5Y
• Cisco Secure Client—See the Cisco Secure Client Ordering Guide.
Step 2 In the ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
66 | • Description
• Expire After—Cisco recommends 30 days.
• Allow export-controlled functionality on the products registered with this token—Enables the
export-compliance flag if you are in a country that allows for strong encryption. You must select this
option now if you plan to use this functionality. If you enable thi... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
67 | Step 3 In the device manager, click Device, and then in the Smart License summary, click View Configuration.
You see the Smart License page.
Step 4 Click Register Device.
Then follow the instructions on the Smart License Registration dialog box to paste in your token:
Step 5 Click Register Device.
You return to the Sma... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
68 | After the device successfully registers and you refresh the page, you see the following:
Step 6 Click the Enable/Disable control for each optional license as desired.
• Enable—Registersthe license with your CiscoSmartSoftware Manager account and enablesthe controlled
features. You can now configure and deploy policies ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
69 | Step 7 Choose Resync Connection from the gear drop-down list to synchronize license information with Cisco
Smart Software Manager.
Configure a Basic Security Policy
To configure a basic security policy, complete the following tasks.
Configure Interfaces, on page 69.
Assign a static IP address to the inside interface, a... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
70 | Configure Interfaces
Enable the threat defense interfaces and set the IPaddresses. Typically, you must configure at least a minimum
of two interfacesto have a system that passes meaningful traffic. Normally, you would have an outside interface
that faces the upstream router or internet, and one or more inside interface... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
71 | a) Set the Interface Name.
Set the name for the interface, up to 48 characters. Alphabetic characters must be lower case.For example,
inside or outside. Without a name, the rest of the interface configuration is ignored. Unless you configure
subinterfaces, the interface should have a name.
b) Set the Mode to Routed.
If... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
72 | Step 5 Click the edit icon ( ) for the interface that you want to use for outside, and set the same fields as for inside;
for this interface, choose DHCP for the IPv4 Address.
If you use a static IP address or do not receive the default route from DHCP, you will need to
manually set a default route;see the CiscoSecureF... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
73 | Procedure
Step 1 Select Objects, then select Security Zones from the table of contents.
Step 2 Click the edit icon ( ) for the inside_zone.
Step 3 In the Interfaces list, click and select the inside interface to add to the zone.
Step 4 Click OK to save your changes.
Step 5 Repeat these steps to add the outside interfac... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
74 | Add the Default Route
The default route normally pointsto the upstream router reachable from the outside interface. If you use DHCP
for the outside interface, your device might have already received a default route. If you need to manually
add the route, complete this procedure. If you received a default route from the... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
75 | a) Enter a Name, for example, default.
b) Click either the IPv4 or IPv6 radio button.
You need to create separate default routes for IPv4 and IPv6.
c) Click Gateway, and then click Create New Network to add the gateway IP address as a host object.
Cisco Firepower 4100 Getting Started Guide
74
Threat Defense Deployment ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
76 | d) Choose the gateway Interface, for example outside.
e) Click the Networks icon, and choose any-ipv4 for an IPv4 default route or any-ipv6 for an IPv6
default route.
Step 4 Click OK.
Configure NAT
A typical NAT rule converts internal addresses to a port on the outside interface IP address. This type of NAT
rule is cal... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
77 | a) Set the Title.
b) Choose Create Rule For > Auto NAT.
c) Choose Type > Dynamic.
Step 4 Configure the following packet translation options:
a) For the Original Packet, set the Original Address as any-ipv4.
This rule will translate all IPv4 traffic originating on any interface. If you want to restrict the interfaces
or... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
78 | Step 6 Click OK.
Allow Traffic from Inside to Outside
By default, traffic is blocked between security zones. This procedure shows how to allow traffic from inside
to outside.
Procedure
Step 1 Choose Policies > Access Control.
Step 2 Click or Create Access Rule.
Step 3 Configure the basic rule options:
a) Set the Title.... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
79 | c) For the Destination, click the Zones icon, and choose the outside zone.
d) (Optional) Click Show Diagram to view a visual representation of the rule.
e) Click OK.
(Optional) Configure the DHCP Server
Enable the DHCP server if you want clients to use DHCP to obtain IP addresses from the threat defense.
Procedure
Step... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
80 | DHCPauto configuration enables the DHCPServer to provide DHCPclients with DNSserver, domain name,
and WINSserver information obtained from a DHCPclient that isrunning on the specified interface. Typically,
you would use auto-configuration if you are obtaining an address using DHCP on the outside interface, but
you coul... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
81 | the threat defense if you are on a directly-connected management network, but management traffic destined
for any other network will be routed out the data interfaces instead of through management.
Also, by default, you can only manage the threat defense through the management interface (device manager
or CLI access). ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
82 | c) Click Save, read the warning, and click OK.
Deploy the Configuration
Deploy the configuration changes to the threat defense; none of your changes are active on the device until
you deploy them.
Procedure
Step 1 Click the Deploy Changes icon in the upper right of the web page.
The icon is highlighted with a dot when ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
83 | Procedure
Step 1 (Option 1) SSH directly to the threat defense management interface IP address.
You set the management IP address when you deployed the logical device. Log into the threat defense with
the admin account and the password you set during initial deployment.
If you forgot the password, you can change it by ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
84 | d) Return to the supervisor level of the FXOS CLI.
To exit the console:
1. Enter ~
You exit to the Telnet application.
2. To exit the Telnet application, enter:
telnet>quit
To exit the Telnet session:
Enter Ctrl-], .
Example
The following example connects to the threat defense and then exits back to the supervisor leve... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
85 | For information related to using the device manager,see CiscoFirepower Threat Defense Configuration Guide
for Firepower Device Manager.
History for Threat Defense with the Device Manager
Feature Name Version Feature Information
You can now deploy a native instance using the device manager.
New/Modified screens:
Logical... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
86 | CHAPTER 5
Threat Defense Deployment with CDO
Is This Chapter for You?
To see all available operating systems and managers, see Which Application and Manager is Right for You?,
on page 1. This chapter appliesto the threat defense using Cisco Defense Orchestrator (CDO)'s cloud-delivered
Secure Firewall Management Center.... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
87 | • Access the Threat Defense and FXOS CLI, on page 109
• What's Next, on page 111
About Threat Defense Management by CDO
The cloud-delivered management center management center offers many of the same functions as an
on-premises management center and has the same look and feel. When you use CDO as the primary manager,
y... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
88 | CDO Onboard a Device with the Onboarding Wizard, on page 93.
Chassis Manager Chassis Manager: Add the Threat Defense Logical Device, on page 94.
CDO Configure a Basic Security Policy, on page 42.
Obtain Licenses
All licenses are supplied to the threat defense by CDO. You can optionally purchase the following feature
li... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
89 | Figure 11: License Search
Note If a PID is not found, you can add the PID manually to your order.
• IPS, Malware Defense, and URL license combination:
• L-FPR4112T-TMC=
• L-FPR4115T-TMC=
• L-FPR4125T-TMC=
• L-FPR4145T-TMC=
When you add one of the above PIDs to your order, you can then choose a term-based subscription
c... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
90 | Registering requires you to generate a registration token in the Smart Software Manager. See the CDO
documentation for detailed instructions.
Log Into CDO
CDO uses Cisco Secure Sign-On as its identity provider and Duo Security for multi-factor authentication
(MFA). CDO requires MFA which provides an added layer of secu... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
91 | Figure 12: Cisco SSO Sign Up
c) Fill in the fields of the Create Account dialog and click Register.
Figure 13: Create Account
Enter the email address that you plan to use to log in to CDO and add an Organization name
to represent your company.
Tip
Cisco Firepower 4100 Getting Started Guide
90
Threat Defense Deployment ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
92 | d) After you click Register, Cisco sends you a verification email to the address you registered with. Open
the email and click Activate Account.
Step 2 Set up Multi-factor Authentication Using Duo.
a) In the Set up multi-factor authentication screen, click Configure.
b) Click Start setup and follow the prompts to choos... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
93 | Before you begin
Cisco Defense Orchestrator (CDO) uses Cisco Secure Sign-On as its identity provider and Duo Security for
multi-factor authentication (MFA).
• To log into CDO, you must first create your account in Cisco Secure Sign-On and configure MFA using
Duo; see Create a New Cisco Secure Sign-On Account, on page 8... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
94 | Onboard a Device with the Onboarding Wizard
Onboard the threat defense using CDO's onbaording wizard using a CLI registration key.
Procedure
Step 1 In the CDO navigation pane, click Inventory, then click the blue plus button ( ) to Onboard a device.
Step 2 Select the FTD tile.
Step 3 Under Management Mode, be sure FTD ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
95 | Step 10 (Optional) Add labels to your device to help sort and filter the Inventory page. Enter a label and select the
blue plus button ( ). Labels are applied to the device after it's onboarded to CDO.
What to do next
From the Inventory page, select the device you just onboarded and select any of the option listed unde... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
96 | Figure 17: Add a Standalone Device
a) Provide a Device Name.
This name is used by the chassis supervisor to configure management settings and to assign interfaces; it
is not the device name used in the application configuration.
Note You cannot change this name after you add the logical device.
b) For the Template, cho... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
97 | continues to flow between an inline interface pair during a power outage. This feature can be used to maintain
network connectivity in the case of software or hardware failures. If you do not assign both interfaces in a
Hardware Bypass pair, you see a warning message to make sure your assignment is intentional. You do ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
98 | Figure 19: Settings
a) In the Management type of application instance drop-down list, choose CDO.
b) Enter the Search Domains as a comma-separated list.
c) Choose the Firewall Mode: Transparent or Routed.
In routed mode, the threat defense is considered to be a router hop in the network. Each interface that you
want to... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
99 | for the status of the new logical device. When the logical device shows its Status as online, you can start
configuring the security policy in the application.
Configure a Basic Security Policy
This section describes how to configure a basic security policy with the following settings:
• Inside and outside interfaces—A... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
100 | Configure Interfaces
Enable the threat defense interfaces, assign them to security zones, and set the IP addresses. Typically, you
must configure at least a minimum of two interfacesto have a system that passes meaningful traffic. Normally,
you would have an outside interface that facesthe upstream router or internet, ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
101 | a) Enter a Name up to 48 characters in length.
For example, name the interface inside.
b) Check the Enabled check box.
c) Leave the Mode set to None.
d) From the Security Zone drop-down list, choose an existing inside security zone or add a new one by
clicking New.
For example, add a zone called inside_zone. Each inter... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
102 | • IPv6—Check the Autoconfiguration check box for stateless autoconfiguration.
f) Click OK.
Step 4 Click the Edit ( ) for the interface that you want to use for outside.
The General tab appears.
If you pre-configured this interface for manager access, then the interface will already be named,
enabled, and addressed. You... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
103 | • IPv6—Check the Autoconfiguration check box for stateless autoconfiguration.
f) Click OK.
Step 5 Click Save.
Configure the DHCP Server
Enable the DHCP server if you want clients to use DHCP to obtain IP addresses from the threat defense.
Procedure
Step 1 Choose Devices > Device Management, and click the Edit ( ) for t... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
104 | Add the Default Route
The default route normally pointsto the upstream router reachable from the outside interface. If you use DHCP
for the outside interface, your device might have already received a default route. If you need to manually
add the route, complete this procedure. If you received a default route from the... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
105 | The route is added to the static route table.
Step 4 Click Save.
Configure NAT
A typical NAT rule converts internal addresses to a port on the outside interface IP address. This type of NAT
rule is called interface Port Address Translation (PAT).
Procedure
Step 1 Choose Devices > NAT, and click New Policy > Threat Defe... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
106 | The policy is added the management center. You still have to add rules to the policy.
Step 3 Click Add Rule.
The Add NAT Rule dialog box appears.
Step 4 Configure the basic rule options:
• NAT Rule—Choose Auto NAT Rule.
• Type—Choose Dynamic.
Step 5 On the Interface Objects page, add the outside zone from the Available... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
107 | • Original Source—Click Add ( ) to add a network object for all IPv4 traffic (0.0.0.0/0).
You cannot use the system-defined any-ipv4 object, because Auto NAT rules add NAT as
part of the object definition, and you cannot edit system-defined objects.
Note
• Translated Source—Choose Destination Interface IP.
Step 7 Click... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
108 | Step 2 Click Add Rule, and set the following parameters:
• Name—Name this rule, for example, inside_to_outside.
• Source Zones—Select the inside zone from Available Zones, and click Add to Source.
• Destination Zones—Select the outside zone from Available Zones, and click Add to Destination.
Leave the other settings as... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
109 | Figure 20: Deploy
Step 2 Either click Deploy All to deploy to all devices or click Advanced Deploy to deploy to selected devices.
Figure 21: Deploy All
Figure 22: Advanced Deploy
Step 3 Ensure that the deployment succeeds. Click the icon to the right of the Deploy button in the menu bar to see
status for deployments.
C... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
110 | Figure 23: Deployment Status
Access the Threat Defense and FXOS CLI
You can use the threat defense CLI to change management interface parameters and for troubleshooting
purposes. You can access the CLI using SSH to the Management interface, or by connecting from the FXOS
CLI.
Procedure
Step 1 (Option 1) SSH directly to... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
111 | b) Connect to the threat defense console.
connect ftd name
If you have multiple application instances, you must specify the name of the instance. To view the instance
names, enter the command without a name.
Example:
Firepower-module1> connect ftd FTD_Instance1
============================= ATTENTION ==================... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
112 | Firepower-module1>connect ftd FTD_Instance1
============================= ATTENTION ==============================
You are connecting to ftd from a serial console. Please avoid
executing any commands which may produce large amount of output.
Otherwise, data cached along the pipe may take up to 12 minutes to be
drained ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
113 | Cisco Firepower 4100 Getting Started Guide
112
Threat Defense Deployment with CDO
What's Next | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
114 | CHAPTER 6
ASA Deployment with ASDM
Is This Chapter for You?
This chapter describes how to deploy a standalone ASA logical device, including how to configure smart
licensing. This chapter does not cover the following deployments, for which you should refer to the ASA
configuration guide:
• Clustering
• Failover
• CLI co... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
115 | Chassis Manager: Register the Chassis with the Licensing Server, on page 114:
Obtain feature licenses.
Cisco Commerce
Workspace
Chassis Manager: Register the Chassis with the Licensing Server, on page 114:
Generate a license token for the chassis.
Smart Software
Manager
Chassis Manager: Register the Chassis with the Li... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
116 | (formerly known as a Satellite server). For more information about these offline licensing methods, see Cisco
ASA Series Feature Licenses; this guide applies to regular Smart Licensing.
For a more detailed overview on Cisco Licensing, go to cisco.com/go/licensingguide
For the ASA on the Firepower 4100, Smart Software L... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
117 | Procedure
Step 1 Make sure your Smart Licensing account contains the available licenses you need, including at a minimum
the Essentials license.
When you bought your device from Cisco or a reseller, your licenses should have been linked to your Smart
Software Manager account. However, if you need to add licenses yourse... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
118 | c) On the Create Registration Tokendialog box enter the following settings, and then click Create Token:
• Description
• Expire After—Cisco recommends 30 days.
• Allow export-controlled functionaility on the products registered with this token—Enables the
export-compliance flag.
The token is added to your inventory.
d)... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
119 | Figure 25: View Token
Figure 26: Copy Token
Step 3 In the chassis manager, choose System > Licensing > Smart License.
Step 4 Enter the registration token in the Enter Product Instance Registration Token field.
Step 5 Click Register.
The Firepower 4100 registers with the License Authority. Successful registration can ta... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
120 | Figure 28: Registration Successful
Chassis Manager: Add an ASA Logical Device
You can deploy an ASA from the Firepower 4100 as a native instance.
To add a failover pair or cluster, see the ASA general operations configuration guide.
This procedure lets you configure the logical device characteristics, including the boo... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
121 | a) Provide a Device Name.
This name is used by the chassis supervisor to configure management settings and to assign interfaces; it
is not the device name used in the application configuration.
Note You cannot change this name after you add the logical device.
b) For the Template, choose Cisco: Adaptive Security Applia... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
122 | A dialog box appears where you can configure initial bootstrap settings. These settings are meant for initial
deployment only, or for disaster recovery. For normal operation, you can later change most values in the
application CLI configuration.
Step 5 On the General Information page, complete the following:
a) Choose ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
123 | The firewall mode is only set at initial deployment. If you re-apply the bootstrap settings, this setting is
not used.
b) Enter and confirm a Password for the admin user and for the enable password.
The preconfigured ASA admin user/password and enable password are useful for password recovery; if
you have FXOS access, ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
124 | The Cisco ASDM web page appears. You may see browser security warnings because the ASA does not have
a certificate installed; you can safely ignore these warnings and visit the web page.
Step 2 Click one of these available options: Install ASDM Launcher or Run ASDM.
Step 3 Follow the onscreen instructions to launch ASD... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
125 | Step 3 Click Apply.
If you do not have the appropriate licenses in your account, you cannot apply your license changes.
Step 4 Click the Save icon in the toolbar.
Step 5 Quit ASDM and relaunch it.
When you change licenses, you need to relaunch ASDM to show updated screens.
Configure the ASA
Using ASDM, you can use wiza... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
126 | Step 2 The Startup Wizard walks you through configuring:
• The enable password
• Interfaces, including setting the inside and outside interface IP addresses and enabling interfaces.
• Static routes
• The DHCP server
• And more...
Step 3 (Optional) From the Wizards menu, run other wizards.
Step 4 To continue configuring... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
127 | Access the ASA CLI
You can use the ASA CLI to troubleshoot or configure the ASA instead of using ASDM. You can access the
CLI by connecting from the FXOS CLI. You can later configure SSH access to the ASA on any interface.
See the ASA general operations configuration guide for more information.
Procedure
Step 1 From th... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
128 | a) Enter Ctrl-], .
Example
The following example shows how to connect to an ASA and then exit back to the supervisor level
of the FXOS CLI.
Firepower# connect module 1 console
Telnet escape character is '~'.
Trying 127.5.1.1...
Connected to 127.5.1.1.
Escape character is '~'.
CISCO Serial Over LAN:
Close Network Connec... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
129 | Feature Version Details
The smart agent was upgraded from Version 1.1 to Version 1.6. This upgrade supports permanent
license reservation and also supports setting the Strong Encryption (3DES/AES) license
entitlement according to the permission set in your license account.
Smart Agent Upgrade to 9.6(2)
v1.6
The new Car... | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
130 | © 2023 Cisco Systems, Inc. All rights reserved. | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
131 | null | https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/fp4100/firepower-4100-gsg.pdf |
0 | Secure Firewall Management Center and Threat
Defense Management Network Administration
First Published: 2020-04-22
Last Modified: 2022-02-16
Secure Firewall Management Center and Threat Defense Management
Network Administration
This document describesthe management connection between the CiscoSecureFirewall Management ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
1 | Although the management center can manage devices running certain previous releases as specified in the
compatibility matrix available at http://www.cisco.com/c/en/us/support/security/defense-center/
products-device-support-tables-list.html, new features that require the latest version of threat defense software
are no... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
2 | You can also configure additional management interfaces. When the management center manages large
numbers of devices on different networks, adding more management interfaces can improve throughput and
performance. You can also use these interfaces for all other management functions. You might want to use
each managemen... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
3 | Using the Threat Defense Data Interface for Management
You can use either the dedicated Management interface or a regular data interface for communication with
the management center. Manager access on a data interface is useful if you want to manage the threat defense
remotely from the outside interface, or you do not ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
4 | Management Interface Support Per Management Center Model
See the hardware installation guide for your model for the management interface locations.
See the following table for supported management interfaces on each management center model.
Table 1: Management Interface Support on the Management Center
Model Management... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
5 | Model Management Interface Optional Event Interface
management1
management1 is the
internal name of this
interface, regardless of the
physical interface ID.
Note
management0
management0 is the
internal name of this
interface, regardless of the
physical interface ID.
Note
Firepower 4100 and 9300
br1 No support
br1 is th... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
6 | You can configure multiple management interfaces on some platforms (a management interface and an
event-only interface). The default route does not include an egress interface, so the interface chosen depends
on the gateway address you specify, and which interface's network the gateway belongs to. In the case of
multip... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
7 | Figure 1: NAT ID for Managed Devices Behind PAT
The following example shows the management center behind a PAT IP address. In this case, specify a unique
NAT ID per device on both the management center and the devices, and specify the device IP addresses on
the management center.
Figure 2: NAT ID for Management Center ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
8 | Management and Event Traffic Channel Examples
If you use a data interface for management on a threat defense, you cannot use separate management and
event interfaces for that device.
Note
The following example showsthe management center and managed devices using only the default management
interfaces.
Figure 3: Single ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
9 | Figure 5: Separate Event Interface on the Secure Firewall Management Center and Managed Devices
The following example shows a mix of multiple management interfaces and a separate event interface on the
management center and a mix of managed devices using a separate event interface, or using a single
management interfac... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
10 | • Ethernet 1/2 (or for the Firepower 1010, the VLAN1 interface)— "inside", 192.168.95.1/24
• Default route—Obtained through DHCP on the outside interface
Note that other settings, such as the DHCP server on inside, access control policy, or security zones, are not
configured.
If you perform additional interface-specifi... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
11 | If you want to use a different interface from outside (or inside) for manager access, you will have to
configure it manually after completing the setup wizard.
Configure IPv4—The IPv4 address for the outside interface. You can use DHCP or manually enter
a static IPaddress,subnet mask, and gateway. You can also select O... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
12 | • Management interface for manager access—If you want to configure a static IP address, be sure to also
set the default gateway to be a unique gateway instead of the data interfaces. If you use DHCP, then you
do not need to configure anything assuming you successfully get the gateway from DHCP.
Step 4 If you want to co... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
13 | Figure 7: Management Center/CDO Details
a) For Do you know the Management Center/CDO hostname or IP address, click Yes if you can reach
the management center using an IP address or hostname, or No if the management center is behind NAT
or does not have a public IP address or hostname.
Secure Firewall Management Center ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
14 | At least one of the devices, either the management center or the threat defense device, must have a reachable
IPaddressto establish the two-way, TLS-1.3-encrypted communication channel between the two devices.
b) If you chose Yes, then enter the Management Center/CDO Hostname/IP Address.
c) Specify the Management Cente... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
15 | Step 8 (Optional) If you chose a data interface, and it was not the outside interface, then add a default route.
You will see a message telling you to check that you have a default route through the interface. If you chose
outside, you already configured this route as part of the setup wizard. If you chose a different ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
16 | Complete the Threat Defense Initial Configuration Using the CLI
Connect to the threat defense CLI to perform initial setup, including setting the Management IP address,
gateway, and other basic networking settings using the setup wizard. The dedicated Management interface is
a special interface with its own network set... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
17 | Step 3 (Firepower and Secure Firewall hardware models) If you connected to FXOS on the console port, connect to
the threat defense CLI.
connect ftd
Example:
firepower# connect ftd
>
Step 4 The first time you log in to the threat defense, you are prompted to accept the End User License Agreement
(EULA) and, if using an ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
18 | You must accept the EULA to continue.
Press <ENTER> to display the EULA:
End User License Agreement
[...]
Please enter 'YES' or press <ENTER> to AGREE to the EULA:
System initialization in progress. Please stand by.
You must configure the network to continue.
Configure at least one of IPv4 or IPv6 unless managing via d... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
19 | this sensor to the Firepower Management Center.
>
Step 5 Identify the management center that will manage this threat defense.
configure manager add {hostname | IPv4_address | IPv6_address | DONTRESOLVE} reg_key [nat_id]
[display_name]
If you are using CDO for management, use the CDO-generated configure manager add comm... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
20 | If the threat defense is behind a NAT device, enter a unique NAT ID along with the management center IP
address or hostname, for example:
> configure manager add 10.70.45.5 regk3y78 natid56
Manager successfully configured.
Step 6 If you are using CDO as your primary manager and want to use an on-prem management center ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
21 | • This command sets the data interface DNS server. The Management DNS server that you set with the
setup script (or using the configure network dns servers command) is used for management traffic.
The data DNS server is used for DDNS (if configured) or for security policies applied to this interface.
On the management ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
22 | Configuration done with option to allow manager access from any network, if you wish to
change the manager access network
use the 'client' option in the command 'configure network management-data-interface'.
Setting IPv4 network configuration.
Network settings changed.
>
Step 8 (Optional) Limit data interface access to... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.