Before You Start
Deploy and perform initial configuration of the management center. See the getting started guide for your model.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Is This Chapter for You?
To see all available applications and managers, see Which Application and Manager is Right for You?. This chapter applies to the threat defense with the management center.
This chapter explains how to complete the initial configuration of your threat defense and how to register the firewall to the management center located on your management network. For remote branch deployment, where the management center resides at a central headquarters, see Threat Defense Deployment with a Remote Management Center.
In a typical deployment on a large network, you install multiple managed devices on network segments. Each device controls, inspects, monitors, and analyzes traffic, and then reports to a managing management center. The management center provides a centralized management console with a web interface that you can use to perform administrative, management, analysis, and reporting tasks in service to securing your local network.
About the Firewall
The hardware can run either threat defense software or ASA software. Switching between threat defense and ASA requires you to reimage the device. You should also reimage if you need a different software version than is currently installed. See Cisco Secure Firewall ASA and Secure Firewall Threat Defense Reimage Guide.
The firewall runs an underlying operating system called the Secure Firewall eXtensible Operating System (FXOS). The firewall does not support the FXOS Secure Firewall chassis manager; only a limited CLI is supported for troubleshooting purposes. See the Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 and Secure Firewall 3100/4200 with Firepower Threat Defense for more information.
Privacy Collection Statement—The firewall does not require or actively collect personally identifiable information. However, you can use personally identifiable information in the configuration, for example for usernames. In this case, an administrator might be able to see this information when working with the configuration or when using SNMP.
Deploy and perform initial configuration of the management center. See the getting started guide for your model.
See the following tasks to deploy the threat defense with the management center.
|
Pre-Configuration |
Install the firewall. See the hardware installation guide. |
|
Pre-Configuration |
|
|
Pre-Configuration |
|
|
Pre-Configuration |
|
|
CLI |
|
|
CLI or Device Manager |
|
|
Management Center |
|
|
Cisco Commerce Workspace |
Obtain Licenses for the Management Center: Buy feature licenses. |
|
Smart Software Manager |
Obtain Licenses for the Management Center: Generate a license token for the management center. |
|
Management Center |
Obtain Licenses for the Management Center: Register the management center with the Smart Licensing server. |
|
Management Center |
|
|
Management Center |
The management center communicates with the threat defense on the Management interface.
The dedicated Management interface is a special interface with its own network settings:
By default, the Management 1/1 interface is enabled and configured as a DHCP client. If your network does not include a DHCP server, you can set the Management interface to use a static IP address during initial setup at the console port.
Both the threat defenseand the management center require internet access from their management interfaces for licensing and updates.
![]() Note |
The management connection is a secure, TLS-1.3-encrypted communication channel between itself and the device. You do not need to run this traffic over an additional encrypted tunnel such as Site-to-Site VPN for security purposes. If the VPN goes down, for example, you will lose your management connection, so we recommend a simple management path. |
You can configure other interfaces after you connect the threat defense to the management center.
Note that Ethernet 1/2 through 1/8 are enabled as switch ports by default.
The following figure shows a typical network deployment for the firewall where:
The inside interface acts as the internet gateway for Management and for the management center.
Connects Management 1/1 to an inside interface throughan inside switch port.
Connects the management center and management computer toother inside switch ports.
This direct connection is allowed because the Management interface has separate routing from the other interfaces on the threat defense.
To cable the Firepower 1010, see the following illustration, which shows a sample topology using Ethernet1/1 as the outside interface and the remaining interfaces as switch ports on the inside network.
![]() Note |
Other topologies can be used, and your deployment will vary depending on your requirements. For example, you can convert the switch ports to firewall interfaces. |
![]() Note |
PoE is not supported on the Firepower 1010E. |
Step 1 |
Install the chassis. See the hardware installation guide. |
Step 2 |
Connect Management1/1 directly to one of the switch ports, Ethernet1/2 through 1/8. |
Step 3 |
Cable the following to the switch ports, Ethernet 1/2 through 1/8:
|
Step 4 |
Connect the management computer to the console port. You need to use the console port to access the CLI for initial setup if you do not use SSH to the Management interface or use the device manager for initial setup. |
Step 5 |
Connect Ethernet 1/1 to your outside router. |
System power is controlled by the power cord; there is no power button.
![]() Note |
The first time you boot up the threat defense, initialization can take approximately 15 to 30 minutes. |
It's important that you provide reliable power for your device (using an uninterruptable power supply (UPS), for example). Loss of power without first shutting down can cause serious file system damage. There are many processes running in the background all the time, and losing power does not allow the graceful shutdown of your system.
Step 1 |
Attach the power cord to the device, and connect it to an electrical outlet. The power turns on automatically when you plug in the power cord. |
Step 2 |
Check the Power LED on the back or top of the device; if it is solid green, the device is powered on. ![]() |
Step 3 |
Check the Status LED on the back or top of the device; after it is solid green, the system has passed power-on diagnostics. |
To check the software version and, if necessary, install a different version, perform these steps. We recommend that you install your target version before you configure the firewall. Alternatively, you can perform an upgrade after you are up and running, but upgrading, which preserves your configuration, may take longer than using this procedure.
What Version Should I Run?
Cisco recommends running a Gold Star release indicated by a gold star next to the release number on the software download page. You can also refer to the release strategy described in https://www.cisco.com/c/en/us/products/collateral/security/firewalls/bulletin-c25-743178.html; for example, this bulletin describes short-term release numbering (with the latest features), long-term release numbering (maintenance releases and patches for a longer period of time), or extra long-term release numbering (maintenance releases and patches for the longest period of time, for government certification).
Step 1 |
Connect to the CLI. See Access the Threat Defense and FXOS CLI for more information. This procedure shows using the console port, but you can use SSH instead. Log in with the admin user and the default password, Admin123. You connect to the FXOS CLI. The first time you log in, you are prompted to change the password. This password is also used for the threat defense login for SSH.
Example:
|
||
Step 2 |
At the FXOS CLI, show the running version. scope ssa show app-instance Example:
|
||
Step 3 |
If you want to install a new version, perform these steps. |
You can complete the threat defense initial configuration using the CLI or device manager.
Connect to the device manager to perform initial setup of the threat defense. When you perform initial setup using the device manager, all interface configuration completed in the device manager is retained when you switch to the management center for management, in addition to the Management interface and manager access settings. Note that other default configuration settings, such as the access control policy or security zones, are not retained. When you use the CLI, only the Management interface and manager access settings are retained (for example, the default inside interface configuration is not retained).
Deploy and perform initial configuration of the management center. You will need to know the management center IP address or hostname before you set up the threat defense.
Step 1 |
Log in to the device manager. |
Step 2 |
Use the setup wizard when you first log into the device manager to complete the initial configuration. You can optionally skip the setup wizard by clicking Skip device setup at the bottom of the page. After you complete the setup wizard, in addition to the default configuraton for the inside interface (Ethernet1/2 through 1/8, which are switch ports on VLAN1)., you will have configuration for an outside (Ethernet1/1) interface that will be maintained when you switch to management center management. |
Step 3 |
(Might be required) Configure a static IP address for the Management interface. Choose Device, then click the link. If you want to configure a static IP address, be sure to also set the default gateway to be a unique gateway instead of the data interfaces. If you use DHCP, you do not need to configure anything. |
Step 4 |
If you want to configure additional interfaces, including an interface other than outside or inside, choose Device, and then click the link in the Interfaces summary. See Configure the Firewall in the Device Manager for more information about configuring interfaces in the device manager. Other device manager configuration will not be retained when you register the device to the management center. |
Step 5 |
Choose Proceed to set up the management center management. , and click |
Step 6 |
Configure the Management Center/CDO Details. ![]() |
Step 7 |
Configure the Connectivity Configuration. |
Step 8 |
Click Connect. The Registration Status dialog box shows the current status of the switch to the management center. After the Saving Management Center/CDO Registration Settings step, go to the management center, and add the firewall. If you want to cancel the switch to the management center, click Cancel Registration. Otherwise, do not close the device manager browser window until after the Saving Management Center/CDO Registration Settings step. If you do, the process will be paused, and will only resume when you reconnect to the device manager. If you remain connected to the device manager after the Saving Management Center/CDO Registration Settings step, you will eventually see the Successful Connection with Management Center or CDO dialog box, after which you will be disconnected from the device manager. ![]() |
Connect to the threat defense CLI to perform initial setup, including setting the Management IP address, gateway, and other basic networking settings using the setup wizard. The dedicated Management interface is a special interface with its own network settings. In 6.7 and later: If you do not want to use the Management interface for the manager access, you can use the CLI to configure a data interface instead. You will also configure the management center communication settings. When you perform initial setup using the device manager (7.1 and later), all interface configuration completed in the device manager is retained when you switch to the management center for management, in addition to the Management interface and manager access interface settings. Note that other default configuration settings, such as the access control policy, are not retained.
Step 1 |
Connect to the threat defense CLI, either from the console port or using SSH to the Management interface, which obtains an IP address from a DHCP server by default. If you intend to change the network settings, we recommend using the console port so you do not get disconnected. The console port connects to the FXOS CLI. The SSH session connects directly to the threat defense CLI. |
||
Step 2 |
Log in with the username admin and the password Admin123. At the console port, you connect to the FXOS CLI. The first time you log in to FXOS, you are prompted to change the password. This password is also used for the threat defense login for SSH.
Example:
|
||
Step 3 |
If you connected to FXOS on the console port, connect to the threat defense CLI. connect ftd Example:
|
||
Step 4 |
The first time you log in to the threat defense, you are prompted to accept the End User License Agreement (EULA) and, if using an SSH connection, to change the admin password. You are then presented with the CLI setup script.
Defaults or previously entered values appear in brackets. To accept previously entered values, press Enter. See the following guidelines:
Example:
|
||
Step 5 |
Identify the management center that will manage this threat defense. configure manager add {hostname | IPv4_address | IPv6_address | DONTRESOLVE} reg_key [nat_id]
Example:
If the management center is behind a NAT device, enter a unique NAT ID along with the registration key, and specify DONTRESOLVE instead of the hostname, for example: Example:
If the threat defense is behind a NAT device, enter a unique NAT ID along with the management center IP address or hostname, for example: Example:
|
Register your firewall to the management center.
Use the management center to configure and monitor the threat defense.
For information on supported browsers, refer to the release notes for the version you are using (see https://www.cisco.com/go/firepower-notes).
Step 1 |
Using a supported browser, enter the following URL. https://fmc_ip_address |
Step 2 |
Enter your username and password. |
Step 3 |
Click Log In. |
All licenses are supplied to the threat defense by the management center. You can purchase the following licenses:
Essentials—(Required) Essentials license.
IPS—Security Intelligence and Next-Generation IPS
Malware Defense—Malware defense
URL—URL Filtering
Cisco Secure Client—Secure Client Advantage, Secure Client Premier, or Secure Client VPN Only
For a more detailed overview on Cisco Licensing, go to cisco.com/go/licensingguide
Have a master account on the Smart Software Manager.
If you do not yet have an account, click the link to set up a new account. The Smart Software Manager lets you create a master account for your organization.
Your Smart Software Licensing account must qualify for the Strong Encryption (3DES/AES) license to use some features (enabled using the export-compliance flag).
Step 1 |
Make sure your Smart Licensing account contains the available licenses you need. When you bought your device from Cisco or a reseller, your licenses should have been linked to your Smart Software License account. However, if you need to add licenses yourself, use the Find Products and Solutions search field on the Cisco Commerce Workspace. Search for the following license PIDs: ![]()
|
||
Step 2 |
If you have not already done so, register the management center with the Smart Licensing server. Registering requires you to generate a registration token in the Smart Software Manager. See the Cisco Secure Firewall Management Center Administration Guide for detailed instructions. |
Register the threat defense to the management center manually using the device IP address or hostname.
Gather the following information that you set in the threat defense initial configuration:
The threat defense management IP address or hostname, and NAT ID
The management center registration key
Step 1 |
In the management center, choose . |
||
Step 2 |
From the Add drop-down list, choose Add Device. The Registration Key method is selected by default. ![]() Set the following parameters:
|
||
Step 3 |
Click Register, and confirm a successful registration. If the registration succeeds, the device is added to the list. If it fails, you will see an error message. If the threat defense fails to register, check the following items:
For more troubleshooting information, see https://cisco.com/go/fmc-reg-error. |
This section describes how to configure a basic security policy with the following settings:
Inside and outside interfaces—Assign a static IP address to the inside interface, and use DHCP for the outside interface.
DHCP server—Use a DHCP server on the inside interface for clients.
Default route—Add a default route through the outside interface.
NAT—Use interface PAT on the outside interface.
Access control—Allow traffic from inside to outside.
To configure a basic security policy, complete the following tasks.
|
|
|
|
|
|
|
|
|
|
|
Add the VLAN1 interface for the switch ports or convert switch ports to firewall interfaces, assign interfaces to security zones, and set the IP addresses. Typically, you must configure at least a minimum of two interfaces to have a system that passes meaningful traffic. Normally, you would have an outside interface that faces the upstream router or internet, and one or more inside interfaces for your organization’s networks. By default, Ethernet1/1 is a regular firewall interface that you can use for outside, and the remaining interfaces are switch ports on VLAN 1; after you add the VLAN1 interface, you can make it your inside interface. You can alternatively assign switch ports to other VLANs, or convert switch ports to firewall interfaces.
A typical edge-routing situation is to obtain the outside interface address through DHCP from your ISP, while you define static addresses on the inside interfaces.
The following example configures a routed mode inside interface (VLAN1) with a static address and a routed mode outside interface using DHCP (Ethernet1/1).
Step 1 |
Choose Edit ( |
||
Step 2 |
Click Interfaces. ![]() |
||
Step 3 |
(Optional) Disable switch port mode for any of the switch ports (Ethernet1/2 through 1/8)
by clicking the slider in the SwitchPort column so it
shows as disabled ( |
||
Step 4 |
Enable the switch ports. |
||
Step 5 |
Add the inside VLAN interface. |
||
Step 6 |
Click the Edit ( The General tab appears. ![]()
|
||
Step 7 |
Click Save. |
Enable the DHCP server if you want clients to use DHCP to obtain IP addresses from the threat defense.
Step 1 |
Choose Edit ( |
Step 2 |
Choose .![]() |
Step 3 |
On the Server page, click Add, and configure the following options: ![]()
|
Step 4 |
Click OK. |
Step 5 |
Click Save. |
The default route normally points to the upstream router reachable from the outside interface. If you use DHCP for the outside interface, your device might have already received a default route. If you need to manually add the route, complete this procedure. If you received a default route from the DHCP server, it will show in the IPv4 Routes or IPv6 Routes table on the page.
Step 1 |
Choose Edit ( |
Step 2 |
Choose .![]() |
Step 3 |
Click Add Route, and set the following: ![]()
|
Step 4 |
Click OK. The route is added to the static route table. |
Step 5 |
Click Save. |
A typical NAT rule converts internal addresses to a port on the outside interface IP address. This type of NAT rule is called interface Port Address Translation (PAT).
Step 1 |
Choose , and click . |
||
Step 2 |
Name the policy, select the device(s) that you want to use the policy, and click Save. ![]() The policy is added the management center. You still have to add rules to the policy. ![]() |
||
Step 3 |
Click Add Rule. The Add NAT Rule dialog box appears. |
||
Step 4 |
Configure the basic rule options: ![]()
|
||
Step 5 |
On the Interface Objects page, add the outside zone from the Available Interface Objects area to the Destination Interface Objects area. ![]() |
||
Step 6 |
On the Translation page, configure the following options: ![]()
|
||
Step 7 |
Click Save to add the rule. The rule is saved to the Rules table. |
||
Step 8 |
Click Save on the NAT page to save your changes. |
If you created a basic Block all traffic access control policy when you registered the threat defense, then you need to add rules to the policy to allow traffic through the device. The following procedure adds a rule to allow traffic from the inside zone to the outside zone. If you have other zones, be sure to add rules allowing traffic to the appropriate networks.
Step 1 |
Choose Edit ( |
Step 2 |
Click Add Rule, and set the following parameters: ![]()
Leave the other settings as is. |
Step 3 |
Click Apply. The rule is added to the Rules table. |
Step 4 |
Click Save. |
Deploy the configuration changes to the threat defense; none of your changes are active on the device until you deploy them.
Step 1 |
Click Deploy in the upper right. ![]() |
Step 2 |
Either click Deploy All to deploy to all devices or click Advanced Deploy to deploy to selected devices. ![]() ![]() |
Step 3 |
Ensure that the deployment succeeds. Click the icon to the right of the Deploy button in the menu bar to see status for deployments. ![]() |
Use the command-line interface (CLI) to set up the system and do basic system troubleshooting. You cannot configure policies through a CLI session. You can access the CLI by connecting to the console port.
You can also access the FXOS CLI for troubleshooting purposes.
![]() Note |
You can alternatively SSH to the Management interface of the threat defense device. Unlike a console session, the SSH session defaults to the threat defense CLI, from which you can connect to the FXOS CLI using the connect fxos command. You can later connect to the address on a data interface if you open the interface for SSH connections. SSH access to data interfaces is disabled by default. This procedure describes console port access, which defaults to the FXOS CLI. |
Step 1 |
To log into the CLI, connect your management computer to the console port. The Firepower 1000 ships with a USB A-to-B serial cable. Be sure to install any necessary USB serial drivers for your operating system. The console port defaults to the FXOS CLI. Use the following serial settings:
You connect to the FXOS CLI. Log in to the CLI using the admin username and the password you set at initial setup (the default is Admin123). Example:
|
Step 2 |
Access the threat defense CLI. connect ftd Example:
After logging in, for information on the commands available in the CLI, enter help or ? . For usage information, see Cisco Secure Firewall Threat Defense Command Reference. |
Step 3 |
To exit the threat defense CLI, enter the exit or logout command. This command returns you to the FXOS CLI prompt. For information on the commands available in the FXOS CLI, enter ? . Example:
|
It's important that you shut down your system properly. Simply unplugging the power can cause serious file system damage. Remember that there are many processes running in the background all the time, and unplugging or shutting off the power does not allow the graceful shutdown of your firewall system.
The Firepower 1010 chassis does not have an external power switch.You can power off the device using the management center device management page, or you can use the FXOS CLI.
It's important that you shut down your system properly. Simply unplugging the power or pressing the power switch can cause serious file system damage. Remember that there are many processes running in the background all the time, and unplugging or shutting off the power does not allow the graceful shutdown of your firewall.
You can shut down your system properly using the management center.
Step 1 |
Choose . |
Step 2 |
Next to the device that you want to restart, click Edit ( |
Step 3 |
Click the Device tab. |
Step 4 |
Click Shut Down Device
( |
Step 5 |
When prompted, confirm that you want to shut down the device. |
Step 6 |
If you have a console connection to the firewall, monitor the system prompts as the firewall shuts down. You will see the following prompt:
If you do not have a console connection, wait approximately 3 minutes to ensure the system has shut down. |
Step 7 |
You can now unplug the power to physically remove power from the chassis if necessary. |
You can use the FXOS CLI to safely shut down the system and power off the device. You access the CLI by connecting to the console port; see Access the Threat Defense and FXOS CLI.
Step 1 |
In the FXOS CLI, connect to local-mgmt: firepower # connect local-mgmt |
Step 2 |
Issue the shutdown command: firepower(local-mgmt) # shutdown Example:
|
Step 3 |
Monitor the system prompts as the firewall shuts down. You will see the following prompt:
|
Step 4 |
You can now unplug the power to physically remove power from the chassis if necessary. |
To continue configuring your threat defense, see the documents available for your software version at Navigating the Cisco Firepower Documentation.
For information related to using the management center, see the Firepower Management Center Configuration Guide.