index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
23
> Step 2 Configure the IP address of the event interface. The event interface can be on a separate network from the management interface, or on the same network. a) Configure the IPv4 address: configure network ipv4 manual ip_address netmask gateway_ip management1 Note that the gateway_ip in this command is used to cre...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
24
Example: > configure network static-routes ipv4 add management1 192.168.6.0 255.255.255.0 10.10.10.1 Configuration updated successfully > configure network static-routes ipv6 add management1 2001:0DB8:AA89::5110 64 2001:0DB8:BA98::3211 Configuration updated successfully > To display static routes, enter show network-st...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
25
Procedure Step 1 Choose Devices > Device Management. Step 2 From the Add drop-down menu, choose Device. Figure 9: Add Device Using a Registration Key Step 3 If you want to add a cloud-managed device to your on-prem management center for analytics only, check CDO Managed Device. Secure Firewall Management Center and Thr...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
26
The system hides licensing and packet transfer settings because they are managed by CDO. You can skip those steps. Figure 10: Add Device for CDO Step 4 In the Host field, enter the IP address or the hostname of the device you want to add. The hostname of the device is the fully qualified domain name or the name that re...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
27
If the device is incompatible with the policy you choose, deploying will fail. This incompatibility could occur for multiple reasons, including licensing mismatches, model restrictions, passive vs inline issues, and other misconfigurations. After you resolve the issue that caused the failure, manually deploy configurat...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
28
Add the Firewall to the Management CenterUsing Zero-Touch Provisioning Zero-Touch Provisioning lets you register devices to the management center by serial number without having to perform any initial setup on the device. The management center integrates with the Cisco Security Cloud and Cisco Defense Orchestrator (CDO...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
29
limited to device onboarding, viewing its managed devices, viewing objects associated with the management center, and cross-launching the management center. c) Make sure Enable Zero-Touch Provisioning is checked. d) Click Save. Step 2 Choose Devices > Device Management. Step 3 From the Add drop-down menu, choose Device...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
30
If the device is incompatible with the policy you choose, deploying will fail. This incompatibility could occur for multiple reasons, including licensing mismatches, model restrictions, passive vs inline issues, and other misconfigurations. After you resolve the issue that caused the failure, manually deploy configurat...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
31
It may take up to two minutes for the management center to verify the device’s heartbeat and establish communication. If the registration succeeds, the device is added to the list. Add a Chassis to the Management Center You can add aFirepower 4100/9300 chassisto the management center. The management center and the chas...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
32
(Valid registration key characters: [a-z],[A-Z],[0-9],[-]. Length: [2-36]) Registration Key: Impala67 Step 3 In the management center, add the chassis using the chassis management IP address or hostname. a) Choose Device > Device Management, and then Add > Chassis. Figure 14: Add Chassis Figure 15: Add Chassis b) In th...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
33
The registration key is a one-time-use shared secret. The key can include alphanumeric characters and hyphens (-). e) In a multidomain deployment, regardless of your current domain, assign the chassis to a leaf Domain. If your current domain is a leaf domain, the chassis is automatically added to the current domain. If...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
34
Procedure Step 1 Choose Devices > Device Management. Step 2 Next to the device you want to unregister, click More ( ), and then click Unregister. Figure 16: Unregister Step 3 Confirm that you want to unregister the device. Step 4 You can now change your manager. • Re-register the device to this management center—If you...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
35
most cases, the management connection will be reestablished without changing the management center IP address or hostname on the device, in at least one case, you must perform this task for the connection to be reestablished: when you added the device to the management center and you specified the NAT ID only. Even in ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
36
• MTU—Set the maximum transmission unit (MTU) between 1280 and 1500. The default is 1500. • IPv4 Configuration—Set the IPv4 IP address. Choose: • Static—Manually enter the IPv4 Management IP address and IPv4 Netmask. • DHCP—Set the interface to use DHCP (eth0 only). If you use DHCP, you must use DHCP reservation, so th...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
37
You can configure the following shared settings: • Hostname—Set the management center hostname. The hostname can have a maximum of 64 characters, must start and end with a letter or digit, and have only letters, digits, or a hyphen. If you change the hostname, reboot the management center if you want the new hostname r...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
38
and you specified the NAT ID only. Even in other cases, we recommend keeping the management center IP address or hostname up to date for extra network resiliency. Modify the Threat Defense Management Interface Update the Hostname or IP Address in the Management Center If you edit the hostname or IP address of a device ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
39
Disabling management blocks the connection between the management center and the device, but does not unregister the device from the management center. Step 5 Edit the Remote Host Address IP address and optional Secondary Address (when using a redundant data interface) or hostname by clicking Edit ( ). Figure 18: Edit ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
40
Change Both Management Center and Threat Defense IP Addresses You might want to change both management center and threat defense IP addresses if you need to move them to a new network. Procedure Step 1 Disable the management connection. For a high-availability pair or cluster, perform these steps on all units. a) Choos...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
41
Figure 22: Edit Management Address b) In the Management dialog box, modify the name or IP address in the Remote Host Address field and the optional Secondary Address field, and click Save. Figure 23: Management IP Address Step 3 Change the management center IP address. Be careful when making changes to the management c...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
42
b) Edit the management center IP address or hostname. configure manager edit identifier {hostname {ip_address | hostname} | displayname display_name} If the management center was originally identified by DONTRESOLVE and a NAT ID, you can change the value to a hostname or IP address using this command. You cannot change...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
43
At the threat defense CLI, enter the sftunnel-status-brief command to view the management connection status. The following status shows a successful connection for a data interface, showing the internal "tap_nlp" interface. Figure 25: Connection Status Step 9 (For a high-availability management center pair) Repeat conf...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
44
Before you begin For high-availability pairs, unless stated otherwise, perform all steps only on the active unit. Once the configuration changes are deployed, the standby unit synchronizes configuration and other state information from the active unit. Procedure Step 1 Initiate the interface migration. a) On the Device...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
45
Figure 27: Manager Access If you click Configuration, the Manager Access- Configuration Details dialog box opens. The Manager Access Mode shows a Deploy pending state. Step 2 Enable manager access on a data interface on the Devices > Device Management > Interfaces > Edit Physical Interface > Manager Access page. You ca...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
46
next bullet). You cannot use DHCP because the default route, which must be data-interfaces, might be overwritten with one received from the DHCP server. • data-interfaces—Thissetting forwards management traffic over the backplane so it can be routed through the manager access data interface. We recommend that you use t...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
47
If it takes more than 10 minutes to reestablish the connection, you should troubleshoot the connection. See Troubleshoot Management Connectivity on a Data Interface, on page 70. Change the Manager Access Interface from Data to Management You can manage the threat defense from either the dedicated Management interface, ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
48
Figure 29: Manager Access Interface c) Click Save. You must now complete the remaining stepsin this procedure to enable manager access on the Management interface. The Management area now shows the Manager Access Interface: Management Interface, and Manager Access Details: Configuration. Figure 30: Manager Access If yo...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
49
The management center deployment that disables manager access on the data interface will remove any local DNS configuration. If that DNS server is used in any security policy, such as an FQDN in an Access Rule, then you must re-apply the DNS configuration using the management center. Step 4 Deploy configuration changes...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
50
Before you begin • The secondary interface needs to be in a separate security zone from the primary interface. • All of the same requirements apply to the secondary interface as apply to the primary interface.See Using the Threat Defense Data Interface for Management, on page 4. Procedure Step 1 On the Devices > Device...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
51
Figure 32: Edit Management Address c) In the Management dialog box, modify the name or IP address in the Secondary Address field Figure 33: Management IP Address d) Click Save. Step 4 Create an ECMP zone with both interfaces. a) Click Routing. b) From the virtual router drop-down, choose the virtual router in which the...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
52
Figure 34: Add an ECMP Zone f) Click OK, and then Save. Step 5 Add equal-cost default static routes for both interfaces and enable SLA tracking on both. The routes should be identical except for the gateway and should both have metric 1. The primary interface should already have a default route that you can edit. Secur...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
53
Figure 35: Add/Edit Static Route a) Click Static Route. b) Either click Add Route to add a new route, or click Edit ( ) for an existing route. c) From the Interface drop-down, choose the interface. d) For the destination network, select any-ipv4 from the Available Networks box and click Add. e) Enter the default Gatewa...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
54
Figure 36: Add SLA Monitor h) Click Save, then choose the SLA object you just created in the Route Tracking drop-down list. i) Click OK, and then Save. j) Repeat for the default route for the other management interface. Step 6 Deploy configuration changes. As part of the deployment for this feature, the management cent...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
55
View Manager Access Details for Data Interface Management Model Support—Threat Defense When you use a data interface for management center management instead of using the dedicated Management interface, you must be careful about changing the interface and network settings for the device in the management center so you ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
56
The following example showsthis page after configuring the interface in the management center; the interface settings match, and the pink highlight was removed. CLI Output View the CLI configuration of the manager access data interface, which is useful if you are familiar with the underlying CLI. Secure Firewall Manage...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
57
Figure 37: CLI Output Connection Status View management connection status. The following example shows that the management connection is still using the Management "management0" interface. Secure Firewall Management Center and Threat Defense Management Network Administration 58 Secure Firewall Management Center and Thr...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
58
Figure 38: Connection Status The following status shows a successful connection for a data interface, showing the internal "tap_nlp" interface. Figure 39: Connection Status Secure Firewall Management Center and Threat Defense Management Network Administration 59 Secure Firewall Management Center and Threat Defense Mana...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
59
See the following sample output for a connection that is down; there is no peer channel "connected to" information, nor heartbeat information shown: > sftunnel-status-brief PEER:10.10.17.202 Registration: Completed. Connection to peer '10.10.17.202' Attempted at Mon Jun 15 09:21:57 2020 UTC Last disconnect time : Mon J...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
60
If you change the device management IP address, then see the following tasks for management center connectivity depending on how you identified the management center during initial device setup using the configure manager add command (see Identify a New Management Center, on page 76): • IP address—No action. If you ide...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
61
To use a separate event interface, you also need to enable an event interface on the management center. See the Cisco Secure Firewall Management Center Administration Guide. Example: > configure network management-interface enable management1 Configuration updated successfully > configure network management-interface d...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
62
> • Manual configuration: configure network ipv6 manual ip6_address ip6_prefix_length [ip6_gateway_ip] [management_interface] Note that the ipv6_gateway_ip in this command is used to create the default route for the device. If you configure an event-only interface, then you must enter the ipv6_gateway_ip as part of the...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
63
You can only configure a DHCP server when you set the management interface IP address manually. This command is not supported on the management center virtual. To display the status of the DHCP server, enter show network-dhcp-server: > show network-dhcp-server DHCP Server Enabled 10.10.10.200-10.10.10.254 Step 7 Add a ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
64
Set the search domain(s) for the device, separated by commas. These domains are added to hostnames when you do not specify a fully-qualified domain name in a command, for example, ping system. The domains are used only on the management interface, or for commands that go through the management interface. Step 10 Set up...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
65
authentication is required, and if it is required, the proxy username, proxy password, and confirmation of the proxy password. Note For proxy password on threat defense, you can use A-Z, a-z, and 0-9 characters only. configure network http-proxy Example: > configure network http-proxy Manual proxy configuration Enter H...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
66
This topic applies to the data interface that you configured for Management, not the dedicated Management interface. If you want to change network settings for the Management interface, see Modify Threat Defense Management Interfaces at the CLI, on page 60. Note For information about the threat defense CLI, see the Cis...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
67
IPv4/IPv6 address: 10.10.6.7 Netmask/IPv6 Prefix: 255.255.255.0 Default Gateway: 10.10.6.1 Comma-separated list of DNS servers [none]: 208.67.222.222,208.67.220.220 DDNS server update URL [none]: Do you wish to clear all the device configuration before applying ? (y/n) [n]: y Configuration done with option to allow man...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
68
Step 11 Choose Devices > Device Management > Routing > Static Route and change the default route from the old data management interface to the new one. Step 12 Return to the Manager Access - Configuration Details dialog box, and click Acknowledge to remove the deployment block. The next time you deploy, the management ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
69
If the rollback failed and the management center management is restored, refer to https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw-virtual/ 215258-troubleshooting-firepower-threat-defense.html for common deployment problems. In some cases, the rollback can fail after the management center management a...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
70
See the following sample output for a connection that is down; there is no peer channel "connected to" information, nor heartbeat information shown: > sftunnel-status-brief PEER:10.10.17.202 Registration: Completed. Connection to peer '10.10.17.202' Attempted at Mon Jun 15 09:21:57 2020 UTC Last disconnect time : Mon J...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
71
State : Disabled Authentication : Disabled ======[ System Information - Data Interfaces ]====== DNS Servers : 72.163.47.11 Interfaces : Ethernet1/1 ==================[ Ethernet1/1 ]=================== State : Enabled Link : Up Name : outside MTU : 1500 MAC Address : 68:87:C6:A6:54:A4 ----------------------[ IPv4 ]-----...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
72
> show interface detail [...] Interface Internal-Data0/1 "nlp_int_tap", is up, line protocol is up Hardware is en_vtun rev00, BW Unknown Speed-Capability, DLY 1000 usec (Full-duplex), (1000 Mbps) Input flow control is unsupported, output flow control is unsupported MAC address 0000.0100.0001, MTU 1500 IP address 169.25...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
73
show nat > show nat Auto NAT Policies (Section 2) 1 (nlp_int_tap) to (outside) source static nlp_server_0_sftunnel_intf3 interface service tcp 8305 8305 translate_hits = 0, untranslate_hits = 6 2 (nlp_int_tap) to (outside) source static nlp_server_0_ssh_intf3 interface service tcp ssh ssh translate_hits = 0, untranslat...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
74
DDNS: IDB SB total = 0 If the update failed, use the debug http and debug ssl commands. For certificate validation failures, check that the root certificates are installed on the device: show crypto ca certificates trustpoint_name To check the DDNS operation: show ddns update interface fmc_access_ifc_name > show ddns u...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
75
Step 2 At the threat defense CLI, edit the management center IP address or hostname. configure manager edit identifier {hostname {ip_address | hostname} | displayname display_name} If the management center was originally identified by DONTRESOLVE and a NAT ID, you can change the value to a hostname or IP address using ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
76
• display_name—Provide a display name for showing this manager with the show managers command. This option is useful if you are identifying CDO as the primary manager and an on-prem management center for analytics only. If you don't specify this argument, the firewall auto-generates a display name using one of the foll...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
77
• Management interface for manager access—If you want to configure a static IP address, be sure to also set the default gateway to be a unique gateway instead of the data interfaces. If you use DHCP, then you do not need to configure anything assuming you successfully get the gateway from DHCP. Step 3 Choose Device > S...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
78
Figure 40: Management Center/CDO Details a) For Do you know the Management Center/CDO hostname or IP address, click Yes if you can reach the management center using an IP address or hostname, or No if the management center is behind NAT or does not have a public IP address or hostname. Secure Firewall Management Center...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
79
At least one of the devices, either the management center or the threat defense device, must have a reachable IPaddressto establish the two-way, TLS-1.3-encrypted communication channel between the two devices. b) If you chose Yes, then enter the Management Center/CDO Hostname/IP Address. c) Specify the Management Cente...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
80
Step 6 (Optional) If you chose a data interface, and it was not the outside interface, then add a default route. You will see a message telling you to check that you have a default route through the interface. If you chose outside, you already configured this route as part of the setup wizard. If you chose a different ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
81
Switch from Management Center to Device Manager You can configure the threat defense device currently being managed by the on-premises or cloud-delivered management center to use the device manager instead. You can switch from the management center to the device manager without reinstalling the software. Before switchi...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
82
> configure manager delete Deleting task list Manager successfully deleted. > > show managers No managers configured. Step 5 Configure the local manager. configure manager local You can now use a web browser to open the local manager at https://management-IP-address. Example: > configure manager local Deleting task lis...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
83
1. See Complete the Threat Defense Initial Configuration for Manual Registration, on page 10 or Complete the Threat Defense Initial Configuration Using the Device Manager, on page 10. 2. If you are not presented with the initial setup tasks, it's possible your device was successfully registered to another management ce...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
84
erase configuration firepower(local-mgmt)# erase configuration All configurations will be erased and system will reboot. Are you sure? (yes/no):yes Removing all the configuration. Please wait.... Configurations are cleaned up. Rebooting.... 5. Add the Firewall to the Management Center Using Zero-Touch Provisioning, on ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
85
© 2024 Cisco Systems, Inc. All rights reserved.
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf
0
Cisco Secure Firewall 3100 Series Hardware Installation Guide First Published: 2024-10-24 Last Modified: 2024-12-04 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
1
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
2
CONTENTS CHAPTER 1 Overview 1 Features 1 Deployment Options 4 Package Contents 5 Serial Number and Digital Documentation Portal QR Code 7 Front Panel 9 Front Panel LEDs 12 Rear Panel 14 8-Port 1/10/25-Gb Network Module 16 4-Port 40-Gb Network Module 18 2-Port 100-Gb Network Module 20 8-Port 10/100/1000Base-T Network Mo...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
3
Maintain Safety with Electricity 51 Prevent ESD Damage 52 Site Environment 52 Site Considerations 52 Power Supply Considerations 53 Rack Configuration Considerations 53 CHAPTER 3 Rack-Mount the Chassis 55 Unpack and Inspect the Chassis 55 Rack-Mount the Chassis Using Brackets 56 Rack-Mount the Chassis Using Slide Rails...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
4
CHAPTER 1 Overview • Features, on page 1 • Deployment Options, on page 4 • Package Contents, on page 5 • Serial Number and Digital Documentation Portal QR Code, on page 7 • Front Panel, on page 9 • Front Panel LEDs, on page 12 • Rear Panel, on page 14 • 8-Port 1/10/25-Gb Network Module, on page 16 • 4-Port 40-Gb Networ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
5
The Secure Firewall 3105 is first supported in Cisco Firepower Threat Defense 7.3 and Cisco ASA 9.19 and later. Note The following figure shows the Secure Firewall 3100. Figure 1: Secure Firewall 3100 The following table lists the features for the Secure Firewall 3100. Table 1: Secure Firewall 3100 Features Feature 310...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
6
Feature 3105 3110 3120 3130 3140 Eight 1/10/25-Gb SFP ports Four 40-Gb QSFP ports Network module ports One Note Hot-swapping of identical modules is supported, but if you replace a network module with another type, you must reboot the system so that the new network module is recognized. Network module slots • 8-port 1G...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
7
Feature 3105 3110 3120 3130 3140 Yes (optional) Hot-swappable DC power supply Yes Note Ships with two power supplies. No Note Yes, if you order an extra power supply. Redundant power Two dual fan module slots (3 + 1) Note The dual fan modules are hot-swappable. Fans Two Nonvolatile Memory Express (NVMe) SSD slots Ships...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
8
• As a device that provides additional application control, URL filtering, or IPS/threat-centered capabilities: • Behind an enterprise internet edge firewall in an inline configuration or as a standalone (requires hardware fail-open network module support) • Deployed passively off a SPAN port on a switch or a tap on a ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
9
Figure 2: Secure Firewall 3100 Package Contents Console cable RJ-45 to DB-9 (part number 72-3383-01) 1 Secure Firewall 3100 chassis 2 SFP transceiver (Optional; in package if ordered) One or two power cords (country-specific) 4 See Power Cord Specifications, on page 39 for a list of supported power cords. 3 Cable manag...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
10
Rack-mount bracket kit (53-101510-02): • Two rack-mount brackets (700-127244-01) • Six 8-32 x 0.375-inch Phillips screws (part number 48-2286) for securing the brackets to the chassis • Four 10-32 x 0.75-inchPhillips screws (part number 48-0441-01) forsecuring the chassis to your rack • Four 12-24 x 0.75-inchPhillips s...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
11
Figure 3: Pullout Asset Card 1 Pullout asset tag 2 Documentation Portal QR code 3 Chassis serial number — The compliance label on the bottom of the chassis contains the chassis serial number, regulatory compliance marks, and the Digital Documentation Portal QR code that points to the guides listed above. The following ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
12
Figure 4: Example Compliance Label 1 Chassis model number 2 Chassis serial number 3 Documentation Portal QR code — Front Panel The following figure shows the front panel of the Secure Firewall 3100. See Front Panel LEDs, on page 12 for a description of the LEDs. Cisco Secure Firewall 3100 Series Hardware Installation G...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
13
Figure 5: Secure Firewall 3100 Front Panel 1 SSD-1 2 SSD-2 3 System LEDs 4 RJ-45 console port Gigabit Ethernet management port: • Secure Firewall Threat Defense—Management 0 (also referred to as Management 1/1 and Diagnostic 1/1) • ASA—Management 1/1 5 Type A USB 3.1 port 6 7 Reset button LED 8 Recessed factory reset b...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
14
Type A USB 3.1 Port You can use the external Type A USB port to attach a data-storage device. The external USB drive identifier is usb:. The Type A USB port supports the following: • Hot swapping • USB drive formatted with FAT32 • Boot kickstart image from ROMMON for discovery recovery purposes • Copy files to and from...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
15
• All extra images are removed; the current running image remains. • FXOS logs, core files, SSH keys, certificates, FXOS configuration, and Apache configuration are removed. If power is lost between when you pushed the reset button and when the reset process is complete, the process stops and you have to push the butto...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
16
RJ-45 Copper Port Activity Status • Off—No activity • Green, flashing—The number of flashes determines the link speed; 1 flash=10 Mb, 2=100 Mb, 3=1 Gb. RJ-45 Copper Port Link Status 2 • Off—No link. • Green—Link is up. 1 Factory Reset Button Status • Green, flashing—Flashes 5 seconds after you depress the button. • Off...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
17
System Status • Off—System has not booted up yet. • Green, flashing quickly—System is booting up. • Green—Normal system function. • Amber—System boot up has failed. • Amber, flashing—Alarm condition, system needs service or attention and may not boot properly. SSD 1 Status 10 • Off—The SSD is not present. • Green—The S...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
18
Figure 7: Secure Firewall 3100 Rear Panel Power LED below Note This power LED has the same behavior as the front panel LED.SeeFrontPanel LEDs, on page 12 for more information. 1 Power on/off switch 2 3 Power supply module 1 4 Power supply module 1 FAIL LED 5 Power supply module 1 OK LED 6 Power supply module 1 connecto...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
19
If you remove the system power cords before the graceful shutdown is complete, disk corruption can occur. You can move the power switch to OFF before the shutdown. The system ignores it. Caution After removing power from the chassis by unplugging the power cord, wait at least 10 seconds before turning power back ON. Yo...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
20
Figure 8: 8-Port 1/10-Gb (FPR-X-NM-8X10G) and 8-Port 1/10/25-Gb (FPR-X-NM-8X25G) Network Module 1 Captive screw 2 Ethernet 2/1 3 Ethernet 2/3 4 Ethernet 2/5 5 Ethernet 2/7 6 Power on LED 7 Ejector handle 8 Ethernet 2/2 9 Ethernet 2/4 10 Ethernet 2/6 Network activity LEDs The up arrows represent the top ports and the do...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
21
• See Install, Remove, and Replace the Network Module, on page 69 for the procedure for removing and replacing network modules. 4-Port 40-Gb Network Module The Secure Firewall 3100 chassis has one network module slot named NM-2. Network modules are optional, removable I/O modules that provide either additional ports or...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
22
Figure 9: 4-Port 40-Gb Network Module (FPR-X-NM-4X40G) Network activity LEDs The up arrows represent the top ports and the down arrows represent the bottom ports. • Off—No SFP. • Amber—No link or a network failure. • Green—Link is up. • Green, flashing—Network activity. 1 Captive screw 2 3 Power on LED 4 Ejector handle...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
23
2-Port 100-Gb Network Module The Secure Firewall 3100 chassis has one network module slot named NM-2. Network modules are optional, removable I/O modules that provide either additional ports or different interface types. The network module plugs into the chassis on the front panel. See Front Panel, on page 9 for the lo...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
24
Figure 10: 2-Port 100-Gb Network Module (FPR-X-NM-2X100G) Network activity LEDs • Off—No SFP. • Amber—No link or a network failure. • Green—Link is up. • Green, flashing—Network activity. 1 Captive screw 2 Network activity LEDs 4 Power on LED • Off—No SFP. • Amber—No link or a network failure. • Green—Link is up. • Gre...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
25
• See 6-Port 1-Gb SX/10-Gb SR/10-Gb LR/25-Gb SR/25-Gb LR Network Module with Hardware Bypass , on page 24 for a description of the 1/10/25-Gb network module. • See 8-Port 10/100/1000Base-T Network Module with Hardware Bypass, on page 22 for a description of the 1-Gb network module. • See Install, Remove, and Replace th...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
26
Note The 8-port 10/100/1000Base-T network module is supported beginning with FTD 7.2.3 and ASA 9.18.2. The hardware and the system support hot swapping if you are replacing a network module with the same type of network module. If you replace the 8-port 10/100/1000Base-T network module with another supported network mo...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
27
Ethernet 2/5 and Ethernet 2/6 Ports 5 and 6 are paired together to form a hardware bypass pair. LED B3 applies to this paired port. Ethernet 2/3 and Ethernet 2/4 4 Ports 3 and 4 are paired together to form a hardware bypass pair. LED B2 applies to this paired port. 3 Ethernet 2/7 and Ethernet 2/8 6 Captive screw Ports ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
28
hardware bypass network modules have a switch that is capable of connecting the two ports when needed. This hardware bypass network module has built-in SFPs. Hardware bypass is only supported with threat defense, although you can use these modules in nonbypass mode in threat defense or ASA. Note Hardware bypass is supp...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
29
Figure 11: 6-Port 1/10/25-Gb Network Module (FPR-X-NM-6X1SXF, FPR-X-NM-6X10SRF, FPR-X-NM-6X10LRF, FPR-X-NM-6X25SRF, and FPR-X-NM-6X25LRF) Port 2 Ethernet 2/2 Ports 1 and 2 are paired together to form a hardware bypass pair. Port 1 2 Ethernet 2/1 Ports 1 and 2 are paired together to form a hardware bypass pair. 1 Port 4...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
30
Bypass LEDs B1 through B3: • Off—Bypass mode is disabled. • Green—Port is in standby mode. • Amber, flashing—Port isin hardware bypass mode, failure event. 9 Handle ejector 10 Six network activity LEDs: — • Amber—No connection, or port is not in use, or no link or network failure. • Green—Link up, no network activity. ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
31
Note The system power requirements are lower than the power supply module capabilities.See the following table. AC Power Supply The dual power supplies can supply up to 800-W power across the input voltage range. The load is shared when both power supply modules are plugged in and running at the same time. The system d...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
32
Power Supply Module LEDs The following figure shows the bicolor power supply LEDs on the power supply module. The figure shows the AC power supply module. The DC power supply module has the same LEDs. Figure 12: Power Supply Module LEDs Green OK LED OK LED Status: • Off—Input power not present. • Green, flashing—Input ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
33
Figure 13: Fan LED 1 Two-color LED The fan module has one two-color LED, which is located on the upper left corner of the fan. • Off—The environmental subsystem is not active yet. • Green—Fan running normally. It may take up to one minute for the LED status to turn green after power is on. • Amber—One fan has failed. T...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
34
Caution If you have only one SSD, you cannot remove it while the firewall is powered on. You cannot swap SSDs between different platforms. For example, you cannot use a 2100 series SSD in a 3100 series model. If you are swapping SSDs between two Secure Firewall 3100s, use the remove-secure local disk command, otherwise...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
35
Supported SFP/SFP+/QSFP+ Transceivers TheSFP/SFP+/QSFP+ transceiver is a bidirectional device with a transmitter and receiver in the same physical package. It is a hot-swappable optical or electrical (copper) interface that plugs into the SFP/SFP+/QSFP+ ports on the fixed ports and the network module ports, and provide...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf
36
Statement 1057—Hazardous Radiation Exposure Use of controls, adjustments, or performance of procedures other than those specified may result in hazardous radiation exposure. Warning Use appropriate ESD procedures when inserting the transceiver. Avoid touching the contacts at the rear, and keep the contacts and ports fr...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf