Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
CHAPTER 1
Firepower Threat Defense Deployment with FDM
The Cisco Firepower 1100 Series is a standalone modular security services platform that includes the Firepower
1120 and Firepower 1140 security appliances. This chapter describes how to deploy a Firepower 1100 Series
FTD with Firepower Device Manager (FDM) in your network and how to perform initial configuration.
Important
Note
The Firepower 1100 Series supports Cisco Firepower software version 6.4 and later.
Privacy Collection Statement—The Firepower 1100 Series does not require or actively collect
personally-identifiable information. However, you can use personally-identifiable information in the
configuration, for example for usernames. In this case, an administrator might be able to see this information
when working with the configuration or when using SNMP.
• Is This Chapter for You?, on page 1
• End-to-End Procedure, on page 2
• Review the Network Deployment and Default Configuration, on page 3
• Cable the Device, on page 4
• Power on the Device, on page 5
• Log Into FDM, on page 6
• Complete the Initial Configuration, on page 6
• Configure Licensing, on page 8
• Configure the Device in Firepower Device Manager, on page 14
• Access the FTD and FXOS CLI, on page 17
• Power Off the Device, on page 19
• What's Next, on page 20
Is This Chapter for You?
This chapter explains how to complete the initial set up and configuration of your Firepower Threat Defense
(FTD) device using the Firepower Device Manager (FDM) web-based device setup wizard.
Cisco Firepower 1100 Series Getting Started Guide
1
End-to-End Procedure
FDM lets you configure the basic features of the software that are most commonly used for small networks.
It is especially designed for networks that include a single device or just a few, where you do not want to use
a high-powered multiple-device manager to control a large network containing many FDM devices.
If you are managing large numbers of devices, or if you want to use the more complex features and
configurations that FTD allows, use the Firepower Management Center (FMC) instead.
End-to-End Procedure
See the following tasks to deploy FTD with FDM on your chassis.
Firepower Threat Defense Deployment with FDM
Review the Network Deployment and Default Configuration, on page 3.
Cable the Device, on page 4.
Cisco Firepower 1100 Series Getting Started Guide
2
Firepower Threat Defense Deployment with FDM
Review the Network Deployment and Default Configuration
Power on the Device, on page 5.
Log Into FDM, on page 6.
Complete the Initial Configuration, on page 6.
(Optional) Configure Licensing, on page 8: Obtain feature licenses.
Configure Licensing, on page 8: Generate a license token.
Configure Licensing, on page 8: Register the device with the Smart
Licensing Server.
Configure the Device in Firepower Device Manager, on page 14.
Review the Network Deployment and Default Configuration
The following figure shows the default network deployment for Firepower Threat Defense using Firepower
Device Manager on a Firepower 1100 series appliance using the default configuration.
Figure 1: Suggested Network Deployment
Firepower 1100 Series Default Configuration
For complete information about the default configuration, see the Cisco Firepower Threat Defense Configuration
Guide for Firepower Device Manager. The default configuration for the Firepower 1100 series with Firepower
Threat Defense using FDM enables the above network deployment with the following behavior:
• inside --> outside traffic flow
• outside IP address from DHCP
Cisco Firepower 1100 Series Getting Started Guide
3
Cable the Device
Firepower Threat Defense Deployment with FDM
• DHCP for clients on inside. There is a DHCP server on the inside interface. You can plug your
management computer directly into the inside interface and get an address on the 192.168.1.0/24 network.
HTTPS access is enabled on the inside interface, so you can open FDM through the inside interface at
the default address, 192.168.1.1.
• Alternatively, you can connect to Management 1/1 to set up and manage the device using the FDM.
There is a DHCP server on the management interface. You can plug your management computer directly
into this interface and get an address on the 192.168.45.46 - 192.168.45.254 network.
HTTPS access is enabled on the management interface, so you can open FDM through the management
interface at the default address, 192.168.45.45.
Note
The physical management interface is shared between the Management logical
interface and the Diagnostic logical interface; see the Interfaces chapter of the
Cisco Firepower Threat Defense Configuration Guide for Firepower Device
Manager.
• The Firepower Threat Defense system requires Internet access for licensing and updates. The system
can obtain system database updates through the gateway for the outside interface. You do not need to
have an explicit route from the management port or network to the Internet. The default is to use internal
routes through the data interfaces.
Cable the Device
The default configuration assumes that certain interfaces are used for the inside and outside networks. Initial
configuration will be easier to complete if you connect network cables to the interfaces based on these
expectations.
To cable the above scenario on the Firepower 1100 series see the following illustration, which shows a simple
topology using a management computer connected to the inside network. Other topologies can be used and
your deployment will vary depending on your basic logical network connectivity, ports, addressing, and
configuration requirements..
Cisco Firepower 1100 Series Getting Started Guide
4
Firepower Threat Defense Deployment with FDM
Figure 2: Cabling the Firepower 1100 Series
Power on the Device
Procedure
Step 1Connect the Ethernet 1/1 (outside) interface to your ISP/WAN modem or other outside device. By default,
the IP address is obtained using DHCP, but you can set a static address during initial configuration.
Step 2Connect Ethernet 1/2 to your workstation, the one you will use to configure the device.
Step 3Configure the workstation to obtain an IP address using DHCP. The workstation gets an address on the
192.168.1.0/24 network.
Note
You have a couple of other options for connecting the management workstation. You can also
directly connect it to the Management port. The workstation gets an address through DHCP on the
192.168.45.0/24 network. Another option is to leave your workstation attached to a switch, and
attach that switch to one of the inside ports such as Ethernet1/2. However, you must ensure that no
other device on the switch's network is running a DHCP server, because it will conflict with the one
running on the inside bridge group, 192.168.1.1.
Power on the Device
System power is controlled by a rocker power switch located on the rear of the device. The power switch is
implemented as a soft notification switch that supports graceful shutdown of the system to reduce the risk of
system software and data corruption.
Procedure
Step 1Attach the power cord to the device, and connect it to an electrical outlet.
Step 2Turn the power on using the standard rocker-type power on/off switch located on the rear of the chassis,
adjacent to the power cord.
Cisco Firepower 1100 Series Getting Started Guide
5
Firepower Threat Defense Deployment with FDM
Log Into FDM
Step 3Check the Power LED on the back of the device; if it is solid green, the device is powered on.
Step 4Check the Status LED on the back of the device; after it is solid green, the system has passed power-on
diagnostics.
Note
Log Into FDM
Log into FDM to configure your FTD.
Before you begin
Procedure
Step 1Enter the following URL in your browser.
When the switch is toggled from ON to OFF, it may take several seconds for the system to eventually
power off. During this time, the Power LED on the front of the chassis blinks green. Do not remove
the power until the Power LED is completely off.
• Use a current version of Firefox, Chrome, Safari, Edge, or Internet Explorer.
• https://192.168.1.1—Inside (Ethernet 1/2) interface IP address.
• https://192.168.45.45—Management interface IP address.
Step 2Log in with the username admin, and the default password Admin123.
What to do next
• Run through the FDM initial configuration; see Complete the Initial Configuration, on page 6.
Complete the Initial Configuration
Use the setup wizard when you first log into FDM to complete the initial configuration. After you complete
the setup wizard, you should have a functioning device with a few basic policies in place:
• An outside (Ethernet1/1) and an inside interface (Ethernet1/2).
Cisco Firepower 1100 Series Getting Started Guide
6
Firepower Threat Defense Deployment with FDM
• Security zones for the inside and outside interfaces.
• An access rule trusting all inside to outside traffic.
• An interface NAT rule that translates all inside to outside traffic to unique ports on the IP address of the
outside interface.
• A DHCP server running on the inside interface.
Procedure
Step 1You are prompted to read and accept the End User License Agreement and change the admin password.
You must complete these steps to continue.
Step 2Configure the following options for the outside and management interfaces and click Next.
Complete the Initial Configuration
Note
Your settings are deployed to the device when you click Next. The interface will be named “outside”
and it will be added to the “outside_zone” security zone. Ensure that your settings are correct.
a) Outside Interface—This is the data port that you connected to your gateway router. You cannot select
an alternative outside interface during initial device setup. The first data interface is the default outside
interface.
Configure IPv4—The IPv4 address for the outside interface. You can use DHCP or manually enter a
static IP address, subnet mask, and gateway. You can also select Off to not configure an IPv4 address.
Configure IPv6—The IPv6 address for the outside interface. You can use DHCP or manually enter a
static IP address, prefix, and gateway. You can also select Off to not configure an IPv6 address.
b) Management Interface
DNS Servers—The DNS server for the system's management address. Enter one or more addresses of
DNS servers for name resolution. The default is the OpenDNS public DNS servers. If you edit the fields
and want to return to the default, click Use OpenDNS to reload the appropriate IP addresses into the
fields.
Firewall Hostname—The hostname for the system's management address.
Step 3Configure the system time settings and click Next.
a) Time Zone—Select the time zone for the system.
b) NTP Time Server—Select whether to use the default NTP servers or to manually enter the addresses of
your NTP servers. You can add multiple servers to provide backups.
Step 4Configure the smart licenses for the system.
You must have a smart license account to obtain and apply the licenses that the system requires. Initially, you
can use the 90-day evaluation license and set up smart licensing later.
To register the device now, click the link to log into your Smart Software Manager account, and see Configure
Licensing, on page 8.
To use the evaluation license, select Start 90 day evaluation period without registration.
Step 5Click Finish.
Cisco Firepower 1100 Series Getting Started Guide
7
Configure Licensing
What to do next
• Although you can continue using the evaluation license, we recommend that you register and license
your device; see Configure Licensing, on page 8.
• You can also choose to configure the device; see Configure the Device in Firepower Device Manager,
on page 14.
Configure Licensing
The FTD uses Cisco Smart Software Licensing, which lets you purchase and manage a pool of licenses
centrally.
When you register the chassis, the License Authority issues an ID certificate for communication between the
chassis and the License Authority. It also assigns the chassis to the appropriate virtual account.
The Base license is included automatically. Smart Licensing does not prevent you from using product features
that you have not yet purchased, but you should purchase the following optional feature licenses to be in
compliance:
Firepower Threat Defense Deployment with FDM
• Threat—Security Intelligence and Cisco Firepower Next-Generation IPS
• Malware—Advanced Malware Protection for Networks (AMP)
• URL—URL Filtering
• RA VPN—AnyConnect Plus, AnyConnect Apex, or AnyConnect VPN Only.
In addition to the above licenses, you also need to buy a matching subscription to access updates for 1, 3, or
5 years.
For complete information on licensing your system, see the FDM configuration guide.
Before you begin
• Have a master account on the Cisco Smart Software Manager.
If you do not yet have an account, click the link to set up a new account. The Smart Software Manager
lets you create a master account for your organization.
• Your Cisco Smart Software Licensing account must qualify for the Strong Encryption (3DES/AES)
license to use some features (enabled using the export-compliance flag).
Procedure
Step 1Make sure your Smart Licensing account contains the available licenses you need.
When you bought your device from Cisco or a reseller, your licenses should have been linked to your Smart
Software License account. However, if you need to add licenses yourself, use the Find Products and Solutions
search field on the Cisco Commerce Workspace. Search for the following license PIDs:
Cisco Firepower 1100 Series Getting Started Guide
8
Firepower Threat Defense Deployment with FDM
Figure 3: License Search
Configure Licensing
Note
If a PID is not found, you can add the PID manually to your order.
• Threat, Malware, and URL license combination:
• L-FPR1120T-TMC=
• L-FPR1140T-TMC=
• Threat, Malware, and URL subscription combination:
• L-FPR1120T-TMC-1Y
• L-FPR1120T-TMC-3Y
• L-FPR1120T-TMC-5Y
• L-FPR1140T-TMC-1Y
• L-FPR1140T-TMC-3Y
• L-FPR1140T-TMC-5Y
• RA VPN—See the Cisco AnyConnect Ordering Guide.
Step 2In the Cisco Smart Software Manager, request and copy a registration token for the virtual account to which
you want to add this device.
a) Click Inventory.
b) On the General tab, click New Token.
Cisco Firepower 1100 Series Getting Started Guide
9
Configure Licensing
Firepower Threat Defense Deployment with FDM
c) On the Create Registration Token dialog box enter the following settings, and then click Create Token:
• Description
• Expire After—Cisco recommends 30 days.
• Allow export-controlled functionaility on the products registered with this token—Enables the
export-compliance flag.
The token is added to your inventory.
d) Click the arrow icon to the right of the token to open the Token dialog box so you can copy the token ID
to your clipboard. Keep this token ready for later in the procedure when you need to register the ASA.
Cisco Firepower 1100 Series Getting Started Guide
10
Firepower Threat Defense Deployment with FDM
Figure 4: View Token
Figure 5: Copy Token
Configure Licensing
Step 3In FDM, click Device, and then in the Smart License summary, click View Configuration.
You see the Smart License page.
Step 4Click Register Device.
Then follow the instructions on the Smart License Registration dialog box to paste in your token.:
Cisco Firepower 1100 Series Getting Started Guide
11
Configure Licensing
Firepower Threat Defense Deployment with FDM
Step 5Click Register Device.
You return to the Smart License page. While the device registers, you see the following message:
After the device successfully registers and you refresh the page, you see the following:
Step 6Click the Enable/Disable control for each optional license as desired.
Cisco Firepower 1100 Series Getting Started Guide
12
Firepower Threat Defense Deployment with FDM
• Enable—Registers the license with your Cisco Smart Software Manager account and enables the controlled
features. You can now configure and deploy policies controlled by the license.
• Disable—Unregisters the license with your Cisco Smart Software Manager account and disables the
controlled features. You cannot configure the features in new policies, nor can you deploy policies that
use the feature.
Configure Licensing
• If you enabled the RA VPN license, select the type of license you want to use: Plus, Apex, VPN Only,
or Plus and Apex.
After you enable features, if you do not have the licenses in your account, you will see the following
non-compliance message after you refresh the page:
Step 7Choose Resync Connection from the gear drop-down list to synchronize license information with Cisco
Smart Software Manager.
Cisco Firepower 1100 Series Getting Started Guide
13
Loading...
+ 35 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.