index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
23 | >
Step 2 Configure the IP address of the event interface.
The event interface can be on a separate network from the management interface, or on the same network.
a) Configure the IPv4 address:
configure network ipv4 manual ip_address netmask gateway_ip management1
Note that the gateway_ip in this command is used to cre... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
24 | Example:
> configure network static-routes ipv4 add management1 192.168.6.0 255.255.255.0 10.10.10.1
Configuration updated successfully
> configure network static-routes ipv6 add management1 2001:0DB8:AA89::5110 64
2001:0DB8:BA98::3211
Configuration updated successfully
>
To display static routes, enter show network-st... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
25 | Procedure
Step 1 Choose Devices > Device Management.
Step 2 From the Add drop-down menu, choose Device.
Figure 9: Add Device Using a Registration Key
Step 3 If you want to add a cloud-managed device to your on-prem management center for analytics only, check
CDO Managed Device.
Secure Firewall Management Center and Thr... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
26 | The system hides licensing and packet transfer settings because they are managed by CDO. You can skip
those steps.
Figure 10: Add Device for CDO
Step 4 In the Host field, enter the IP address or the hostname of the device you want to add.
The hostname of the device is the fully qualified domain name or the name that re... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
27 | If the device is incompatible with the policy you choose, deploying will fail. This incompatibility could occur
for multiple reasons, including licensing mismatches, model restrictions, passive vs inline issues, and other
misconfigurations. After you resolve the issue that caused the failure, manually deploy configurat... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
28 | Add the Firewall to the Management CenterUsing Zero-Touch Provisioning
Zero-Touch Provisioning lets you register devices to the management center by serial number without having
to perform any initial setup on the device. The management center integrates with the Cisco Security Cloud
and Cisco Defense Orchestrator (CDO... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
29 | limited to device onboarding, viewing its managed devices, viewing objects associated with the management
center, and cross-launching the management center.
c) Make sure Enable Zero-Touch Provisioning is checked.
d) Click Save.
Step 2 Choose Devices > Device Management.
Step 3 From the Add drop-down menu, choose Device... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
30 | If the device is incompatible with the policy you choose, deploying will fail. This incompatibility could
occur for multiple reasons, including licensing mismatches, model restrictions, passive vs inline issues,
and other misconfigurations. After you resolve the issue that caused the failure, manually deploy
configurat... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
31 | It may take up to two minutes for the management center to verify the device’s heartbeat and establish
communication. If the registration succeeds, the device is added to the list.
Add a Chassis to the Management Center
You can add aFirepower 4100/9300 chassisto the management center. The management center and the chas... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
32 | (Valid registration key characters: [a-z],[A-Z],[0-9],[-]. Length: [2-36])
Registration Key: Impala67
Step 3 In the management center, add the chassis using the chassis management IP address or hostname.
a) Choose Device > Device Management, and then Add > Chassis.
Figure 14: Add Chassis
Figure 15: Add Chassis
b) In th... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
33 | The registration key is a one-time-use shared secret. The key can include alphanumeric characters and
hyphens (-).
e) In a multidomain deployment, regardless of your current domain, assign the chassis to a leaf Domain.
If your current domain is a leaf domain, the chassis is automatically added to the current domain. If... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
34 | Procedure
Step 1 Choose Devices > Device Management.
Step 2 Next to the device you want to unregister, click More ( ), and then click Unregister.
Figure 16: Unregister
Step 3 Confirm that you want to unregister the device.
Step 4 You can now change your manager.
• Re-register the device to this management center—If you... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
35 | most cases, the management connection will be reestablished without changing the management center IP
address or hostname on the device, in at least one case, you must perform this task for the connection to be
reestablished: when you added the device to the management center and you specified the NAT ID only. Even
in ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
36 | • MTU—Set the maximum transmission unit (MTU) between 1280 and 1500. The default is 1500.
• IPv4 Configuration—Set the IPv4 IP address. Choose:
• Static—Manually enter the IPv4 Management IP address and IPv4 Netmask.
• DHCP—Set the interface to use DHCP (eth0 only).
If you use DHCP, you must use DHCP reservation, so th... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
37 | You can configure the following shared settings:
• Hostname—Set the management center hostname. The hostname can have a maximum of 64 characters,
must start and end with a letter or digit, and have only letters, digits, or a hyphen. If you change the
hostname, reboot the management center if you want the new hostname r... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
38 | and you specified the NAT ID only. Even in other cases, we recommend keeping the management center IP
address or hostname up to date for extra network resiliency.
Modify the Threat Defense Management Interface
Update the Hostname or IP Address in the Management Center
If you edit the hostname or IP address of a device ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
39 | Disabling management blocks the connection between the management center and the device, but does not
unregister the device from the management center.
Step 5 Edit the Remote Host Address IP address and optional Secondary Address (when using a redundant data
interface) or hostname by clicking Edit ( ).
Figure 18: Edit ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
40 | Change Both Management Center and Threat Defense IP Addresses
You might want to change both management center and threat defense IP addresses if you need to move them
to a new network.
Procedure
Step 1 Disable the management connection.
For a high-availability pair or cluster, perform these steps on all units.
a) Choos... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
41 | Figure 22: Edit Management Address
b) In the Management dialog box, modify the name or IP address in the Remote Host Address field and
the optional Secondary Address field, and click Save.
Figure 23: Management IP Address
Step 3 Change the management center IP address.
Be careful when making changes to the management c... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
42 | b) Edit the management center IP address or hostname.
configure manager edit identifier {hostname {ip_address | hostname} | displayname display_name}
If the management center was originally identified by DONTRESOLVE and a NAT ID, you can change
the value to a hostname or IP address using this command. You cannot change... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
43 | At the threat defense CLI, enter the sftunnel-status-brief command to view the management connection
status.
The following status shows a successful connection for a data interface, showing the internal "tap_nlp"
interface.
Figure 25: Connection Status
Step 9 (For a high-availability management center pair) Repeat conf... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
44 | Before you begin
For high-availability pairs, unless stated otherwise, perform all steps only on the active unit. Once the
configuration changes are deployed, the standby unit synchronizes configuration and other state information
from the active unit.
Procedure
Step 1 Initiate the interface migration.
a) On the Device... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
45 | Figure 27: Manager Access
If you click Configuration, the Manager Access- Configuration Details dialog box opens. The Manager
Access Mode shows a Deploy pending state.
Step 2 Enable manager access on a data interface on the Devices > Device Management > Interfaces > Edit Physical
Interface > Manager Access page.
You ca... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
46 | next bullet). You cannot use DHCP because the default route, which must be data-interfaces, might be
overwritten with one received from the DHCP server.
• data-interfaces—Thissetting forwards management traffic over the backplane so it can be routed through
the manager access data interface.
We recommend that you use t... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
47 | If it takes more than 10 minutes to reestablish the connection, you should troubleshoot the connection. See
Troubleshoot Management Connectivity on a Data Interface, on page 70.
Change the Manager Access Interface from Data to Management
You can manage the threat defense from either the dedicated Management interface, ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
48 | Figure 29: Manager Access Interface
c) Click Save.
You must now complete the remaining stepsin this procedure to enable manager access on the Management
interface. The Management area now shows the Manager Access Interface: Management Interface,
and Manager Access Details: Configuration.
Figure 30: Manager Access
If yo... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
49 | The management center deployment that disables manager access on the data interface will remove any local
DNS configuration. If that DNS server is used in any security policy, such as an FQDN in an Access Rule,
then you must re-apply the DNS configuration using the management center.
Step 4 Deploy configuration changes... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
50 | Before you begin
• The secondary interface needs to be in a separate security zone from the primary interface.
• All of the same requirements apply to the secondary interface as apply to the primary interface.See Using
the Threat Defense Data Interface for Management, on page 4.
Procedure
Step 1 On the Devices > Device... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
51 | Figure 32: Edit Management Address
c) In the Management dialog box, modify the name or IP address in the Secondary Address field
Figure 33: Management IP Address
d) Click Save.
Step 4 Create an ECMP zone with both interfaces.
a) Click Routing.
b) From the virtual router drop-down, choose the virtual router in which the... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
52 | Figure 34: Add an ECMP Zone
f) Click OK, and then Save.
Step 5 Add equal-cost default static routes for both interfaces and enable SLA tracking on both.
The routes should be identical except for the gateway and should both have metric 1. The primary interface
should already have a default route that you can edit.
Secur... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
53 | Figure 35: Add/Edit Static Route
a) Click Static Route.
b) Either click Add Route to add a new route, or click Edit ( ) for an existing route.
c) From the Interface drop-down, choose the interface.
d) For the destination network, select any-ipv4 from the Available Networks box and click Add.
e) Enter the default Gatewa... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
54 | Figure 36: Add SLA Monitor
h) Click Save, then choose the SLA object you just created in the Route Tracking drop-down list.
i) Click OK, and then Save.
j) Repeat for the default route for the other management interface.
Step 6 Deploy configuration changes.
As part of the deployment for this feature, the management cent... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
55 | View Manager Access Details for Data Interface Management
Model Support—Threat Defense
When you use a data interface for management center management instead of using the dedicated Management
interface, you must be careful about changing the interface and network settings for the device in the
management center so you ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
56 | The following example showsthis page after configuring the interface in the management center; the interface
settings match, and the pink highlight was removed.
CLI Output
View the CLI configuration of the manager access data interface, which is useful if you are familiar with the
underlying CLI.
Secure Firewall Manage... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
57 | Figure 37: CLI Output
Connection Status
View management connection status. The following example shows that the management connection is still
using the Management "management0" interface.
Secure Firewall Management Center and Threat Defense Management Network Administration
58
Secure Firewall Management Center and Thr... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
58 | Figure 38: Connection Status
The following status shows a successful connection for a data interface, showing the internal "tap_nlp"
interface.
Figure 39: Connection Status
Secure Firewall Management Center and Threat Defense Management Network Administration
59
Secure Firewall Management Center and Threat Defense Mana... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
59 | See the following sample output for a connection that is down; there is no peer channel "connected to"
information, nor heartbeat information shown:
> sftunnel-status-brief
PEER:10.10.17.202
Registration: Completed.
Connection to peer '10.10.17.202' Attempted at Mon Jun 15 09:21:57 2020 UTC
Last disconnect time : Mon J... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
60 | If you change the device management IP address, then see the following tasks for management center
connectivity depending on how you identified the management center during initial device setup using the
configure manager add command (see Identify a New Management Center, on page 76):
• IP address—No action. If you ide... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
61 | To use a separate event interface, you also need to enable an event interface on the management center. See
the Cisco Secure Firewall Management Center Administration Guide.
Example:
> configure network management-interface enable management1
Configuration updated successfully
> configure network management-interface d... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
62 | >
• Manual configuration:
configure network ipv6 manual ip6_address ip6_prefix_length [ip6_gateway_ip]
[management_interface]
Note that the ipv6_gateway_ip in this command is used to create the default route for the device. If
you configure an event-only interface, then you must enter the ipv6_gateway_ip as part of the... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
63 | You can only configure a DHCP server when you set the management interface IP address manually. This
command is not supported on the management center virtual. To display the status of the DHCP server, enter
show network-dhcp-server:
> show network-dhcp-server
DHCP Server Enabled
10.10.10.200-10.10.10.254
Step 7 Add a ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
64 | Set the search domain(s) for the device, separated by commas. These domains are added to hostnames when
you do not specify a fully-qualified domain name in a command, for example, ping system. The domains are
used only on the management interface, or for commands that go through the management interface.
Step 10 Set up... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
65 | authentication is required, and if it is required, the proxy username, proxy password, and confirmation of the
proxy password.
Note For proxy password on threat defense, you can use A-Z, a-z, and 0-9 characters only.
configure network http-proxy
Example:
> configure network http-proxy
Manual proxy configuration
Enter H... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
66 | This topic applies to the data interface that you configured for Management, not the dedicated Management
interface. If you want to change network settings for the Management interface, see Modify Threat Defense
Management Interfaces at the CLI, on page 60.
Note
For information about the threat defense CLI, see the Cis... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
67 | IPv4/IPv6 address: 10.10.6.7
Netmask/IPv6 Prefix: 255.255.255.0
Default Gateway: 10.10.6.1
Comma-separated list of DNS servers [none]: 208.67.222.222,208.67.220.220
DDNS server update URL [none]:
Do you wish to clear all the device configuration before applying ? (y/n) [n]: y
Configuration done with option to allow man... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
68 | Step 11 Choose Devices > Device Management > Routing > Static Route and change the default route from the old
data management interface to the new one.
Step 12 Return to the Manager Access - Configuration Details dialog box, and click Acknowledge to remove the
deployment block.
The next time you deploy, the management ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
69 | If the rollback failed and the management center management is restored, refer to
https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw-virtual/
215258-troubleshooting-firepower-threat-defense.html for common deployment problems. In some
cases, the rollback can fail after the management center management a... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
70 | See the following sample output for a connection that is down; there is no peer channel "connected to"
information, nor heartbeat information shown:
> sftunnel-status-brief
PEER:10.10.17.202
Registration: Completed.
Connection to peer '10.10.17.202' Attempted at Mon Jun 15 09:21:57 2020 UTC
Last disconnect time : Mon J... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
71 | State : Disabled
Authentication : Disabled
======[ System Information - Data Interfaces ]======
DNS Servers : 72.163.47.11
Interfaces : Ethernet1/1
==================[ Ethernet1/1 ]===================
State : Enabled
Link : Up
Name : outside
MTU : 1500
MAC Address : 68:87:C6:A6:54:A4
----------------------[ IPv4 ]-----... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
72 | > show interface detail
[...]
Interface Internal-Data0/1 "nlp_int_tap", is up, line protocol is up
Hardware is en_vtun rev00, BW Unknown Speed-Capability, DLY 1000 usec
(Full-duplex), (1000 Mbps)
Input flow control is unsupported, output flow control is unsupported
MAC address 0000.0100.0001, MTU 1500
IP address 169.25... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
73 | show nat
> show nat
Auto NAT Policies (Section 2)
1 (nlp_int_tap) to (outside) source static nlp_server_0_sftunnel_intf3 interface service
tcp 8305 8305
translate_hits = 0, untranslate_hits = 6
2 (nlp_int_tap) to (outside) source static nlp_server_0_ssh_intf3 interface service
tcp ssh ssh
translate_hits = 0, untranslat... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
74 | DDNS: IDB SB total = 0
If the update failed, use the debug http and debug ssl commands. For certificate validation failures,
check that the root certificates are installed on the device:
show crypto ca certificates trustpoint_name
To check the DDNS operation:
show ddns update interface fmc_access_ifc_name
> show ddns u... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
75 | Step 2 At the threat defense CLI, edit the management center IP address or hostname.
configure manager edit identifier {hostname {ip_address | hostname} | displayname display_name}
If the management center was originally identified by DONTRESOLVE and a NAT ID, you can change the
value to a hostname or IP address using ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
76 | • display_name—Provide a display name for showing this manager with the show managers command.
This option is useful if you are identifying CDO as the primary manager and an on-prem management
center for analytics only. If you don't specify this argument, the firewall auto-generates a display name
using one of the foll... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
77 | • Management interface for manager access—If you want to configure a static IP address, be sure to also
set the default gateway to be a unique gateway instead of the data interfaces. If you use DHCP, then you
do not need to configure anything assuming you successfully get the gateway from DHCP.
Step 3 Choose Device > S... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
78 | Figure 40: Management Center/CDO Details
a) For Do you know the Management Center/CDO hostname or IP address, click Yes if you can reach
the management center using an IP address or hostname, or No if the management center is behind NAT
or does not have a public IP address or hostname.
Secure Firewall Management Center... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
79 | At least one of the devices, either the management center or the threat defense device, must have a reachable
IPaddressto establish the two-way, TLS-1.3-encrypted communication channel between the two devices.
b) If you chose Yes, then enter the Management Center/CDO Hostname/IP Address.
c) Specify the Management Cente... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
80 | Step 6 (Optional) If you chose a data interface, and it was not the outside interface, then add a default route.
You will see a message telling you to check that you have a default route through the interface. If you chose
outside, you already configured this route as part of the setup wizard. If you chose a different ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
81 | Switch from Management Center to Device Manager
You can configure the threat defense device currently being managed by the on-premises or cloud-delivered
management center to use the device manager instead.
You can switch from the management center to the device manager without reinstalling the software. Before
switchi... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
82 | > configure manager delete
Deleting task list
Manager successfully deleted.
>
> show managers
No managers configured.
Step 5 Configure the local manager.
configure manager local
You can now use a web browser to open the local manager at https://management-IP-address.
Example:
> configure manager local
Deleting task lis... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
83 | 1. See Complete the Threat Defense Initial Configuration for Manual Registration, on page 10 or Complete
the Threat Defense Initial Configuration Using the Device Manager, on page 10.
2. If you are not presented with the initial setup tasks, it's possible your device was successfully registered
to another management ce... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
84 | erase configuration
firepower(local-mgmt)# erase configuration
All configurations will be erased and system will reboot. Are you sure? (yes/no):yes
Removing all the configuration. Please wait....
Configurations are cleaned up. Rebooting....
5. Add the Firewall to the Management Center Using Zero-Touch Provisioning, on ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
85 | © 2024 Cisco Systems, Inc. All rights reserved. | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/management-center-mgmt-nw/fmc-ftd-mgmt-nw.pdf |
0 | Cisco Secure Firewall 3100 Series Hardware Installation Guide
First Published: 2024-10-24
Last Modified: 2024-12-04
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883 | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
1 | THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
2 | CONTENTS
CHAPTER 1 Overview 1
Features 1
Deployment Options 4
Package Contents 5
Serial Number and Digital Documentation Portal QR Code 7
Front Panel 9
Front Panel LEDs 12
Rear Panel 14
8-Port 1/10/25-Gb Network Module 16
4-Port 40-Gb Network Module 18
2-Port 100-Gb Network Module 20
8-Port 10/100/1000Base-T Network Mo... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
3 | Maintain Safety with Electricity 51
Prevent ESD Damage 52
Site Environment 52
Site Considerations 52
Power Supply Considerations 53
Rack Configuration Considerations 53
CHAPTER 3 Rack-Mount the Chassis 55
Unpack and Inspect the Chassis 55
Rack-Mount the Chassis Using Brackets 56
Rack-Mount the Chassis Using Slide Rails... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
4 | CHAPTER 1
Overview
• Features, on page 1
• Deployment Options, on page 4
• Package Contents, on page 5
• Serial Number and Digital Documentation Portal QR Code, on page 7
• Front Panel, on page 9
• Front Panel LEDs, on page 12
• Rear Panel, on page 14
• 8-Port 1/10/25-Gb Network Module, on page 16
• 4-Port 40-Gb Networ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
5 | The Secure Firewall 3105 is first supported in Cisco Firepower Threat Defense 7.3 and Cisco ASA 9.19 and
later.
Note
The following figure shows the Secure Firewall 3100.
Figure 1: Secure Firewall 3100
The following table lists the features for the Secure Firewall 3100.
Table 1: Secure Firewall 3100 Features
Feature 310... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
6 | Feature 3105 3110 3120 3130 3140
Eight 1/10/25-Gb SFP ports
Four 40-Gb QSFP ports
Network module
ports
One
Note
Hot-swapping of identical modules is supported, but if you replace a network module
with another type, you must reboot the system so that the new network module is
recognized.
Network module
slots
• 8-port 1G... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
7 | Feature 3105 3110 3120 3130 3140
Yes (optional)
Hot-swappable
DC power
supply
Yes
Note
Ships with two power supplies.
No
Note
Yes, if you order an extra power supply.
Redundant
power
Two dual fan module slots (3 + 1)
Note
The dual fan modules are hot-swappable.
Fans
Two Nonvolatile Memory Express (NVMe) SSD slots
Ships... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
8 | • As a device that provides additional application control, URL filtering, or IPS/threat-centered capabilities:
• Behind an enterprise internet edge firewall in an inline configuration or as a standalone (requires
hardware fail-open network module support)
• Deployed passively off a SPAN port on a switch or a tap on a ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
9 | Figure 2: Secure Firewall 3100 Package Contents
Console cable RJ-45 to DB-9 (part number
72-3383-01)
1 Secure Firewall 3100 chassis 2
SFP transceiver
(Optional; in package if ordered)
One or two power cords (country-specific) 4
See Power Cord Specifications, on page 39 for
a list of supported power cords.
3
Cable manag... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
10 | Rack-mount bracket kit (53-101510-02):
• Two rack-mount brackets (700-127244-01)
• Six 8-32 x 0.375-inch Phillips screws (part
number 48-2286) for securing the brackets
to the chassis
• Four 10-32 x 0.75-inchPhillips screws (part
number 48-0441-01) forsecuring the chassis
to your rack
• Four 12-24 x 0.75-inchPhillips s... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
11 | Figure 3: Pullout Asset Card
1 Pullout asset tag 2 Documentation Portal QR code
3 Chassis serial number —
The compliance label on the bottom of the chassis contains the chassis serial number, regulatory compliance
marks, and the Digital Documentation Portal QR code that points to the guides listed above. The following
... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
12 | Figure 4: Example Compliance Label
1 Chassis model number 2 Chassis serial number
3 Documentation Portal QR code —
Front Panel
The following figure shows the front panel of the Secure Firewall 3100. See Front Panel LEDs, on page 12
for a description of the LEDs.
Cisco Secure Firewall 3100 Series Hardware Installation G... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
13 | Figure 5: Secure Firewall 3100 Front Panel
1 SSD-1 2 SSD-2
3 System LEDs 4 RJ-45 console port
Gigabit Ethernet management port:
• Secure Firewall Threat
Defense—Management 0 (also referred to
as Management 1/1 and Diagnostic 1/1)
• ASA—Management 1/1
5 Type A USB 3.1 port 6
7 Reset button LED 8 Recessed factory reset b... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
14 | Type A USB 3.1 Port
You can use the external Type A USB port to attach a data-storage device. The external USB drive
identifier is usb:. The Type A USB port supports the following:
• Hot swapping
• USB drive formatted with FAT32
• Boot kickstart image from ROMMON for discovery recovery purposes
• Copy files to and from... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
15 | • All extra images are removed; the current running image remains.
• FXOS logs, core files, SSH keys, certificates, FXOS configuration, and Apache configuration are
removed.
If power is lost between when you pushed the reset button and when the reset process is complete, the
process stops and you have to push the butto... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
16 | RJ-45 Copper Port Activity Status
• Off—No activity
• Green, flashing—The number of flashes
determines the link speed; 1 flash=10 Mb,
2=100 Mb, 3=1 Gb.
RJ-45 Copper Port Link Status 2
• Off—No link.
• Green—Link is up.
1
Factory Reset Button Status
• Green, flashing—Flashes 5 seconds after
you depress the button.
• Off... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
17 | System Status
• Off—System has not booted up yet.
• Green, flashing quickly—System is booting
up.
• Green—Normal system function.
• Amber—System boot up has failed.
• Amber, flashing—Alarm condition, system
needs service or attention and may not boot
properly.
SSD 1 Status 10
• Off—The SSD is not present.
• Green—The S... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
18 | Figure 7: Secure Firewall 3100 Rear Panel
Power LED below
Note
This power LED has the same behavior as the
front panel LED.SeeFrontPanel LEDs, on page
12 for more information.
1 Power on/off switch 2
3 Power supply module 1 4 Power supply module 1 FAIL LED
5 Power supply module 1 OK LED 6 Power supply module 1 connecto... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
19 | If you remove the system power cords before the graceful shutdown is complete, disk corruption can
occur. You can move the power switch to OFF before the shutdown. The system ignores it.
Caution
After removing power from the chassis by unplugging the power cord, wait at least 10 seconds before
turning power back ON. Yo... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
20 | Figure 8: 8-Port 1/10-Gb (FPR-X-NM-8X10G) and 8-Port 1/10/25-Gb (FPR-X-NM-8X25G) Network Module
1 Captive screw 2 Ethernet 2/1
3 Ethernet 2/3 4 Ethernet 2/5
5 Ethernet 2/7 6 Power on LED
7 Ejector handle 8 Ethernet 2/2
9 Ethernet 2/4 10 Ethernet 2/6
Network activity LEDs
The up arrows represent the top ports and the
do... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
21 | • See Install, Remove, and Replace the Network Module, on page 69 for the procedure for removing
and replacing network modules.
4-Port 40-Gb Network Module
The Secure Firewall 3100 chassis has one network module slot named NM-2. Network modules are optional,
removable I/O modules that provide either additional ports or... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
22 | Figure 9: 4-Port 40-Gb Network Module (FPR-X-NM-4X40G)
Network activity LEDs
The up arrows represent the top ports and the
down arrows represent the bottom ports.
• Off—No SFP.
• Amber—No link or a network failure.
• Green—Link is up.
• Green, flashing—Network activity.
1 Captive screw 2
3 Power on LED 4 Ejector handle... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
23 | 2-Port 100-Gb Network Module
The Secure Firewall 3100 chassis has one network module slot named NM-2. Network modules are optional,
removable I/O modules that provide either additional ports or different interface types. The network module
plugs into the chassis on the front panel. See Front Panel, on page 9 for the lo... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
24 | Figure 10: 2-Port 100-Gb Network Module (FPR-X-NM-2X100G)
Network activity LEDs
• Off—No SFP.
• Amber—No link or a network failure.
• Green—Link is up.
• Green, flashing—Network activity.
1 Captive screw 2
Network activity LEDs 4 Power on LED
• Off—No SFP.
• Amber—No link or a network failure.
• Green—Link is up.
• Gre... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
25 | • See 6-Port 1-Gb SX/10-Gb SR/10-Gb LR/25-Gb SR/25-Gb LR Network Module with Hardware
Bypass , on page 24 for a description of the 1/10/25-Gb network module.
• See 8-Port 10/100/1000Base-T Network Module with Hardware Bypass, on page 22 for a description
of the 1-Gb network module.
• See Install, Remove, and Replace th... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
26 | Note The 8-port 10/100/1000Base-T network module is supported beginning with FTD 7.2.3 and ASA 9.18.2.
The hardware and the system support hot swapping if you are replacing a network module with the same type
of network module. If you replace the 8-port 10/100/1000Base-T network module with another supported
network mo... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
27 | Ethernet 2/5 and Ethernet 2/6
Ports 5 and 6 are paired together to form a
hardware bypass pair. LED B3 applies to this
paired port.
Ethernet 2/3 and Ethernet 2/4 4
Ports 3 and 4 are paired together to form a
hardware bypass pair. LED B2 applies to this
paired port.
3
Ethernet 2/7 and Ethernet 2/8 6 Captive screw
Ports ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
28 | hardware bypass network modules have a switch that is capable of connecting the two ports when needed.
This hardware bypass network module has built-in SFPs.
Hardware bypass is only supported with threat defense, although you can use these modules in nonbypass
mode in threat defense or ASA.
Note
Hardware bypass is supp... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
29 | Figure 11: 6-Port 1/10/25-Gb Network Module (FPR-X-NM-6X1SXF, FPR-X-NM-6X10SRF, FPR-X-NM-6X10LRF, FPR-X-NM-6X25SRF, and
FPR-X-NM-6X25LRF)
Port 2
Ethernet 2/2
Ports 1 and 2 are paired together to form a
hardware bypass pair.
Port 1 2
Ethernet 2/1
Ports 1 and 2 are paired together to form a
hardware bypass pair.
1
Port 4... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
30 | Bypass LEDs B1 through B3:
• Off—Bypass mode is disabled.
• Green—Port is in standby mode.
• Amber, flashing—Port isin hardware bypass
mode, failure event.
9 Handle ejector 10
Six network activity LEDs: —
• Amber—No connection, or port is not in
use, or no link or network failure.
• Green—Link up, no network activity.
... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
31 | Note The system power requirements are lower than the power supply module capabilities.See the following table.
AC Power Supply
The dual power supplies can supply up to 800-W power across the input voltage range. The load is shared
when both power supply modules are plugged in and running at the same time.
The system d... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
32 | Power Supply Module LEDs
The following figure shows the bicolor power supply LEDs on the power supply module. The figure shows
the AC power supply module. The DC power supply module has the same LEDs.
Figure 12: Power Supply Module LEDs
Green OK LED
OK LED Status:
• Off—Input power not present.
• Green, flashing—Input ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
33 | Figure 13: Fan LED
1 Two-color LED
The fan module has one two-color LED, which is located on the upper left corner of the fan.
• Off—The environmental subsystem is not active yet.
• Green—Fan running normally. It may take up to one minute for the LED status to turn green after power
is on.
• Amber—One fan has failed. T... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
34 | Caution If you have only one SSD, you cannot remove it while the firewall is powered on.
You cannot swap SSDs between different platforms. For example, you cannot use a 2100 series SSD in a
3100 series model. If you are swapping SSDs between two Secure Firewall 3100s, use the remove-secure
local disk command, otherwise... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
35 | Supported SFP/SFP+/QSFP+ Transceivers
TheSFP/SFP+/QSFP+ transceiver is a bidirectional device with a transmitter and receiver in the same physical
package. It is a hot-swappable optical or electrical (copper) interface that plugs into the SFP/SFP+/QSFP+
ports on the fixed ports and the network module ports, and provide... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
36 | Statement 1057—Hazardous Radiation Exposure
Use of controls, adjustments, or performance of procedures other than those specified may result in
hazardous radiation exposure.
Warning
Use appropriate ESD procedures when inserting the transceiver. Avoid touching the contacts at the rear, and
keep the contacts and ports fr... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.