Overview
This guide explains how to deploy and manage the Secure Firewall Threat Defense on the Secure Firewall 6100 using the Firewall Management Center on the local network. It covers hardware setup, registration, and the configuration of foundational security policies. Use these procedures to establish network connectivity and apply core firewall protections.
Before You Begin
Check your software version and reimage if necessary, obtain your licenses, and make sure you can connect.
Cable and Register the Firewall
Connect your Secure Firewall 6100 to the network and register it to the manager.
Configure a Basic Policy
Configure a basic security policy to get your Secure Firewall 6100 up and running.