Overview
Learn how to deploy Management Center Virtual on AWS using Amazon Marketplace and the EC2 console. Configure instance details, storage, security groups, key pairs, and Elastic IPs, then verify deployment status and access the appliance using SSH or HTTPS.
Before you begin
-
Configure AWS VPC and EC2 elements as described in Configuring Your AWS Environment.
-
Confirm that an AMI is available for the Firewall Management Center Virtual instances.
The default admin password is the AWS Instance ID, unless you define a default password with user data () during the initial deployment.
Procedure
| 1. | Go to https://aws.amazon.com/marketplace (Amazon Marketplace) and sign in. |
|
| 2. | After you are logged in to the Amazon Marketplace, click the link provided for the Firewall Management Center Virtual.
|
|
| 3. | Click Continue, then click the Manual Launch tab. |
|
| 4. | Click Accept Terms. |
|
| 5. | Click Launch with EC2 Console in your desired region |
|
| 6. | Choose an Instance Type supported by the Firewall Management Center Virtual; see About Deployment On the AWS Cloud for the supported instance types. |
|
| 7. | Click the Next: Configure Instance Details button at the bottom of the screen: |
|
| 8. | Click Next: Add Storage to configure your storage device settings. Edit the settings of the root volume so the volume Size (GiB) is 250 GiB. Less than 250 GiB will limit event storage and is not supported. |
|
| 9. | Click Next: Tag Instance. A tag consists of a case-sensitive key-value pair. For example, you could define a tag with Key = Name and Value = Management. |
|
| 10. | Select Next: Configure Security Group. |
|
| 11. | Click Select an existing Security Group and choose the previously configured Security Group, or create a new Security Group; see AWS documentation for more information on creating Security Groups. |
|
| 12. | Click Review and Launch. |
|
| 13. | Click Launch. |
|
| 14. | Select an existing key pair or create a new key pair.
|
|
| 15. | Click Launch Instances. |
|
| 16. | Click and find a previously allocated IP, or allocate a new one. |
|
| 17. | Select the elastic IP, right-click and select Associate Address. Locate the Instance or Network Interface to select, then click Associate. |
|
| 18. | Click . |
|
| 19. | The Firewall Management Center Virtual Instance state will show “running” and Status checks will show pass for “2/2 checks” after only a few minutes. However, deployment and initial setup processes will take approximately 30 to 40 minutes to complete. To view the status, right-click the Instance, then select Instance . When setup is complete (after approximately 30 to 40 minutes), the Instance Screenshot should show a message similar to “Cisco Secure Firewall Management Center for AWS vW.X.Y (build ZZ)” and possibly followed by some additional lines of output. You should then be able to log in to the newly created the Firewall Management Center Virtual using SSH or HTTPs. Actual deployment times may vary depending on the AWS load in your region. You can access the Firewall Management Center Virtual using SSH:
SSH authentication is handled by a key pair. No password is required. If you are prompted for a password then setup is still running. You can also access the Firewall Management Center Virtual using HTTPS:
If you get no response from SSH or HTTPS, double check these items:
|
What to do next
Configuring Policies and Device Settings
After you install the Firewall Threat Defense Virtual and add the device to the Management Center, you can use the Firewall Management Center user interface to configure device management settings for the Firewall Threat Defense Virtual running on AWS and to configure and apply access control policies and other related policies to manage traffic using your Firewall Threat Defense Virtual device. The security policy controls the services provided by the Firewall Threat Defense Virtual, such as Next Generation IPS filtering and application filtering. You configure the security policy on the Firewall Threat Defense Virtual using the Firewall Management Center. For information about how to configure the security policy, see the Configuration Guide or the online help in Management Center.