Cisco has more than 200 offices worldwide.
Addresses, phone numbers, and fax numbers
are listed on the Cisco website at
www.cisco.com/go/offices.
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1721R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
7000 and 8000 Series Appliances1-3
Virtual Appliances1-3
Cisco ASA with FirePOWER Services1-3
Appliances Delivered with Version 6.01-4
Supported Capabilities by Firepower Management Center Model1-5
Supported Capabilities by Managed Device Model1-7
7000 and 8000 Series Device Chassis Designations1-8
CONTENTS
Firepower System Components1-9
Licensing the Firepower System1-11
Security, Internet Access, and Communication Ports1-13
Internet Access Requirements1-13
Communication Ports Requirements1-14
Preconfiguring Appliances1-16
Deploying on a Management Network2-1
Management Deployment Considerations2-1
Understanding Management Interfaces2-2
Single Management Interface2-2
Multiple Management Interfaces2-2
Using a Hub3-4
Using a Span Port3-5
Using a Network Tap3-5
Cabling Inline Deployments on Copper Interfaces3-5
Special Case: Connecting Firepower 8000 Series Devices3-6
Deployment Options3-7
Deploying with a Virtual Switch3-7
Deploying with a Virtual Router3-8
Deploying with Hybrid Interfaces3-9
Deploying a Gateway VPN3-10
Deploying with Policy-Based NAT3-11
Deploying with Access Control3-11
Using Multiple Sensing Interfaces on a Managed Device3-16
Complex Network Deployments3-18
Integrating with VPNs3-18
Detecting Intrusions on Other Points of Entry3-19
Deploying in Multi-Site Environments3-20
Integrating Multiple Management Interfaces within a Complex Network3-22
Integrating Managed Devices within Complex Networks3-23
Installing a Firepower Managed Device4-1
Included Items4-1
Security Considerations4-1
Identifying the Management Interfaces4-2
Firepower 7000 Series4-2
Firepower 8000 Series4-2
Identifying the Sensing Interfaces4-3
Firepower 7000 Series4-3
Firepower 8000 Series4-7
Using Devices in a Stacked Configuration4-13
Connecting the Firepower 81404-14
Connecting the Firepower 82xx Family and Firepower and AMP 83xx Family4-15
Using the 8000 Series Stacking Cable4-18
Managing Stacked Devices4-19
Rack-Mounting a Firepower Device4-20
Redirecting Console Output4-22
Firepower 7000 and 8000 Series Installation Guide
2
Using the Shell4-22
Using the Web Interface4-23
Testing an Inline Bypass Interface Installation4-24
Setting Up Firepower Managed Devices5-1
Understanding the Setup Process5-2
Beginning the Setup5-2
Performing Initial Setup on a Firepower Device Using the CLI5-3
Registering a Firepower Device to a Management Center Using the CLI5-4
Initial Setup Page: Firepower Devices5-5
Next Steps5-9
Using the LCD Panel on a Firepower Device6-1
Understanding LCD Panel Components6-2
Using the LCD Multi-Function Keys6-3
Contents
Idle Display Mode6-4
Network Configuration Mode6-4
Allowing Network Reconfiguration Using the LCD Panel6-6
System Status Mode6-7
Information Mode6-8
Error Alert Mode6-9
Hardware Specifications7-1
Rack and Cabinet Mounting Options7-1
Firepower 7000 Series Devices7-1
Firepower 7010, 7020, 7030, and 70507-1
Firepower 7110 and 71207-6
Firepower 7115, 7125, and AMP71507-13
Firepower 8000 Series Devices7-21
Firepower 8000 Series Chassis Front View7-22
Firepower 8000 Series Chassis Rear View7-26
Firepower 8000 Series Physical and Environmental Parameters7-29
Firepower 8000 Series Modules7-32
Restoring a Firepower System Appliance to Factory Defaults8-1
Before You Begin8-1
Configuration and Event Backup Guidelines8-1
Traffic Flow During the Restore Process8-1
Understanding the Restore Process8-2
Firepower 7000 and 8000 Series Installation Guide
3
Contents
Obtaining the Restore ISO and Update Files8-3
Beginning the Restore Process8-4
Starting the Restore Utility Using KVM or Physical Serial Port8-4
Starting the Restore Utility Using Lights-Out Management8-5
Using the Interactive Menu to Restore an Appliance8-6
Identifying the Appliance’s Management Interface8-8
Specifying ISO Image Location and Transport Method8-8
Updating System Software and Intrusion Rules During Restore8-10
Downloading the ISO and Update Files and Mounting the Image8-10
Invoking the Restore Process8-11
Saving and Loading Restore Configurations8-13
Next Steps8-14
Setting Up Lights-Out Management8-14
Enabling LOM and LOM Users8-16
Installing an IPMI Utility8-17
AC InstallationA-6
DC InstallationA-7
Grounding/Earthing RequirementsA-8
Firepower 82xx Family AppliancesA-9
AC InstallationA-10
DC InstallationA-11
Grounding/Earthing RequirementsA-12
Firepower and AMP 83xx Family AppliancesA-13
AC InstallationA-14
DC InstallationA-15
Grounding/Earthing RequirementsA-16
Firepower 7000 and 8000 Series Installation Guide
4
Using SFP Transceivers in 3D71x5
and AMP7150 Devices
3D71x5 and AMP7150 SFP Sockets and TransceiversB-1
Inserting an SFP TransceiverB-2
To insert an SFP transceiver:B-2
Removing an SFP TransceiverB-3
Inserting and Removing Firepower 8000 Series ModulesC-1
Module Slots on the Firepower 8000 Series DevicesC-1
Firepower 81xx FamilyC-1
Firepower 82xx Family and 83xx FamilyC-2
Included ItemsC-2
Identifying the Module PartsC-3
Before You BeginC-4
Removing a Module or Slot CoverC-5
B-1
Contents
Inserting a Module or Slot CoverC-6
Scrubbing the Hard DriveD-1
Scrubbing the Contents of the Hard DriveD-1
Preconfiguring Firepower Managed DevicesE-1
Before You BeginE-1
Required Preconfiguration InformationE-1
Optional Preconfiguration InformationE-2
Preconfiguring Time ManagementE-2
Installing the SystemE-3
Registering a DeviceE-3
Preparing the Appliance for ShipmentE-4
Deleting Devices from a Management CenterE-4
Deleting a License from a Management CenterE-5
Powering Down the ApplianceE-5
Shipping ConsiderationsE-5
Troubleshooting the Appliance PreconfigurationE-6
Firepower 7000 and 8000 Series Installation Guide
5
Contents
Firepower 7000 and 8000 Series Installation Guide
6
CHA PT ER
1
Introduction to the Firepower System
The Cisco Firepower System combines the security of an industry-leading network intrusion protection
system with the power to control access to your network based on detected applications, users, and
URLs. You can also use Firepower System appliances to serve in a switched, routed, or hybrid (switched
and routed) environment; to perform network address translation (NAT); and to build secure virtual
private network (VPN) tunnels between the virtual routers of Firepower managed devices.
The Cisco Firepower Management Center provides a centralized management console and database
repository for the Firepower System. Managed devices installed on network segments monitor traffic for
analysis.
Devices in a passive deployment monitor traffic flowing across a network, for example, using a switch
SPAN, virtual switch, or mirror port. Passive sensing interfaces receive all traffic unconditionally and no
traffic received on these interfaces is retransmitted.
Devices in an inline deployment allow you to protect your network from attacks that might affect the
availability, integrity, or confidentiality of hosts on the network. Inline interfaces receive all traffic
unconditionally, and traffic received on these interfaces is retransmitted unless explicitly dropped by
some configuration in your deployment. Inline devices can be deployed as a simple intrusion prevention
system. You can also configure inline devices to perform access control as well as manage network
traffic in other ways.
This installation guide provides information about deploying, installing, and setting up Firepower
System appliances (devices and Management Centers). It also contains hardware specifications and
safety and regulatory information for Firepower System appliances.
TipYou can host virtual Firepower Management Centers and devices, which can manage and be managed
by physical appliances. However, virtual appliances do not support any of the system’s hardware-based
features: redundancy, switching, routing, and so on. See the Firepower NGIPSv for VMware Quick Start Guide for more information.
The topics that follow introduce you to the Firepower System and describe its key components:
• Firepower System Appliances, page 1-2
• Firepower System Components, page 1-9
• Licensing the Firepower System, page 1-11
• Security, Internet Access, and Communication Ports, page 1-13
• Preconfiguring Appliances, page 1-16
Firepower 7000 and 8000 Series Installation Guide
1-1
Firepower System Appliances
Firepower System Appliances
A Firepower System appliance is either a traffic-sensing managed device or a managing Firepower
Management Center:
Physical devices are fault-tolerant, purpose-built network appliances available with a range of
throughputs and capabilities. Firepower Management Centers serve as central management points for
these devices, and automatically aggregate and correlate the events they generate. There are several
models of each physical appliance type; these models are further grouped into series and family. Many
Firepower System capabilities are appliance dependent.
Firepower Management Centers
A Firepower Management Center provides a centralized management point and event database for your
Firepower System deployment. Firepower Management Centers aggregate and correlate intrusion, file,
malware, discovery, connection, and performance data, assessing the impact of events on particular hosts
and tagging hosts with indications of compromise. This allows you to monitor the information that your
devices report in relation to one another, and to assess and control the overall activity that occurs on your
network.
Key features of the Firepower Management Center include:
• device, license, and policy management
• display of event and contextual information using tables, graphs, and charts
Chapter 1 Introduction to the Firepower System
• health and performance monitoring
• external notification and alerting
• correlation, indications of compromise, and remediation features for real-time threat response
• custom and template-based reporting
Managed Devices
Devices deployed on network segments within your organization monitor traffic for analysis. Devices
deployed passively help you gain insight into your network traffic. Deployed inline, you can use
Firepower devices to affect the flow of traffic based on multiple criteria. Depending on model and
license, devices:
• gather detailed information about your organization’s hosts, operating systems, applications, users,
files, networks, and vulnerabilities
• block or allow network traffic based on various network-based criteria, as well as other criteria
including applications, users, URLs, IP address reputations, and the results of intrusion or malware
inspections
• have switching, routing, DHCP, NAT, and VPN capabilities, as well as configurable bypass
interfaces, fast-path rules, and strict TCP enforcement
• have high availability (redundancy) to help you ensure continuity of operations, and stacking to
combine resources from multiple devices
Yo u must manage Firepower devices with a Firepower Management Center.
1-2
Appliance Types
The Firepower System can run on fault-tolerant, purpose-built physical network appliances available
from Cisco. There are several models of each Firepower Management Center and managed device; these
models are further grouped into series and family.
Firepower 7000 and 8000 Series Installation Guide
Chapter 1 Introduction to the Firepower System
Physical managed devices come in a range of throughputs and have a range of capabilities. Physical
Firepower Management Centers also have a range of device management, event storage, and host and
user monitoring capabilities.
You can also deploy 64-bit virtual Firepower Management Centers and virtual Firepower managed
devices as ESXi hosts using the VMware vSphere Hypervisor or vCloud Director environment.
Either type of Management Center (physical or virtual) can manage any type of device: physical, virtual,
and Cisco ASA with FirePOWER Services. Note, however, that many Firepower System capabilities are
appliance dependent.
For more information on Firepower System appliances, including the features and capabilities they
support, see:
• 7000 and 8000 Series Appliances, page 1-3
• Virtual Appliances, page 1-3
• Cisco ASA with FirePOWER Services, page 1-3
• Appliances Delivered with Version 6.0, page 1-4
• Supported Capabilities by Firepower Management Center Model, page 1-5
• Supported Capabilities by Managed Device Model, page 1-7
Firepower System Appliances
7000 and 8000 Series Appliances
The 7000 and 8000 Series are Firepower physical appliances. Firepower 8000 Series devices are more
powerful and support a few features that Firepower 7000 Series devices do not. For detailed information
on 7000 and 8000 Series appliances, see the Firepower 7000 and 8000 Series Installation Guide.
Virtual Appliances
You can deploy 64-bit virtual Firepower Management Center and managed devices as ESXi hosts using
the VMware vSphere Hypervisor or vCloud Director environments.
Regardless of the licenses installed and applied, virtual appliances do not support any of the system’s
hardware-based features: redundancy and resource sharing, switching, routing, and so on. Also, virtual
devices do not have web interfaces. For detailed information on virtual appliances, see the Firepower NGIPSv for VMware Quick Start Guide.
Cisco ASA with FirePOWER Services
Cisco ASA with FirePOWER Services (ASA FirePOWER devices) functions similarly to a managed
device. In this deployment, the ASA device provides the first-line system policy and passes traffic to the
Firepower System for access control, intrusion detection and prevention, discovery, and advanced
malware protection. See the Version 6.0 Firepower System Appliances table for a list of supported ASA
models.
Regardless of the licenses installed and applied, ASA FirePOWER devices do not support any of the
following Firepower System features:
Firepower 7000 and 8000 Series Installation Guide
1-3
Firepower System Appliances
• ASA FirePOWER devices do not support the Firepower System’s hardware-based features: high
• You cannot use the Firepower Management Center web interface to configure ASA FirePOWER
• You cannot use the Firepower Management Center to shut down, restart, or otherwise manage
ASA FirePOWER devices have a software and command line interface (CLI) unique to the ASA
platform. You use these ASA-specific tools to install the system and to perform other platform-specific
administrative tasks.
NoteIf you edit an ASA FirePOWER device and switch from multiple context mode to single context mode
(or visa versa), the device renames all of its interfaces. You must reconfigure all Firepower System
security zones, correlation rules, and related configurations to use the updated ASA FirePOWER
interface names.
Chapter 1 Introduction to the Firepower System
availability, stacking, switching, routing, VPN, NAT, and so on. However, the ASA platform does
provide these features, which you can configure using the ASA CLI and ASDM. See the ASA
documentation for more information.
interfaces. The Firepower Management Center does not display ASA interfaces when the
ASA FirePOWER device is deployed in SPAN port mode.
ASA FirePOWER processes.
Appliances Delivered with Version 6.0
The following table lists the appliances that Cisco delivers with Version 6.0 of the Firepower System.
Table 1-1Version 6.0 Firepower System Appliances
Models/FamilyFirepower SeriesFormType
70xx Family:
• 7010, 7020, 7030, 7050
71xx Family:
• 7110, 7120
• 7115, 7125
• AMP7150
80xx Family:
• AMP8050
81xx Family:
• 8120, 8130, 8140
• AMP8150
82xx Family:
• 8250
7000 Serieshardwaredevice
7000 Serieshardwaredevice
8000 Serieshardwaredevice
8000 Serieshardwaredevice
8000 Serieshardwaredevice
1-4
• 8260, 8270, 8290
Firepower 7000 and 8000 Series Installation Guide
Chapter 1 Introduction to the Firepower System
Table 1-1Version 6.0 Firepower System Appliances (continued)
Note that reimaging results in the loss of all configuration and event data on the appliance. See Restoring
a Firepower System Appliance to Factory Defaults, page 8-1 for more information.
TipYou can migrate specific configuration and event data from a Version 4.10.3 deployment to a Version 5.2
deployment. Then, you can update through a series of procedures to Version 6.0. For more information,
see the Firepower System Migration Guide for Version 5.2.
Supported Capabilities by Firepower Management Center Model
When running Version 6.0, all Firepower Management Centers have similar capabilities, with only a few
model-based restrictions. The following table matches the major capabilities of the system with the
Firepower Management Centers that support those capabilities, assuming you are managing devices that
support those features and have the correct licenses installed and applied.
In addition to the capabilities listed in the table, Firepower Management Center models vary in terms of
how many devices they can manage, how many events they can store, and how many hosts and users they
can monitor. For more information, see the Firepower Management Center Configuration Guide.
Also, keep in mind that although you can use any model of Firepower Management Center running
Version 6.0 of the system to manage any Version 6.0 device, many system capabilities are limited by the
device model. For more information, see Supported Capabilities by Managed Device Model, page 1-7.
Firepower 7000 and 8000 Series Installation Guide
1-5
Chapter 1 Introduction to the Firepower System
Firepower System Appliances
Table 1-2Supported Capabilities by Firepower Management Center Model
Management Center
Feature or CapabilityManagement Center
collect discovery data (host, application, and user) reported by managed
yesyes
devices and build a network map for your organization
view geolocation data for your network trafficyesyes
manage an intrusion detection and prevention (IPS) deploymentyesyes
receive endpoint-based malware (FireAMP) events from your FireAMP
yesyes
deployment
manage device-based hardware-based features:
• fast-path rules
yesyes
Virtual
• strict TCP enforcement
• configurable bypass interfaces
• tap mode
• switching and routing
• NAT policies
• VPN
manage device-based redundancy and resource sharing:
• device stacks
• device high availability
• stacks in high-availability pairs
yesyes
separate and manage internal and external traffic using traffic channelsyesyes
isolate and manage traffic on different networks using multiple management
yesyes
interfaces
install a malware storage packyesno
connect to an eStreamer, host input, or database clientyesyes
1-6
Firepower 7000 and 8000 Series Installation Guide
Chapter 1 Introduction to the Firepower System
Supported Capabilities by Managed Device Model
Devices are the appliances that handle network traffic; therefore, many Firepower System capabilities
are dependent on the model of your managed devices.
The following table matches the major capabilities of the system with the devices that support those
capabilities, assuming you have the correct licenses installed and applied from the managing Firepower
Management Center.
Keep in mind that although you can use any model of Firepower Management Center running Version
6.0 of the system to manage any Version 6.0 device, a few system capabilities are limited by the
Firepower Management Center model. For more information, see Supported Capabilities by Firepower
Management Center Model, page 1-5.
Table 1-3Supported Capabilities by Managed Device Model
Firepower System Appliances
7000 and 8000 Series
Feature or Capability
network discovery: host, application, and useryesyesyes
configurable bypass interfacesexcept where hardware
tap modeyesnono
switching and routingyesnono
NAT policiesyesnono
VPNyesnono
device stacking8140
device high availabilityyesnono
stacks in high-availability pairs8140
DeviceASA FirePOWER
nono
limited
nono
82xx Family
83xx Family
nono
82xx Family
83xx Family
Virtual
Device
Firepower 7000 and 8000 Series Installation Guide
1-7
Firepower System Appliances
Table 1-3Supported Capabilities by Managed Device Model (continued)
Chapter 1 Introduction to the Firepower System
7000 and 8000 Series
Feature or Capability
traffic channelsyesnono
multiple management interfacesyesnono
malware storage packyesnono
restricted command line interface (CLI)yesyesyes
external authenticationyesnono
connect to an eStreamer clientyesyesno
DeviceASA FirePOWER
Virtual
Device
7000 and 8000 Series Device Chassis Designations
The following section lists the 7000 Series and 8000 Series devices and their respective chassis hardware
codes. The chassis code appears on the regulatory label on the outside of the chassis, and is the official
reference code for hardware certifications and safety.
7000 Series Chassis Designations
The following table lists the chassis designations for the 7000 Series models available world-wide.
Table 1-47000 Series Chassis Models
Firepower and AMP Device
ModelHardware Chassis Code
7010, 7020, 7030CHRY-1U-AC
7050NEME-1U-AC
7110, 7120 (Copper) GERY-1U-8-C-AC
7110, 7120 (Fiber)GERY-1U-8-FM-AC
7115, 7125, AMP7150GERY-1U-4C8S-AC
8000 Series Chassis Designations
The following table lists the chassis designations for the 7000 and 8000 Series models available
world-wide.
Table 1-58000 Series Chassis Models
Firepower and AMP Device ModelHardware Chassis Code
AMP8050 (AC or DC power)CHAS-1U-AC/DC
8120, 8130, 8140, AMP8150
(AC or DC power)
8250, 8260, 8270, 8290
(AC or DC power)
CHAS-1U-AC/DC
CHAS-2U-AC/DC
1-8
Firepower 7000 and 8000 Series Installation Guide
Chapter 1 Introduction to the Firepower System
Table 1-58000 Series Chassis Models (continued)
Firepower and AMP Device ModelHardware Chassis Code
8350, 8360, 8370, 8390
(AC or DC power)
AMP830, AMP8360, AMP8370, AMP8390
(AC or DC power)
Firepower System Components
The sections that follow describe some of the key capabilities of the Firepower System that contribute
to your organization’s security, acceptable use policy, and traffic management strategy.
TipMany Firepower System capabilities are appliance model, license, and user role dependent. Where
needed, Firepower System documentation outlines the requirements for each feature and task.
Firepower System Components
PG35-2U-AC/DC
PG35-2U-AC/DC
Redundancy and Resource Sharing
The redundancy and resource-sharing features of the Firepower System allow you to ensure continuity
of operations and to combine the processing resources of multiple physical devices:
• Device stacking allows you to increase the amount of traffic inspected on a network segment by
connecting two to four physical devices in a stacked configuration.
• Device high availability allows you to establish redundancy of networking functionality and
configuration data between two or more 7000 and 8000 Series devices or stacks.
Multiple Management Interfaces
You can use multiple management interfaces on a Firepower Management Center, device, or both, to
improve performance by separating traffic into two traffic channels: the management traffic channel
carries inter-device communication and the event traffic channel carries high volume event traffic such
as intrusion events. Both traffic channels can be carried on the same management interface or split
between two management interfaces, each interface carrying one traffic channel.
You can also create a route from a specific management interface on your Firepower Management Center
to a different network, allowing your Firepower Management Center to isolate and manage device traffic
on one network separately from device traffic on another network.
Additional management interfaces have many of the same capabilities as the default management
interface with the following exceptions:
• You can configure DHCP on the default (eth0) management interface only. Additional (eth1 and so
on) interfaces require unique static IP addresses and hostnames.
• You must configure both traffic channels to use the same non-default management interface when
your Firepower Management Center and managed device are separated by a NAT device.
• You can use Lights-Out Management on the default management interface only.
• On the 70xx Family, you can separate traffic into two channels and configure those channels to send
traffic to one or more management interfaces on the Firepower Management Center. However,
because the 70xx Family contains only one management interface, the device receives traffic sent
from the Firepower Management Center on only one management interface.
Firepower 7000 and 8000 Series Installation Guide
1-9
Firepower System Components
After your appliance is installed, use the web browser to configure multiple management interfaces. See
Multiple Management Interfaces in the Firepower Management Center Configuration Guide for more
information.
Network Traffic Management
The Firepower System’s network traffic management features allow 7000 and 8000 Series devices to act
as part of your organization’s network infrastructure. You can:
• configure a Layer 2 deployment to perform packet switching between two or more network
segments
• configure a Layer 3 deployment to route traffic between two or more interfaces
• perform network address translation (NAT)
• build secure VPN tunnels from virtual routers on managed devices to remote devices or other
third-party VPN endpoints
Discovery and Identity
Cisco’s discovery and identity technology collects information about hosts, operating systems,
applications, users, files, networks, geolocation information, and vulnerabilities, in order to provide you
with a complete view of your network.
You can use the Firepower Management Center’s web interface to view and analyze data collected by
the system. You can also use discovery and identity to help you perform access control and modify
intrusion rule states.
Chapter 1 Introduction to the Firepower System
Access Control
Access control is a policy-based feature that allows you to specify, inspect, and log the traffic that
traverses your network. As part of access control, the Security Intelligence feature allows you to
blacklist—deny traffic to and from—specific IP addresses before the traffic is subjected to deeper
analysis.
After Security Intelligence filtering occurs, you can define which and how traffic is handled by targeted
devices, from simple IP address matching to complex scenarios involving different users, applications,
ports, and URLs. You can trust, monitor, or block traffic, or perform further analysis, such as:
• intrusion detection and prevention
• file control
• file tracking and network-based advanced malware protection (AMP)
Intrusion Detection and Prevention
Intrusion detection and prevention is a policy-based feature, integrated into access control, that allows
you to monitor your network traffic for security violations and, in inline deployments, to block or alter
malicious traffic. An intrusion policy contains a variety of components, including:
• rules that inspect the protocol header values, payload content, and certain packet size characteristics
• rule state configuration based on FireSIGHT recommendations
• advanced settings, such as preprocessors and other detection and performance features
• preprocessor rules that allow you to generate events for associated preprocessors and preprocessor
options
1-10
Firepower 7000 and 8000 Series Installation Guide
Chapter 1 Introduction to the Firepower System
File Tracking, Control, and Network-Based Advanced Malware Protection (AMP)
To help you identify and mitigate the effects of malware, the Firepower System’s file control, network
file trajectory, and advanced malware protection components can detect, track, capture, analyze, and
optionally block the transmission of files (including malware files) in network traffic.
File control is a policy-based feature, integrated into access control, that allows managed devices to
detect and block your users from uploading (sending) or downloading (receiving) files of specific types
over specific application protocols.
Network-based advanced malware protection (AMP) allows the system to inspect network traffic for
malware in several types of files. Appliances can store detected files for further analysis, either to their
hard drive or (for some models) a malware storage pack.
Regardless of whether you store a detected file, you can submit it to the Cisco cloud for a simple
known-disposition lookup using the files SHA-256 hash value. You can also submit files for dynamic analysis, which produces a threat score. Using this contextual information, you can configure the system
to block or allow specific files.
FireAMP is Cisco’s enterprise-class, advanced malware analysis and protection solution that discovers,
understands, and blocks advanced malware outbreaks, advanced persistent threats, and targeted attacks.
If your organization has a FireAMP subscription, individual users install FireAMP Connectors on their
computers and mobile devices (also called endpoints). These lightweight agents communicate with the
Cisco cloud, which in turn communicates with the Firepower Management Center.
After you configure the Firepower Management Center to connect to the cloud, you can use the
Firepower Management Center web interface to view endpoint-based malware events generated as a
result of scans, detections, and quarantines on the endpoints in your organization. The Firepower
Management Center also uses FireAMP data to generate and track indications of compromise on hosts,
as well as display network file trajectories.
Licensing the Firepower System
The network file trajectory feature allows you to track a file’s transmission path across a network. The
system uses SHA-256 hash values to track files. Each file has an associated trajectory map, which
contains a visual display of the file’s transfers over time as well as additional information about the file.
Application Programming Interfaces
There are several ways to interact with the system using application programming interfaces (APIs):
• The Event Streamer (eStreamer) allows you to stream several kinds of event data from a Firepower
System appliance to a custom-developed client application.
• The database access feature allows you to query several database tables on a Firepower Management
Center, using a third-party client that supports JDBC SSL connections.
• The host input feature allows you to augment the information in the network map by importing data
from third-party sources using scripts or command-line files.
• Remediations are programs that your Firepower Management Center can automatically launch when
certain conditions on your network are met. This can not only automatically mitigate attacks when
you are not immediately available to address them, but can also ensure that your system remains
compliant with your organization’s security policy.
Licensing the Firepower System
You can license a variety of features to create an optimal Firepower System deployment for your
organization. You use the Firepower Management Center to manage licenses for itself and the devices it
manages. The license types offered by the Firepower System depend upon the type of device you want
to manage:
Firepower 7000 and 8000 Series Installation Guide
1-11
Licensing the Firepower System
• For Firepower, ASA FirePOWER, and NGIPSv devices, you must use Classic Licenses.
By default, your Firepower Management Center can perform domain control, host, application, and user
discovery, as well as decrypting and inspecting SSL- and TLS-encrypted traffic.
Feature-specific classic licenses allow your managed devices to perform a variety of functions including:
• intrusion detection and prevention
• Security Intelligence filtering
• file control and AMP for Firepower
• application, user, and URL control
• switching and routing
• device high availability
• network address translation (NAT)
• virtual private network (VPN) deployments
There are a few ways you may lose access to licensed features in the Firepower System. You can remove
licenses from the Firepower Management Center, which affects all of its managed devices. You can also
disable licensed capabilities on specific managed devices. Finally, some licenses may expire. Though
there are some exceptions, you cannot use the features associated with an expired or deleted license.
The following summarizes Firepower System Classic Licenses:
Chapter 1 Introduction to the Firepower System
Protection
A Protection license allows managed devices to perform intrusion detection and prevention, file
control, and Security Intelligence filtering.
Control
A Control license allows managed devices to perform user and application control, switching and
routing (including DHCP relay), and NAT. It also allows configuring devices and stacks into
high-availability pairs. A Control license requires a Protection license.
URL Filtering
A URL Filtering license allows managed devices to use regularly updated cloud-based category and
reputation data to determine which traffic can traverse your network, based on the URLs requested
by monitored hosts. A URL Filtering license requires a Protection license.
Malware
A Malware license allows managed devices to perform network-based advanced malware protection
(AMP), that is, to detect and block malware in files transmitted over your network. It also allows
you to view trajectories, which track files transmitted over your network. A Malware license
requires a Protection license.
VPN
A VPN license allows you to build secure VPN tunnels among the virtual routers on Cisco managed
devices, or from managed devices to remote devices or other third-party VPN endpoints. A VPN
license requires Protection and Control licenses.
See the Firepower Management Center Configuration Guide for complete information about classic
license types and restrictions.
1-12
Firepower 7000 and 8000 Series Installation Guide
Chapter 1 Introduction to the Firepower System
Security, Internet Access, and Communication Ports
Security, Internet Access, and Communication Ports
To safeguard the Firepower Management Center, you should install it on a protected internal network.
Although the Firepower Management Center is configured to have only the necessary services and ports
available, you must make sure that attacks cannot reach it (or any managed devices) from outside the
firewall.
If the Firepower Management Center and its managed devices reside on the same network, you can
connect the management interfaces on the devices to the same protected internal network as the
Firepower Management Center. This allows you to securely control the devices from the Firepower
Management Center. You can also configure multiple management interfaces to allow the Firepower
Management Center to manage and isolate traffic from devices on other networks.
Regardless of how you deploy your appliances, intra-appliance communication is encrypted. However,
you must still take steps to ensure that communications between appliances cannot be interrupted,
blocked, or tampered with; for example, with a distributed denial of service (DDoS) or
man-in-the-middle attack.
Also note that specific features of the Firepower System require an Internet connection. By default, all
appliances are configured to directly connect to the Internet. Additionally, the system requires certain
ports remain open for basic intra-appliance communication, for secure appliance access, and so that
specific system features can access the local or Internet resources they need to operate correctly.
TipWith the exception of Cisco ASA with FirePOWER Services, Firepower System appliances support the
use of a proxy server. For more information, see the Firepower Management Center Configuration
Guide.
For more information, see:
• Internet Access Requirements, page 1-13
• Communication Ports Requirements, page 1-14
Internet Access Requirements
Firepower System appliances are configured to directly connect to the Internet on ports 443/tcp (HTTPS)
and 80/tcp (HTTP), which are open by default; see Communication Ports Requirements, page 1-14. Note
that most Firepower System appliances support use of a proxy server; see the Configuring Network
Settings chapter in the Firepower Management Center Configuration Guide. Note also that a proxy
server cannot be used for whois access.
The following table describes the Internet access requirements of specific features of the Firepower
System.
Table 1-6Firepower System Feature Internet Access Requirements
FeatureInternet access is required to...Appliances
dynamic analysis: queryingquery the Collective Security Intelligence
Cloud for threat scores of files previously
submitted for dynamic analysis.
dynamic analysis: submittingsubmit files to the Collective Security
Intelligence Cloud for dynamic analysis.
Management Center
Managed devices
Firepower 7000 and 8000 Series Installation Guide
1-13
Chapter 1 Introduction to the Firepower System
Security, Internet Access, and Communication Ports
Table 1-6Firepower System Feature Internet Access Requirements (continued)
FeatureInternet access is required to...Appliances
events from the Collective Security Intelligence
Cloud cloud.
intrusion rule, VDB, and GeoDB
updates
download or schedule the download of a
intrusion rule, GeoDB, or VDB update directly
to an appliance.
network-based AMPperform malware cloud lookups.Management Center
RSS feed dashboard widgetdownload RSS feed data from an external
source, including Cisco.
Security Intelligence filteringdownload Security Intelligence feed data from
an external source, including the Firepower
System Intelligence Feed.
system software updatesdownload or schedule the download of a system
update directly to an appliance.
URL Filteringdownload cloud-based URL category and
reputation data for access control, and perform
lookups for uncategorized URLs.
whoisrequest whois information for an external host. Any except virtual devices and
Management Center
Management Center
Any except virtual devices and
ASA FirePOWER
Management Center
Any except virtual devices and
ASA FirePOWER
Management Center
ASA FirePOWER
Communication Ports Requirements
Firepower System appliances communicate using a two-way, SSL-encrypted communication channel,
which by default uses port 8305/tcp. The system requires this port remain open for basic intra-appliance
communication. Other open ports allow:
• access to an appliance’s web interface
• secure remote connections to an appliance
• certain features of the system to access the local or Internet resources they need to function correctly
In general, feature-related ports remain closed until you enable or configure the associated feature. For
example, until you connect the Firepower Management Center to a User Agent, the agent
communications port (3306/tcp) remains closed. As another example, port 623/udp remains closed on
7000 and 8000 Series appliances until you enable LOM.
CautionDo not close an open port until you understand how this action will affect your deployment.
For example, closing port 25/tcp (SMTP) outbound on a managed device blocks the device from sending
email notifications for individual intrusion events (see the Firepower Management Center Configuration Guide). As another example, you can disable access to a physical managed device’s web interface by
closing port 443/tcp (HTTPS), but this also prevents the device from submitting suspected malware files
to the cloud for dynamic analysis.
1-14
Firepower 7000 and 8000 Series Installation Guide
Chapter 1 Introduction to the Firepower System
Security, Internet Access, and Communication Ports
Note that the system allows you to change some of its communication ports:
• You can specify custom ports for LDAP and RADIUS authentication when you configure a
connection between the system and the authentication server; see the Firepower Management
Center Configuration Guide.
• You can change the management port (8305/tcp); see the Firepower Management Center
Configuration Guide. However, Cisco strongly recommends that you keep the default setting. If you
change the management port, you must change it for all appliances in your deployment that need to
communicate with each other.
• You can use port 32137/tcp to allow upgraded Firepower Management Centers to communicate with
the Collective Security Intelligence Cloud. However, Cisco recommends you switch to port 443,
which is the default for fresh installations of Version 6.0 and later. For more information, see the
Firepower Management Center Configuration Guide.
The following table lists the open ports required by each appliance type so that you can take full
advantage of Firepower System features.
Table 1-7Default Communication Ports for Firepower System Features and Operations
PortDescriptionDirectionIs Open on...To...
22/tcpSSH/SSLBidirectionalAnyallow a secure remote connection to the
appliance.
25/tcpSMTPOutboundAnysend email notices and alerts from the
appliance.
53/tcpDNSOutboundAnyuse DNS.
67/udp
68/udp
80/tcpHTTPOutboundAny except virtual
DHCPOutboundAnyuse DHCP.
NoteThese ports are closed by default.
allow the RSS Feed dashboard widget to
devices and
connect to a remote web server.
ASA FirePOWER
BidirectionalManagement Centerupdate custom and third-party Security
Intelligence feeds via HTTP.
download URL category and reputation data
(port 443 also required).
161/udpSNMPBidirectionalAny except virtual
devices and
allow access to an appliance’s MIBs via
SNMP polling.
ASA FirePOWER
162/udpSNMPOutboundAnysend SNMP alerts to a remote trap server.
389/tcp
636/tcp
389/tcp
LDAPOutboundAny except virtual
devices
communicate with an LDAP server for
external authentication.
LDAPOutboundManagement Centerobtain metadata for detected LDAP users.
636/tcp
443/tcpHTTPSInboundAny except virtual
access an appliance’s web interface.
devices and
ASA FirePOWER
Firepower 7000 and 8000 Series Installation Guide
1-15
Chapter 1 Introduction to the Firepower System
Preconfiguring Appliances
Table 1-7Default Communication Ports for Firepower System Features and Operations (continued)
PortDescriptionDirectionIs Open on...To...
443/tcpHTTPS
BidirectionalManagement Centerobtain:
AMQP
cloud comms.
• software, intrusion rule, VDB, and
GeoDB updates
• URL category and reputation data (port
80 also required)
• the Cisco Intelligence feed and other
secure Security Intelligence feeds
• endpoint-based (FireAMP) malware
events
• malware dispositions for files detected in
network traffic
• dynamic analysis information on
submitted files
7000 and 8000 Series
devices
7000 and 8000 Series,
virtual devices, and
download software updates using the device’s
local web interface.
submit files to the Cisco cloud for dynamic
analysis.
ASA FirePOWER
514/udpsyslog OutboundAnysend alerts to a remote syslog server.
623/udpSOL/LOMBidirectional7000 and 8000 Seriesallow you to perform Lights-Out Management
using a Serial Over LAN (SOL) connection.
1500/tcp
2000/tcp
1812/udp
1813/udp
database
InboundManagement Centerallow read-only access to the database by a
access
RADIUSBidirectionalAny except virtual
devices and
ASA FirePOWER
third-party client.
communicate with a RADIUS server for
external authentication and accounting.
3306/tcpUser AgentInboundManagement Centercommunicate with User Agents.
8302/tcpeStreamerBidirectionalAny except virtual
communicate with an eStreamer client.
devices
8305/tcpappliance
comms.
8307/tcphost input
BidirectionalAnysecurely communicate between appliances in
a deployment. Required.
BidirectionalManagement Centercommunicate with a host input client.
client
32137/tcpcloud comms. BidirectionalManagement Centerallow upgraded Management Centers to
communicate with the Cisco cloud.
Preconfiguring Appliances
You can preconfigure multiple appliances and Firepower Management Centers in a central location for
later deployment at other sites. For considerations when preconfiguring appliances, see Preconfiguring
Firepower Managed Devices, page E-1.
Firepower 7000 and 8000 Series Installation Guide
1-16
CHA PT ER
2
Deploying on a Management Network
The Firepower System can be deployed to accommodate the needs of each unique network architecture.
The Management Center provides a centralized management console and database repository for the
Firepower System. Devices are installed on network segments to collect traffic connections for analysis.
Management Centers use a management interface to connect to a trusted management network (that is,
a secure internal network not exposed external traffic). Devices connect to a Management Center using
a management interface.
Devices then connect to an external network using sensing interfaces to monitor traffic. For more
information on how to use sensing interfaces in your deployment, see Deploying Firepower Managed
Devices, page 3-1.
NoteSee the ASA documentation for more information on deployment scenarios for ASA FirePOWER
devices.
Management Deployment Considerations
Your management deployment decisions are based on a variety of factors. Answering these questions
can help you understand your deployment options to configure the most efficient and effective system:
• Will you use the default single management interface to connect your device to your Management
Center? Will you enable additional management interfaces to improve performance, or to isolate
traffic received on the Management Center from different networks? See Understanding
Management Interfaces, page 2-2 for more information.
• Do you want to enable traffic channels to create two connections between the Management Center
and the managed device to improve performance? Do you want to use multiple management
interfaces to further increase throughput capacity between the Management Center and the managed
device? See Deploying with Traffic Channels, page 2-3 for more information.
• Do you want to use one Management Center to manage and isolate traffic from devices on different
networks? See Deploying with Network Routes, page 2-4 for more information.
• Are you deploying your management interfaces in a protected environment? Is appliance access
restricted to specific workstation IP addresses? Security Considerations, page 2-5 describes
considerations for deploying your management interfaces securely.
• Are you deploying 8000 Series devices? See Special Case: Connecting 8000 Series Devices,
page 2-5 for more information.
Firepower 7000 and 8000 Series Installation Guide
2-1
Understanding Management Interfaces
Understanding Management Interfaces
Management interfaces provide the means of communication between the Management Center and all
devices it manages. Maintaining good traffic control between the appliances is essential to the success
of your deployment.
On Management Centers and Firepower devices, you can enable the management interface on the
Management Center, device, or both, to sort traffic between the appliances into two separate traffic
channels. The management traffic channel carries all internal traffic (that is, inter-device traffic specific
to the management of the appliance and the system), and the event traffic channel carries all event traffic
(that is, high volume event traffic, such as intrusion and malware events). Splitting traffic into two
channels creates two connection points between the appliances which increases throughput, thus
improving performance. You can also enable multiple management interfaces to provide still greater
throughput between appliances, or to manage and isolate traffic between devices on different networks.
After you register the device to the Management Center, you can change the default configuration to
enable traffic channels and multiple management interfaces using the web interface on each appliance.
For configuration information, see Configuring Appliance Settings in the Firepower Management Center Configuration Guide.
Management interfaces are often located on the back of the appliance. See Identifying the Management
Interfaces, page 4-2 for more information.
Chapter 2 Deploying on a Management Network
Single Management Interface
When you register your device to a Management Center, you establish a single communication channel
that carries all traffic between the management interface on the Management Center and the management
interface on the device.
The following graphic shows the default single communication channel. One interface carries one
communication channel that contains both management and event traffic.
Multiple Management Interfaces
You can enable and configure multiple management interfaces, each with a specific IPv4 or IPv6 address
and, optionally, a hostname, to provide greater traffic throughput by sending each traffic channel to a
different management interface. Configure a smaller interface to carry the lighter management traffic
load, and a larger interface to carry the heavier event traffic load. You can register devices to separate
management interfaces and configure both traffic channels for the same interface, or use a dedicated
management interface to carry the event traffic channels for all devices managed by the Management
Center.
2-2
Firepower 7000 and 8000 Series Installation Guide
Chapter 2 Deploying on a Management Network
You can also create a route from a specific management interface on your Management Center to a
different network, allowing your Management Center to isolate and manage device traffic on one
network separately from device traffic on another network.
Additional management interfaces function the same as the default management interface with the
following exceptions:
• You can configure DHCP on the default (eth0) management interface only. Additional (eth1 and so
on) interfaces require unique static IP addresses and hostnames. Cisco recommends that you do not
set up DNS entries for additional management interfaces but instead register Management Centers
and devices by IP addresses only for these interfaces.
• You must configure both traffic channels to use the same management interface when you use a
non-default management interface to connect your Management Center and managed device and
those appliances are separated by a NAT device.
• You can use Lights-Out Management on the default management interface only.
• On the 70xx Family, you can separate traffic into two channels and configure those channels to send
traffic to one or more management interfaces on the Management Center. However, because the
70xx Family contains only one management interface, the device receives traffic sent from the
Management Center on only one management interface.
Deployment Options
Deployment Options
You can manage traffic flow using traffic channels to improve performance on your system using one or
more management interfaces. In addition, you can create a route to a different network using a specific
management interface on the Management Center and its managed device, allowing you to isolate traffic
between devices on different networks. For more information, see the following sections:
Deploying with Traffic Channels
When you use two traffic channels on one management interface, you create two connections between
the Management Center and the managed device. One channel carries management traffic and one
carries event traffic, separately and on the same interface.
The following example shows the communication channel with two separate traffic channels on the same
interface.
When you use multiple management interfaces, you can improve your performance by dividing the
traffic channels over two management interfaces, thus increasing the traffic flow by adding the capacity
of both interfaces. One interface carries the management traffic channel and the other carries the event
traffic channel. If either interface fails, all traffic reroutes to the active interface and the connection is
maintained.
Firepower 7000 and 8000 Series Installation Guide
2-3
Deploying with Network Routes
The following graphic shows the management traffic channel and the event traffic channel over two
management interfaces.
You can use a dedicated management interface to carry only event traffic from multiple devices. In this
configuration, each device is registered to a different management interface to carry the management
traffic channel, and one management interface on the Management Center carries all event traffic
channels from all devices. If an interface fails, traffic reroutes to the active interface and the connection
is maintained. Note that because event traffic for all devices is carried on the same interface, traffic is
not isolated between networks.
The following graphic shows two devices using different management channel traffic interfaces sharing
the same dedicated interface for event traffic channels.
Chapter 2 Deploying on a Management Network
Deploying with Network Routes
You can create a route from a specific management interface on your Management Center to a different
network. When you register a device from that network to the specified management interface on the
Management Center, you provide an isolated connection between the Management Center and the device
on a different network. Configure both traffic channels to use the same management interface to ensure
that traffic from that device remains isolated from device traffic on other networks. Because the routed
interface is isolated from all other interfaces on the Management Center, if the routed management
interface fails, the connection is lost.
TipYou must register a device to the static IP address of any management interface other than the default
(eth0) management interface. DHCP is supported only on the default management interface.
After you install your Management Center, you configure multiple management interfaces using the web
interface. See Configuring Appliance Settings in the Firepower Management Center Configuration Guide for more information.
Firepower 7000 and 8000 Series Installation Guide
2-4
Chapter 2 Deploying on a Management Network
The following graphic shows two devices isolating network traffic by using separate management
interfaces for all traffic. You can add more management interfaces to configure separate management
and event traffic channel interfaces for each device.
Security Considerations
To deploy your management interfaces in a secure environment, Cisco recommends that you consider
the following:
• Always connect the management interface to a trusted internal management network that is
protected from unauthorized access.
Security Considerations
• Identify the specific workstation IP addresses that can be allowed to access appliances. Restrict
access to the appliance to only those specific hosts using Access Lists within the appliance’s system
policy. For more information, see the Firepower Management Center Configuration Guide.
Special Case: Connecting 8000 Series Devices
Supported Devices: 8000 Series
When you register an 8000 Series device to your Management Center, you must either auto-negotiate on
both sides of the connection, or set both sides to the same static speed to ensure a stable network link.
8000 Series devices do not support half duplex network links; they also do not support differences in
speed or duplex configurations at opposite ends of a connection.
Firepower 7000 and 8000 Series Installation Guide
2-5
Special Case: Connecting 8000 Series Devices
Chapter 2 Deploying on a Management Network
2-6
Firepower 7000 and 8000 Series Installation Guide
Loading...
+ 174 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.