Secure Firewall 4200 GSG
Secure Firewall 4200 GSG
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
CHAPTER 1
Which Application and Manager is Right for You?
Your hardware platform can run one of two applications: Secure Firewall Threat Defense or ASA. For each
application, you have a choice of managers. This chapter explains the application and manager choices.
• Applications, on page 1
• Managers, on page 1
Applications
You can use either of the following applications on your hardware platform:
• Threat Defense—The threat defense (formerly Firepower Threat Defense) is a next-generation firewall
that combines an advanced stateful firewall, VPN concentrator, and next generation IPS.
• ASA—The ASA is a traditional, advanced stateful firewall and VPN concentrator.
Cisco provides ASA-to-threat defense migration tools to help you convert your ASA to the threat defense if
you start with ASA and later reimage to threat defense.
To reimage between the ASA and the threat defense, see the Cisco Secure Firewall ASA and Secure Firewall
Threat Defense Reimage Guide.
Managers
The threat defense and ASA support multiple managers.
Note Secure Firewall Device Manager (formerly Firepower Device Manager) is not supported on the Secure Firewall
4200.
Manager Description
Secure Firewall Management Center The management center is a multi-device manager that runs on its own server hardware,
(formerly Firepower Management Center) or as a virtual device on a hypervisor.
For a local management center, see Threat Defense Deployment with the Management
Center, on page 5.
For a remote management center, see Threat Defense Deployment with a Remote
Management Center, on page 43.
Cisco Defense Orchestrator (CDO) CDO's cloud-delivered Firewall Management Center has all of the configuration
Cloud-delivered Firewall Management functionality of an on-premises management center. For the analytics functionality, you
Center can use a cloud solution or an on-prem management center. CDO also manages other
security devices, such as ASAs.
See Threat Defense Deployment with CDO, on page 79.
Secure Firewall Threat Defense REST API The threat defense REST API lets you automate direct configuration of the threat defense.
You cannot use this API if you are managing the threat defense using the management
center or CDO.
The threat defense REST API is not covered in this guide. For more information, see
the Cisco Secure Firewall Threat Defense REST API Guide.
Secure Firewall Management Center REST The management center REST API lets you automate configuration of management
API center policies that can then be applied to managed threat defenses. This API does not
manage the threat defense directly.
The management center REST API is not covered in this guide. For more information,
see the Secure Firewall Management Center REST API Quick Start Guide.
ASA Managers
Table 2: ASA Managers
Manager Description
CLI You can use the CLI to configure all ASA functionality.
The CLI is not covered in this guide. For more information, see the ASA configuration
guides.
Adaptive Security Device Manager ASDM is a Java-based, on-device manager that provides full ASA functionality.
(ASDM)
See ASA Deployment with ASDM, on page 111.
CDO CDO is a cloud-based, multi-device manager. CDO also manages other security devices,
such as threat defenses.
CDO for ASA is not covered in this guide. To get started with CDO, see the CDO home
page.
Manager Description
Cisco Security Manager (CSM) CSM is a multi-device manager that runs on its own server hardware. CSM does not
support managing the threat defenses.
CSM is not covered in this guide. For more information, see the CSM user guide.
ASA HTTP Interface Using HTTP, an automation tool can execute commands on the ASAs by accessing
specifically formatted URLs.
The ASA HTTP interface is not covered in this guide. For more information, see the
Cisco Secure Firewall ASA HTTP Interface for Automation.
End-to-End Tasks
See the following tasks to deploy the threat defense with management center.
CLI (Optional) Check the Software and Install a New Version, on page 13.
CLI Complete the Threat Defense Initial Configuration Using the CLI, on page 15.
Cisco Commerce Buy Base license and optional feature licenses (Obtain Licenses for the Management Center,
Workspace on page 18).
Smart Software Manager Generate a license token for the management center (Obtain Licenses for the Management
Center, on page 18).
Management Center Register the management center with the Smart Licensing server (Obtain Licenses for the
Management Center, on page 18).
Management Center Register the Threat Defense with the Management Center, on page 20.
Note The management connection is a secure, TLS-1.3-encrypted communication channel between itself and the
device. You do not need to run this traffic over an additional encrypted tunnel such as Site-to-Site VPN for
security purposes. If the VPN goes down, for example, you will lose your management connection, so we
recommend a simple management path.
Data Interfaces
You can configure other interfaces after you connect the threat defense to the management center.
The management network has a path to the internet for licensing and updates.
Figure 2: Separate Management Network
This direct connection is allowed because the Management interface has separate routing from the other
interfaces on the threat defense.
Note Other topologies can be used, and your deployment will vary depending on your basic logical network
connectivity, ports, addressing, and configuration requirements.
Procedure
b) Connect the management computer to the console port. You need to use the console port to access the
CLI for initial setup if you do not use SSH to the Management interface.
c) Connect the inside interface (for example, Ethernet 1/2) to your inside router.
d) Connect the outside interface (for example, Ethernet 1/1) to your outside router.
e) Connect other networks to the remaining interfaces.
Step 3 Cable for an edge deployment:
b) Connect the management computer to the console port. You need to use the console port to access the
CLI for initial setup if you do not use SSH to the Management interface.
c) Connect the outside interface (for example, Ethernet 1/1) to your outside router.
d) Connect other networks to the remaining interfaces.
Note The first time you boot up the threat defense, initialization can take approximately 15 to 30 minutes.
Procedure
Step 1 Attach the power cord to the firewall, and connect it to an electrical outlet.
Step 2 Turn the power on using the standard rocker-type power on/off switch located on the rear of the chassis,
adjacent to the power cord.
Step 3 Check the Power LED on the back of the firewall; if it is solid green, the firewall is powered on.
Figure 6: System and Power LEDs
Step 4 Check the System LED on the back of the firewall; after it is solid green, the system has passed power-on
diagnostics.
Note When the switch is toggled from ON to OFF, it may take several seconds for the system to eventually
power off. During this time, the Power LED on the front of the chassis blinks green. Do not remove
the power until the Power LED is completely off.
Procedure
Step 1 Connect to the console port. See Access the Threat Defense and FXOS CLI, on page 39 for more information.
Log in with the admin user and the default password, Admin123.
You connect to the FXOS CLI. The first time you log in, you are prompted to change the password. This
password is also used for the threat defense login for SSH.
Note If the password was already changed, and you do not know it, you must perform a factory reset to
reset the password to the default. See the FXOS troubleshooting guide for the factory reset procedure.
Example:
[...]
[...]
firepower#
Application Name Slot ID Admin State Operational State Running Version Startup
Version Cluster Oper State
-------------------- ---------- --------------- -------------------- ---------------
--------------- ------------------
ftd 1 Enabled Online 7.6.0.65 7.6.0.65
Not Applicable
After the firewall reboots, you connect to the FXOS CLI again.
Procedure
Step 1 Connect to the threat defense CLI, either from the console port or using SSH to the Management interface,
which obtains an IP address from a DHCP server by default. If you intend to change the network settings, we
recommend using the console port so you do not get disconnected.
The console port connects to the FXOS CLI. The SSH session connects directly to the threat defense CLI.
Step 2 Log in with the username admin and the password Admin123.
At the console port, you connect to the FXOS CLI. The first time you log in to FXOS, you are prompted to
change the password. This password is also used for the threat defense login for SSH.
Note If the password was already changed, and you do not know it, you must reimage the device to reset
the password to the default. See the FXOS troubleshooting guide for the reimage procedure.
Example:
[...]
[...]
firepower#
Step 3 If you connected to FXOS on the console port, connect to the threat defense CLI.
connect ftd
Example:
Step 4 The first time you log in to the threat defense, you are prompted to accept the End User License Agreement
(EULA) and, if using an SSH connection, to change the admin password. You are then presented with the
CLI setup script.
Note You cannot repeat the CLI setup wizard unless you clear the configuration; for example, by reimaging.
However, all of these settings can be changed later at the CLI using configure network commands.
See Cisco Secure Firewall Threat Defense Command Reference.
Defaults or previously entered values appear in brackets. To accept previously entered values, press Enter.
See the following guidelines:
• Do you want to configure IPv4? and/or Do you want to configure IPv6?—Enter y for at least one of
these types of addresses. For the edge deployment example shown in the network deployment section,
set a static IP address because the gateway inside interface does not yet have a DHCP server running.
• Enter the IPv4 default gateway for the management interface and/or Enter the IPv6 gateway for
the management interface—Set a gateway IP address for Management 1/1 on the management network.
In the edge deployment example shown in the network deployment section, the inside interface acts as
the management gateway. In this case, you should set the gateway IP address to be the intended inside
interface IP address; you must later use the management center to set the inside IP address. The
data-interfaces setting applies only to the remote management center management.
• If your networking information has changed, you will need to reconnect—If you are connected with
SSH but you change the IP address at initial setup, you will be disconnected. Reconnect with the new
IP address and password. Console connections are not affected.
• Configure firewall mode?—We recommend that you set the firewall mode at initial configuration.
Changing the firewall mode after initial setup erases your running configuration.
Example:
You can register the sensor to a Firepower Management Center and use the
Firepower Management Center to manage it. Note that registering the sensor
to a Firepower Management Center disables on-sensor Firepower Services
management capabilities.
However, if the sensor and the Firepower Management Center are separated by a
NAT device, you must enter a unique NAT ID, along with the unique registration
key.
'configure manager add DONTRESOLVE [registration key ] [ NAT ID ]'
Later, using the web interface on the Firepower Management Center, you must
use the same registration key and, if necessary, the same NAT ID when you add
this sensor to the Firepower Management Center.
>
Step 5 Identify the management center that will manage this threat defense.
configure manager add {hostname | IPv4_address | IPv6_address | DONTRESOLVE} reg_key [nat_id]
• {hostname | IPv4_address | IPv6_address | DONTRESOLVE}—Specifies either the FQDN or IP address
of the management center. If the management center is not directly addressable, use DONTRESOLVE
and also specify the nat_id. At least one of the devices, either the management center or the threat defense,
must have a reachable IP address to establish the two-way, SSL-encrypted communication channel
between the two devices. If you specify DONTRESOLVE in this command, then the threat defense
must have a reachable IP address or hostname.
• reg_key—Specifies a one-time registration key of your choice that you will also specify on the management
center when you register the threat defense. The registration key must not exceed 37 characters. Valid
characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-).
• nat_id—Specifies a unique, one-time string of your choice that you will also specify on the management
center when you register the threat defense when one side does not specify a reachable IP address or
hostname. It is required if you set the management center to DONTRESOLVE. The NAT ID must not
exceed 37 characters. Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen
(-). This ID cannot be used for any other devices registering to the management center.
Example:
If the management center is behind a NAT device, enter a unique NAT ID along with the registration key,
and specify DONTRESOLVE instead of the hostname, for example:
Example:
If the threat defense is behind a NAT device, enter a unique NAT ID along with the management center IP
address or hostname, for example:
Example:
What to do next
Register your firewall to the management center.
Procedure
Procedure
Step 1 Make sure your Smart Licensing account contains the available licenses you need.
When you bought your device from Cisco or a reseller, your licenses should have been linked to your Smart
Software License account. However, if you need to add licenses yourself, use the Search All field on the
Cisco Commerce Workspace.
Figure 7: License Search
• Essentials license:
• L-FPR4215-BSE=
• L-FPR4225-BSE=
• L-FPR4245-BSE=
When you add one of the above PIDs to your order, you can then choose a term-based subscription
corresponding with one of the following PIDs:
• L-FPR4215T-TMC-1Y
• L-FPR4215T-TMC-3Y
• L-FPR4215T-TMC-5Y
• L-FPR4225T-TMC-1Y
• L-FPR4225T-TMC-3Y
• L-FPR4225T-TMC-5Y
• L-FPR4245T-TMC-1Y
• L-FPR4245T-TMC-3Y
• L-FPR4245T-TMC-5Y
• Carrier license:
• L-FPR4200-FTD-CAR=
Step 2 If you have not already done so, register the management center with the Smart Licensing server.
Registering requires you to generate a registration token in the Smart Software Manager. See the Cisco Secure
Firewall Management Center Administration Guide for detailed instructions.
Procedure
Note In an HA environment, when both the management centers are behind a NAT, you can register
the threat defense without a host IP or name in the primary management center. However, for
registering the threat defense in a secondary management center, you must provide the IP address
or hostname for the threat defense.
• Display Name—Enter the name for the threat defense as you want it to display in the management center.
• Registration Key—Enter the same registration key that you specified in the threat defense initial
configuration.
• Domain—Assign the device to a leaf domain if you have a multidomain environment.
• Group—Assign it to a device group if you are using groups.
• Access Control Policy—Choose an initial policy. Unless you already have a customized policy you
know you need to use, choose Create new policy, and choose Block all traffic. You can change this
later to allow traffic; see Allow Traffic from Inside to Outside, on page 36.
Figure 10: New Policy
• Smart Licensing—Assign the Smart Licenses you need for the features you want to deploy. Note: You
can apply the Secure Client remote access VPN license after you add the device, from the System >
Licenses > Smart Licenses page.
• Unique NAT ID—Specify the NAT ID that you specified in the threat defense initial configuration.
• Transfer Packets—Allow the device to transfer packets to the management center. When events like
IPS or Snort are triggered with this option enabled, the device sends event metadata information and
packet data to the management center for inspection. If you disable it, only event information will be
sent to the management center, but packet data is not sent.
If the registration succeeds, the device is added to the list. If it fails, you will see an error message. If the threat
defense fails to register, check the following items:
• Ping—Access the threat defense CLI, and ping the management center IP address using the following
command:
ping system ip_address
If the ping is not successful, check your network settings using the show network command. If you need
to change the threat defense Management IP address, use the configure network {ipv4 | ipv6} manual
command.
• Registration key, NAT ID, and the management center IP address—Make sure you are using the same
registration key, and if used, NAT ID, on both devices. You can set the registration key and NAT ID on
the threat defense using the configure manager add command.
Configure Interfaces
Enable the threat defense interfaces, assign them to security zones, and set the IP addresses. Also configure
breakout interfaces. .
The following example configures a routed mode inside interface with a static address and a routed mode
outside interface using DHCP.
Procedure
Step 1 Choose Devices > Device Management, and click the Edit ( ) for the firewall.
Step 2 Click Interfaces.
Figure 11: Interfaces
Step 3 To create breakout ports from a 40-Gb or larger interface, click the Break icon for the interface.
If you already used the full interface in your configuration, you will have to remove the configuration before
you can proceed with the breakout.
Step 4 Click Edit ( ) for the interface that you want to use for inside.
The General tab appears.
f) Click OK.
Step 5 Click the Edit ( ) for the interface that you want to use for outside.
The General tab appears.
f) Click OK.
Step 6 Click Save.
Procedure
Step 1 Choose Devices > Device Management, and click Edit ( ) for the device.
Step 2 Choose DHCP > DHCP Server.
Step 3 On the Server page, click Add, and configure the following options:
Figure 19: Add Server
Procedure
Step 1 Choose Devices > Device Management, and click Edit ( ) for the device.
Step 2 Choose Routing > Static Route.
Figure 20: Static Route
• Type—Click the IPv4 or IPv6 radio button depending on the type of static route that you are adding.
• Interface—Choose the egress interface; typically the outside interface.
• Available Network—Choose any-ipv4 for an IPv4 default route, or any-ipv6 for an IPv6 default route,
and click Add to move it to the Selected Network list.
• Gateway or IPv6 Gateway—Enter or choose the gateway router that is the next hop for this route. You
can provide an IP address or a Networks/Hosts object.
• Metric—Enter the number of hops to the destination network. Valid values range from 1 to 255; the
default value is 1.
Configure NAT
A typical NAT rule converts internal addresses to a port on the outside interface IP address. This type of NAT
rule is called interface Port Address Translation (PAT).
Procedure
Step 1 Choose Devices > NAT, and click New Policy > Threat Defense NAT.
Step 2 Name the policy, select the device(s) that you want to use the policy, and click Save.
Figure 22: New Policy
The policy is added the management center. You still have to add rules to the policy.
Step 5 On the Interface Objects page, add the outside zone from the Available Interface Objects area to the
Destination Interface Objects area.
• Original Source—Click Add ( ) to add a network object for all IPv4 traffic (0.0.0.0/0).
Note You cannot use the system-defined any-ipv4 object, because Auto NAT rules add NAT as part
of the object definition, and you cannot edit system-defined objects.
Procedure
Step 1 Choose Policy > Access Policy > Access Policy, and click Edit ( ) for the access control policy assigned
to the threat defense.
Step 2 Click Add Rule, and set the following parameters:
Procedure
Step 2 For a quick deployment, check specific devices and then click Deploy, or click Deploy All to deploy to all
devices. Otherwise, for additional deployment options, click Advanced Deploy.
Step 3 Ensure that the deployment succeeds. Click the icon to the right of the Deploy button in the menu bar to see
status for deployments.
Figure 32: Deployment Status
Note You can alternatively SSH to the Management interface of the threat defense device. Unlike a console session,
the SSH session defaults to the threat defense CLI, from which you can connect to the FXOS CLI using the
connect fxos command. You can later connect to the address on a data interface if you open the interface for
SSH connections. SSH access to data interfaces is disabled by default. This procedure describes console port
access, which defaults to the FXOS CLI.
Procedure
Step 1 To log into the CLI, connect your management computer to the console port. The Secure Firewall 4200 does
not ship with a console cable by default, so you will need to buy a third-party USB-to-RJ-45 serial cable, for
example. Be sure to install any necessary USB serial drivers for your operating system. The console port
defaults to the FXOS CLI. Use the following serial settings:
• 9600 baud
• 8 data bits
• No parity
• 1 stop bit
You connect to the FXOS CLI. Log in to the CLI using the admin username and the password you set at
initial setup (the default is Admin123).
Example:
firepower#
After logging in, for information on the commands available in the CLI, enter help or ?. For usage information,
see Cisco Secure Firewall Threat Defense Command Reference.
Step 3 To exit the threat defense CLI, enter the exit or logout command.
This command returns you to the FXOS CLI prompt. For information on the commands available in the FXOS
CLI, enter ?.
Example:
> exit
firepower#
Procedure
System is stopped.
It is safe to power off now.
If you do not have a console connection, wait approximately 3 minutes to ensure the system has shut down.
Step 7 You can now turn off the power switch and unplug the power to physically remove power from the chassis
if necessary.
Procedure
Step 3 Monitor the system prompts as the firewall shuts down. You will see the following prompt:
System is stopped.
It is safe to power off now.
Do you want to reboot instead? [y/N]
Step 4 You can now turn off the power switch and unplug the power to physically remove power from the chassis
if necessary.
What's Next?
To continue configuring your threat defense, see the documents available for your software version at Navigating
the Cisco Secure Firewall Threat Defense Documentation.
For information related to using the management center, see the Cisco Secure Firewall Management Center
Device Configuration Guide.
Note The management connection is a secure, TLS-1.3-encrypted communication channel between itself and the
device. You do not need to run this traffic over an additional encrypted tunnel such as Site-to-Site VPN for
security purposes. If the VPN goes down, for example, you will lose your management connection, so we
recommend a simple management path.
1. Pre-configure the threat defense at the CLI, and then send the threat defense to the remote branch office.
2. At the branch office, cable and power on the threat defense.
3. Finish registering the threat defense using the management center.
• SSH is not enabled by default for data interfaces, so you will have to enable SSH later using the
management center. Because the Management interface gateway will be changed to be the data interfaces,
you also cannot SSH to the Management interface from a remote network unless you add a static route
for the Management interface using the configure network static-routes command.
• You cannot use separate management and event-only interfaces.
• Clustering is not supported. You must use the Management interface in this case.
Figure 33:
End-to-End Tasks
See the following tasks to deploy the threat defense with the management center.
CLI • (Optional) Check the Software and Install a New Version, on page 48
(Central admin) • Pre-Configuration Using the CLI, on page 50.
Physical Setup Install the firewall. See the hardware installation guide.
(Branch admin)
Cisco Commerce Buy a Base license and optional feature licenses (Obtain Licenses for the Management Center,
Workspace on page 57).
(Central admin)
Smart Software Manager Generate a license token for the management center (Obtain Licenses for the Management Center,
on page 57).
(Central admin)
Management Center Register the management center with the Smart Licensing server (Obtain Licenses for the
Management Center, on page 57).
(Central admin)
Procedure
Step 1 Connect to the console port. See Access the Threat Defense and FXOS CLI, on page 75 for more information.
Log in with the admin user and the default password, Admin123.
You connect to the FXOS CLI. The first time you log in, you are prompted to change the password. This
password is also used for the threat defense login for SSH.
Note If the password was already changed, and you do not know it, you must perform a factory reset to
reset the password to the default. See the FXOS troubleshooting guide for the factory reset procedure.
Example:
[...]
[...]
firepower#
Application Name Slot ID Admin State Operational State Running Version Startup
Version Cluster Oper State
-------------------- ---------- --------------- -------------------- ---------------
--------------- ------------------
ftd 1 Enabled Online 7.6.0.65 7.6.0.65
Not Applicable
Procedure
Step 3 Log in with the username admin and the password Admin123.
The first time you log in to the FXOS, you are prompted to change the password. This password is also used
for the threat defense login for SSH.
Note If the password was already changed, and you do not know it, then you must reimage the device to
reset the password to the default. See the FXOS troubleshooting guide for the reimage procedure.
Example:
[...]
[...]
firepower#
Step 5 The first time you log in to the threat defense, you are prompted to accept the End User License Agreement
(EULA) and, if using an SSH connection, to change the admin password. You are then presented with the
CLI setup script for the Management interface settings.
The Management interface settings are used even though you are enabling manager access on a data interface.
Note You cannot repeat the CLI setup wizard unless you clear the configuration; for example, by reimaging.
However, all of these settings can be changed later at the CLI using configure network commands.
See Cisco Secure Firewall Threat Defense Command Reference.
Defaults or previously entered values appear in brackets. To accept previously entered values, press Enter.
See the following guidelines:
• Do you want to configure IPv4? and/or Do you want to configure IPv6?—Enter y for at least one of
these types of addresses. Although you do not plan to use the Management interface, you must set an IP
address, for example, a private address.
• Configure IPv4 via DHCP or manually? and/or Configure IPv6 via DHCP, router, or
manually?—Choose manual. You cannot configure a data interface for management if the management
interface is set to DHCP, because the default route, which must be data-interfaces (see the next bullet),
might be overwritten with one received from the DHCP server.
• Enter the IPv4 default gateway for the management interface and/or Enter the IPv6 gateway for
the management interface—Set the gateway to be data-interfaces. This setting forwards management
traffic over the backplane so it can be routed through the manager access data interface.
• Configure firewall mode?—Enter routed. Outside manager access is only supported in routed firewall
mode.
Example:
You can register the sensor to a Firepower Management Center and use the
Firepower Management Center to manage it. Note that registering the sensor
to a Firepower Management Center disables on-sensor Firepower Services
management capabilities.
However, if the sensor and the Firepower Management Center are separated by a
NAT device, you must enter a unique NAT ID, along with the unique registration
key.
'configure manager add DONTRESOLVE [registration key ] [ NAT ID ]'
Later, using the web interface on the Firepower Management Center, you must
use the same registration key and, if necessary, the same NAT ID when you add
this sensor to the Firepower Management Center.
>
On the management center, the data interface DNS servers are configured in the Platform Settings policy
that you assign to this threat defense. When you add the threat defense to the management center, the
local setting is maintained, and the DNS servers are not added to a Platform Settings policy. However,
if you later assign a Platform Settings policy to the threat defense that includes a DNS configuration,
then that configuration will overwrite the local setting. We suggest that you actively configure the DNS
Platform Settings to match this setting to bring the management center and the threat defense into sync.
Also, local DNS servers are only retained by the management center if the DNS servers were discovered
at initial registration. For example, if you registered the device using the Management interface, but then
later configure a data interface using the configure network management-data-interface command,
then you must manually configure all of these settings in the management center, including the DNS
servers, to match the threat defense configuration.
• You can change the management interface after you register the threat defense to the management center,
to either the Management interface or another data interface.
• The FQDN that you set in the setup wizard will be used for this interface.
• You can clear the entire device configuration as part of the command; you might use this option in a
recovery scenario, but we do not suggest you use it for initial setup or normal operation.
• To disable data managemement, enter the configure network management-data-interface disable
command.
Example:
Configuration done with option to allow manager access from any network, if you wish to
change the manager access network
use the 'client' option in the command 'configure network management-data-interface'.
>
Example:
Configuration done with option to allow manager access from any network, if you wish to
change the manager access network
use the 'client' option in the command 'configure network management-data-interface'.
>
Step 7 (Optional) Limit data interface access to the management center on a specific network.
configure network management-data-interface client ip_address netmask
By default, all networks are allowed.
Step 8 Identify the management center that will manage this threat defense.
configure manager add {hostname | IPv4_address | IPv6_address | DONTRESOLVE} reg_key [nat_id]
• {hostname | IPv4_address | IPv6_address | DONTRESOLVE}—Specifies either the FQDN or IP address
of the management center. If the management center is not directly addressable, use DONTRESOLVE.
At least one of the devices, either the management center or the threat defense, must have a reachable
IP address to establish the two-way, SSL-encrypted communication channel between the two devices.
If you specify DONTRESOLVE in this command, then the threat defense must have a reachable IP
address or hostname.
• reg_key—Specifies a one-time registration key of your choice that you will also specify on the management
center when you register the threat defense. The registration key must not exceed 37 characters. Valid
characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-).
• nat_id—Specifies a unique, one-time string of your choice that you will also specify on the management
center. When you use a data interface for management, then you must specify the NAT ID on both the
threat defense and the management center for registration. The NAT ID must not exceed 37 characters.
Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-). This ID cannot
be used for any other devices registering to the management center.
Example:
Step 9 Shut down the threat defense so you can send the device to the remote branch office.
It's important that you shut down your system properly. Simply unplugging the power or pressing the power
switch can cause serious file system damage. Remember that there are many processes running in the
background all the time, and unplugging or shutting off the power does not allow the graceful shutdown of
your system.
a) Enter the shutdown command.
b) Observe the Power LED and Status LED to verify that the chassis is powered off (appear unlit).
c) After the chassis has successfully powered off, you can then unplug the power to physically remove power
from the chassis if necessary.
Procedure
Note The first time you boot up the threat defense, initialization can take approximately 15 to 30 minutes.
Procedure
Step 1 Attach the power cord to the firewall, and connect it to an electrical outlet.
Step 2 Turn the power on using the standard rocker-type power on/off switch located on the rear of the chassis,
adjacent to the power cord.
Step 3 Check the Power LED on the back of the firewall; if it is solid green, the firewall is powered on.
Figure 36: System and Power LEDs
Step 4 Check the System LED on the back of the firewall; after it is solid green, the system has passed power-on
diagnostics.
Note When the switch is toggled from ON to OFF, it may take several seconds for the system to eventually
power off. During this time, the Power LED on the front of the chassis blinks green. Do not remove
the power until the Power LED is completely off.
Procedure
Procedure
Step 1 Make sure your Smart Licensing account contains the available licenses you need.
When you bought your device from Cisco or a reseller, your licenses should have been linked to your Smart
Software License account. However, if you need to add licenses yourself, use the Search All field on the
Cisco Commerce Workspace.
• Essentials license:
• L-FPR4215-BSE=
• L-FPR4225-BSE=
• L-FPR4245-BSE=
When you add one of the above PIDs to your order, you can then choose a term-based subscription
corresponding with one of the following PIDs:
• L-FPR4215T-TMC-1Y
• L-FPR4215T-TMC-3Y
• L-FPR4215T-TMC-5Y
• L-FPR4225T-TMC-1Y
• L-FPR4225T-TMC-3Y
• L-FPR4225T-TMC-5Y
• L-FPR4245T-TMC-1Y
• L-FPR4245T-TMC-3Y
• L-FPR4245T-TMC-5Y
• Carrier license:
• L-FPR4200-FTD-CAR=
Step 2 If you have not already done so, register the management center with the Smart Software Manager.
Registering requires you to generate a registration token in the Smart Software Manager. See the management
center configuration guide for detailed instructions.
Procedure
Note In an HA environment, when both the management centers are behind a NAT, you can register
the threat defense without a host IP or name in the primary management center. However, for
registering the threat defense in a secondary management center, you must provide the IP address
or hostname for the threat defense.
• Display Name—Enter the name for the threat defense as you want it to display in the management center.
• Registration Key—Enter the same registration key that you specified in the threat defense initial
configuration.
• Domain—Assign the device to a leaf domain if you have a multidomain environment.
• Group—Assign it to a device group if you are using groups.
• Access Control Policy—Choose an initial policy. Unless you already have a customized policy you
know you need to use, choose Create new policy, and choose Block all traffic. You can change this
later to allow traffic; see Allow Traffic from Inside to Outside, on page 36.
Figure 40: New Policy
• Smart Licensing—Assign the Smart Licenses you need for the features you want to deploy. Note: You
can apply the Secure Client remote access VPN license after you add the device, from the System >
Licenses > Smart Licenses page.
• Unique NAT ID—Specify the NAT ID that you specified in the threat defense initial configuration.
• Transfer Packets—Allow the device to transfer packets to the management center. When events like
IPS or Snort are triggered with this option enabled, the device sends event metadata information and
packet data to the management center for inspection. If you disable it, only event information will be
sent to the management center, but packet data is not sent.
If the registration succeeds, the device is added to the list. If it fails, you will see an error message. If the threat
defense fails to register, check the following items:
• Ping—Access the threat defense CLI, and ping the management center IP address using the following
command:
ping system ip_address
If the ping is not successful, check your network settings using the show network command. If you need
to change the threat defense Management IP address, use the configure network
management-data-interface command.
• Registration key, NAT ID, and management center IP address—Make sure you are using the same
registration key, and if used, NAT ID, on both devices. You can set the registration key and NAT ID on
the threat defense using the configure manager add command.
Configure Interfaces
Enable the threat defense interfaces, assign them to security zones, and set the IP addresses. Also configure
breakout interfaces. .
The following example configures a routed mode inside interface with a static address and a routed mode
outside interface using DHCP.
Procedure
Step 1 Choose Devices > Device Management, and click Edit ( ) for the firewall.
Step 2 Click Interfaces.
Step 3 To create 4 x 10-Gb breakout interfaces from a 40-Gb interface (available on some models), click the breakout
icon for the interface.
If you already used the 40-Gb interface in your configuration, you will have to remove the configuration
before you can proceed with the breakout.
Step 4 Click Edit ( ) for the interface that you want to use for inside.
The General tab appears.
f) Click OK.
Step 5 Click Edit ( ) for the interface that you want to use for outside.
The General tab appears.
You already pre-configured this interface for manager access, so the interface will already be named, enabled,
and addressed. You should not alter any of these basic settings because doing so will disrupt the management
center management connection. You must still configure the Security Zone on this screen for through traffic
policies.
a) From the Security Zone drop-down list, choose an existing outside security zone or add a new one by
clicking New.
For example, add a zone called outside_zone.
b) Click OK.
Step 6 Click Save.
Procedure
Step 1 Choose Devices > Device Management, and click Edit ( ) for the device.
Step 2 Choose DHCP > DHCP Server.
Figure 46: DHCP Server
Step 3 On the Server page, click Add, and configure the following options:
Figure 47: Add Server
Configure NAT
A typical NAT rule converts internal addresses to a port on the outside interface IP address. This type of NAT
rule is called interface Port Address Translation (PAT).
Procedure
Step 1 Choose Devices > NAT, and click New Policy > Threat Defense NAT.
Step 2 Name the policy, select the device(s) that you want to use the policy, and click Save.
Figure 48: New Policy
The policy is added the management center. You still have to add rules to the policy.
Step 5 On the Interface Objects page, add the outside zone from the Available Interface Objects area to the
Destination Interface Objects area.
• Original Source—Click Add ( ) to add a network object for all IPv4 traffic (0.0.0.0/0).
Note You cannot use the system-defined any-ipv4 object, because Auto NAT rules add NAT as part
of the object definition, and you cannot edit system-defined objects.
Procedure
Step 1 Choose Policy > Access Policy > Access Policy, and click Edit ( ) for the access control policy assigned
to the threat defense.
Step 2 Click Add Rule, and set the following parameters:
Note SSH is enabled by default on the Management interface; however, this screen does not affect Management
SSH access.
The Management interface is separate from the other interfaces on the device. It is used to set up and register
the device to the management center. SSH for data interfaces shares the internal and external user list with
SSH for the Management interface. Other settings are configured separately: for data interfaces, enable SSH
and access lists using this screen; SSH traffic for data interfaces uses the regular routing configuration, and
not any static routes configured at setup or at the CLI.
For the Management interface, to configure an SSH access list, see the configure ssh-access-list command
in the Cisco Secure Firewall Threat Defense Command Reference. To configure a static route, see the configure
network static-routes command. By default, you configure the default route through the Management interface
at initial setup.
To use SSH, you do not also need an access rule allowing the host IP address. You only need to configure
SSH access according to this section.
You can SSH only to a reachable interface ; if your SSH host is located on the outside interface, you can only
initiate a management connection directly to the outside interface.
Note After you make three consecutive failed attempts to log into the CLI using SSH, the device terminates the
SSH connection.
Note You cannot use the system-provided any network object. Instead, use any-ipv4
or any-ipv6.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select SSH Access.
Step 3 Identify the interfaces and IP addresses that allow SSH connections.
Use this table to limit which interfaces will accept SSH connections, and the IP addresses of the clients who
are allowed to make those connections. You can use network addresses rather than individual IP addresses.
a) Click Add to add a new rule, or click Edit to edit an existing rule.
b) Configure the rule properties:
• IP Address—The network object or group that identifies the hosts or networks you are allowing to
make SSH connections. Choose an object from the drop-down menu, or click + to add a new network
object.
• Available Zones/Interfaces—Add the zones that contain the interfaces to which you will allow SSH
connections. For interfaces not in a zone, you can type the interface name into the field below the
Selected Zones/Interfaces list and click Add. You can also add loopback interfaces. These rules
will be applied to a device only if the device includes the selected interfaces or zones.
c) Click OK.
Procedure
Step 2 For a quick deployment, check specific devices and then click Deploy, or click Deploy All to deploy to all
devices. Otherwise, for additional deployment options, click Advanced Deploy.
Figure 56: Deploy All
Step 3 Ensure that the deployment succeeds. Click the icon to the right of the Deploy button in the menu bar to see
status for deployments.
Figure 58: Deployment Status
Note You can alternatively SSH to the Management interface of the threat defense device. Unlike a console session,
the SSH session defaults to the threat defense CLI, from which you can connect to the FXOS CLI using the
connect fxos command. You can later connect to the address on a data interface if you open the interface for
SSH connections. SSH access to data interfaces is disabled by default. This procedure describes console port
access, which defaults to the FXOS CLI.
Procedure
Step 1 To log into the CLI, connect your management computer to the console port. The Secure Firewall 4200 does
not ship with a console cable by default, so you will need to buy a third-party USB-to-RJ-45 serial cable, for
example. Be sure to install any necessary USB serial drivers for your operating system. The console port
defaults to the FXOS CLI. Use the following serial settings:
• 9600 baud
• 8 data bits
• No parity
• 1 stop bit
You connect to the FXOS CLI. Log in to the CLI using the admin username and the password you set at
initial setup (the default is Admin123).
Example:
firepower#
After logging in, for information on the commands available in the CLI, enter help or ?. For usage information,
see Cisco Secure Firewall Threat Defense Command Reference.
Step 3 To exit the threat defense CLI, enter the exit or logout command.
This command returns you to the FXOS CLI prompt. For information on the commands available in the FXOS
CLI, enter ?.
Example:
> exit
firepower#
Procedure
System is stopped.
It is safe to power off now.
If you do not have a console connection, wait approximately 3 minutes to ensure the system has shut down.
Step 7 You can now turn off the power switch and unplug the power to physically remove power from the chassis
if necessary.
Procedure
Step 3 Monitor the system prompts as the firewall shuts down. You will see the following prompt:
System is stopped.
It is safe to power off now.
Do you want to reboot instead? [y/N]
Step 4 You can now turn off the power switch and unplug the power to physically remove power from the chassis
if necessary.
What's Next?
To continue configuring your threat defense, see the documents available for your software version at Navigating
the Cisco Secure Firewall Threat Defense Documentation.
For information related to using the management center, see the Cisco Secure Firewall Management Center
Device Configuration Guide.
an on-prem management center for analytics only. The on-prem management center does not support policy
configuration or upgrading.
You can onboard a device using the onboarding wizard and CLI registration.
End-to-End Tasks
See the following tasks to onboard the threat defense to CDO using the onboarding wizard.
Figure 59: End-to-End Tasks
CLI (Optional) Check the Software and Install a New Version, on page 84.
Physical Tasks Install the firewall. See the hardware installation guide.
Obtain Licenses
All licenses are supplied to the threat defense by CDO. You can optionally purchase the following feature
licenses:
• Essentials—(Required) Essentials license.
• IPS—Security Intelligence and Next-Generation IPS
• Malware Defense—Malware defense
• URL Filtering—URL Filtering
• Cisco Secure Client—Secure Client Advantage, Secure Client Premier, or Secure Client VPN Only
• Carrier—Diameter, GTP/GPRS, M3UA, SCTP
• Your Smart Software Licensing account must qualify for the Strong Encryption (3DES/AES) license to
use some features (enabled using the export-compliance flag).
Procedure
Step 1 Make sure your Smart Licensing account contains the available licenses you need.
When you bought your device from Cisco or a reseller, your licenses should have been linked to your Smart
Software License account. However, if you need to add licenses yourself, use the Search All field on the
Cisco Commerce Workspace.
Figure 60: License Search
• Essentials license:
• L-FPR4215-BSE=
• L-FPR4225-BSE=
• L-FPR4245-BSE=
When you add one of the above PIDs to your order, you can then choose a term-based subscription
corresponding with one of the following PIDs:
• L-FPR4215T-TMC-1Y
• L-FPR4215T-TMC-3Y
• L-FPR4215T-TMC-5Y
• L-FPR4225T-TMC-1Y
• L-FPR4225T-TMC-3Y
• L-FPR4225T-TMC-5Y
• L-FPR4245T-TMC-1Y
• L-FPR4245T-TMC-3Y
• L-FPR4245T-TMC-5Y
• Carrier license:
• L-FPR4200-FTD-CAR=
Step 2 If you have not already done so, register CDO with the Smart Software Manager.
Registering requires you to generate a registration token in the Smart Software Manager. See the CDO
documentation for detailed instructions.
Procedure
Step 1 Power on the firewall and connect to the console port. See Power on the Firewall, on page 87 and Access the
Threat Defense and FXOS CLI, on page 107 for more information.
Log in with the admin user and the default password, Admin123.
You connect to the FXOS CLI. The first time you log in, you are prompted to change the password. This
password is also used for the threat defense login for SSH.
Note If the password was already changed, and you do not know it, you must perform a factory reset to
reset the password to the default. See the FXOS troubleshooting guide for the factory reset procedure.
Example:
[...]
[...]
firepower#
Application Name Slot ID Admin State Operational State Running Version Startup
Version Cluster Oper State
-------------------- ---------- --------------- -------------------- ---------------
--------------- ------------------
ftd 1 Enabled Online 7.6.0.65 7.6.0.65
Not Applicable
Procedure
Note The first time you boot up the threat defense, initialization can take approximately 15 to 30 minutes.
Procedure
Step 1 Attach the power cord to the firewall, and connect it to an electrical outlet.
Step 2 Turn the power on using the standard rocker-type power on/off switch located on the rear of the chassis,
adjacent to the power cord.
Step 3 Check the Power LED on the back of the firewall; if it is solid green, the firewall is powered on.
Figure 63: System and Power LEDs
Step 4 Check the System LED on the back of the firewall; after it is solid green, the system has passed power-on
diagnostics.
Note When the switch is toggled from ON to OFF, it may take several seconds for the system to eventually
power off. During this time, the Power LED on the front of the chassis blinks green. Do not remove
the power until the Power LED is completely off.
Procedure
Step 1 In the CDO navigation pane, click Inventory, then click the blue plus button ( ) to Onboard a device.
Step 2 Click the FTD tile.
Step 3 Under Management Mode, be sure FTD is selected.
At any point after selecting FTD as the management mode, you can click Manage Smart License to enroll
in or modify the existing smart licenses available for your device. See Obtain Licenses, on page 82 to see
which licenses are available.
Step 6 For the Policy Assignment, use the drop-down menu to choose an access control policy for the device. If you
have no policies configured, choose the Default Access Control Policy.
Figure 66: Access Control Policy
Step 7 For the Subscription License, click the Physical FTD Device radio button, and then check each of the feature
licenses you want to enable. Click Next.
Step 8 For the CLI Registration Key, CDO generates a command with the registration key and other parameters.
You must copy this command and use it in the intial configuration of the threat defense.
Figure 68: CLI Registration Key
Step 9 Click Next in the onboarding wizard to start registering the device.
Step 10 (Optional) Add labels to your device to help sort and filter the Inventory page. Enter a label and select the
blue plus button ( ). Labels are applied to the device after it's onboarded to CDO.
What to do next
From the Inventory page, select the device you just onboarded and select any of the option listed under the
Management pane located to the right.
Procedure
Step 2 Log in with the username admin and the password Admin123.
The first time you log in to FXOS, you are prompted to change the password. This password is also used for
the threat defense login for SSH.
Note If the password was already changed, and you do not know it, then you must reimage the device to
reset the password to the default. See the FXOS troubleshooting guide for the reimage procedure.
Example:
[...]
[...]
firepower#
connect ftd
Example:
Step 4 The first time you log in to the threat defense, you are prompted to accept the End User License Agreement
(EULA). You are then presented with the CLI setup script for the Management interface settings.
The Management interface settings are used even though you are enabling manager access on a data interface.
Note You cannot repeat the CLI setup wizard unless you clear the configuration; for example, by reimaging.
However, all of these settings can be changed later at the CLI using configure network commands.
See Cisco Secure Firewall Threat Defense Command Reference.
Defaults or previously entered values appear in brackets. To accept previously entered values, press Enter.
See the following guidelines:
• Do you want to configure IPv4? and/or Do you want to configure IPv6?—Enter y for at least one of
these types of addresses. Although you do not plan to use the Management interface, you must set an IP
address, for example, a private address.
• Configure IPv4 via DHCP or manually? and/or Configure IPv6 via DHCP, router, or
manually?—Choose manual. You cannot configure a data interface for management if the management
interface is set to DHCP, because the default route, which must be data-interfaces (see the next bullet),
might be overwritten with one received from the DHCP server.
• Enter the IPv4 default gateway for the management interface and/or Enter the IPv6 gateway for
the management interface—Set the gateway to be data-interfaces. This setting forwards management
traffic over the backplane so it can be routed through the manager access data interface.
• Configure firewall mode?—Enter routed. Outside manager access is only supported in routed firewall
mode.
Example:
You can register the sensor to a Firepower Management Center and use the
Firepower Management Center to manage it. Note that registering the sensor
to a Firepower Management Center disables on-sensor Firepower Services
management capabilities.
However, if the sensor and the Firepower Management Center are separated by a
NAT device, you must enter a unique NAT ID, along with the unique registration
key.
'configure manager add DONTRESOLVE [registration key ] [ NAT ID ]'
Later, using the web interface on the Firepower Management Center, you must
use the same registration key and, if necessary, the same NAT ID when you add
this sensor to the Firepower Management Center.
>
• If you configure a DDNS server update URL, the threat defense automatically adds certificates for all
of the major CAs from the Cisco Trusted Root CA bundle so that the threat defense can validate the
DDNS server certificate for the HTTPS connection. The threat defense supports any DDNS server that
uses the DynDNS Remote API specification (https://help.dyn.com/remote-access-api/).
• This command sets the data interface DNS server. The Management DNS server that you set with the
setup script (or using the configure network dns servers command) is used for management traffic.
The data DNS server is used for DDNS (if configured) or for security policies applied to this interface.
On CDO, the data interface DNS servers are configured in the Platform Settings policy that you assign
to this threat defense. When you add the threat defense to CDO, the local setting is maintained, and the
DNS servers are not added to a Platform Settings policy. However, if you later assign a Platform Settings
policy to the threat defense that includes a DNS configuration, then that configuration will overwrite the
local setting. We suggest that you actively configure the DNS Platform Settings to match this setting to
bring CDO and the threat defense into sync.
Also, local DNS servers are only retained by CDO if the DNS servers were discovered at initial registration.
For example, if you registered the device using the Management interface, but then later configure a data
interface using the configure network management-data-interface command, then you must manually
configure all of these settings in CDO, including the DNS servers, to match the threat defense
configuration.
• You can change the management interface after you register the threat defense to CDO, to either the
Management interface or another data interface.
• The FQDN that you set in the setup wizard will be used for this interface.
• You can clear the entire device configuration as part of the command; you might use this option in a
recovery scenario, but we do not suggest you use it for initial setup or normal operation.
• To disable data managemement, enter the configure network management-data-interface disable
command.
Example:
Configuration done with option to allow manager access from any network, if you wish to
change the manager access network
use the 'client' option in the command 'configure network management-data-interface'.
>
Example:
Configuration done with option to allow manager access from any network, if you wish to
change the manager access network
use the 'client' option in the command 'configure network management-data-interface'.
>
Step 6 Identify the CDO that will manage this threat defense using the configure manager add command that CDO
generated. See Onboard a Device with the Onboarding Wizard, on page 87 to generate the command.
Example:
Configure Interfaces
Enable the threat defense interfaces, assign them to security zones, and set the IP addresses. Also configure
breakout interfaces. .
The following example configures a routed mode inside interface with a static address and a routed mode
outside interface using DHCP.
Procedure
Step 1 Choose Devices > Device Management, and click Edit ( ) for the firewall.
Step 2 Click Interfaces.
Figure 70: Interfaces
Step 3 To create 4 x 10-Gb breakout interfaces from a 40-Gb interface (available on some models), click the breakout
icon for the interface.
If you already used the 40-Gb interface in your configuration, you will have to remove the configuration
before you can proceed with the breakout.
Step 4 Click Edit ( ) for the interface that you want to use for inside.
The General tab appears.
f) Click OK.
Step 5 Click Edit ( ) for the interface that you want to use for outside.
The General tab appears.
You already pre-configured this interface for manager access, so the interface will already be named, enabled,
and addressed. You should not alter any of these basic settings because doing so will disrupt the management
center management connection. You must still configure the Security Zone on this screen for through traffic
policies.
a) From the Security Zone drop-down list, choose an existing outside security zone or add a new one by
clicking New.
For example, add a zone called outside_zone.
b) Click OK.
Step 6 Click Save.
Procedure
Step 1 Choose Devices > Device Management, and click Edit ( ) for the device.
Step 2 Choose DHCP > DHCP Server.
Figure 75: DHCP Server
Step 3 On the Server page, click Add, and configure the following options:
Figure 76: Add Server
Configure NAT
A typical NAT rule converts internal addresses to a port on the outside interface IP address. This type of NAT
rule is called interface Port Address Translation (PAT).
Procedure
Step 1 Choose Devices > NAT, and click New Policy > Threat Defense NAT.
Step 2 Name the policy, select the device(s) that you want to use the policy, and click Save.
Figure 77: New Policy
The policy is added the management center. You still have to add rules to the policy.
Step 5 On the Interface Objects page, add the outside zone from the Available Interface Objects area to the
Destination Interface Objects area.
• Original Source—Click Add ( ) to add a network object for all IPv4 traffic (0.0.0.0/0).
Note You cannot use the system-defined any-ipv4 object, because Auto NAT rules add NAT as part
of the object definition, and you cannot edit system-defined objects.
Procedure
Step 1 Choose Policy > Access Policy > Access Policy, and click Edit ( ) for the access control policy assigned
to the threat defense.
Step 2 Click Add Rule, and set the following parameters:
Note SSH is enabled by default on the Management interface; however, this screen does not affect Management
SSH access.
The Management interface is separate from the other interfaces on the device. It is used to set up and register
the device to the management center. SSH for data interfaces shares the internal and external user list with
SSH for the Management interface. Other settings are configured separately: for data interfaces, enable SSH
and access lists using this screen; SSH traffic for data interfaces uses the regular routing configuration, and
not any static routes configured at setup or at the CLI.
For the Management interface, to configure an SSH access list, see the configure ssh-access-list command
in the Cisco Secure Firewall Threat Defense Command Reference. To configure a static route, see the configure
network static-routes command. By default, you configure the default route through the Management interface
at initial setup.
To use SSH, you do not also need an access rule allowing the host IP address. You only need to configure
SSH access according to this section.
You can SSH only to a reachable interface ; if your SSH host is located on the outside interface, you can only
initiate a management connection directly to the outside interface.
Note After you make three consecutive failed attempts to log into the CLI using SSH, the device terminates the
SSH connection.
Note You cannot use the system-provided any network object. Instead, use any-ipv4
or any-ipv6.
Procedure
Step 1 Choose Devices > Platform Settings and create or edit the threat defense policy.
Step 2 Select SSH Access.
Step 3 Identify the interfaces and IP addresses that allow SSH connections.
Use this table to limit which interfaces will accept SSH connections, and the IP addresses of the clients who
are allowed to make those connections. You can use network addresses rather than individual IP addresses.
a) Click Add to add a new rule, or click Edit to edit an existing rule.
b) Configure the rule properties:
• IP Address—The network object or group that identifies the hosts or networks you are allowing to
make SSH connections. Choose an object from the drop-down menu, or click + to add a new network
object.
• Available Zones/Interfaces—Add the zones that contain the interfaces to which you will allow SSH
connections. For interfaces not in a zone, you can type the interface name into the field below the
Selected Zones/Interfaces list and click Add. You can also add loopback interfaces. These rules
will be applied to a device only if the device includes the selected interfaces or zones.
c) Click OK.
Procedure
Step 2 For a quick deployment, check specific devices and then click Deploy, or click Deploy All to deploy to all
devices. Otherwise, for additional deployment options, click Advanced Deploy.
Figure 85: Deploy All
Step 3 Ensure that the deployment succeeds. Click the icon to the right of the Deploy button in the menu bar to see
status for deployments.
Figure 87: Deployment Status
Note You can alternatively SSH to the Management interface of the threat defense device. Unlike a console session,
the SSH session defaults to the threat defense CLI, from which you can connect to the FXOS CLI using the
connect fxos command. You can later connect to the address on a data interface if you open the interface for
SSH connections. SSH access to data interfaces is disabled by default. This procedure describes console port
access, which defaults to the FXOS CLI.
Procedure
Step 1 To log into the CLI, connect your management computer to the console port. The Secure Firewall 4200 does
not ship with a console cable by default, so you will need to buy a third-party USB-to-RJ-45 serial cable, for
example. Be sure to install any necessary USB serial drivers for your operating system. The console port
defaults to the FXOS CLI. Use the following serial settings:
• 9600 baud
• 8 data bits
• No parity
• 1 stop bit
You connect to the FXOS CLI. Log in to the CLI using the admin username and the password you set at
initial setup (the default is Admin123).
Example:
firepower#
After logging in, for information on the commands available in the CLI, enter help or ?. For usage information,
see Cisco Secure Firewall Threat Defense Command Reference.
Step 3 To exit the threat defense CLI, enter the exit or logout command.
This command returns you to the FXOS CLI prompt. For information on the commands available in the FXOS
CLI, enter ?.
Example:
> exit
firepower#
You can shut down your system properly using the management center.
Procedure
System is stopped.
It is safe to power off now.
If you do not have a console connection, wait approximately 3 minutes to ensure the system has shut down.
Step 7 You can now turn off the power switch and unplug the power to physically remove power from the chassis
if necessary.
Procedure
System is stopped.
It is safe to power off now.
If you do not have a console connection, wait approximately 3 minutes to ensure the system has shut down.
Step 7 You can now turn off the power switch and unplug the power to physically remove power from the chassis
if necessary.
What's Next
To continue configuring your threat defense using CDO, see the Cisco Defense Orchestrator home page.
ciscoasa> enable
Password:
The enable password is not set. Please set it now.
Enter Password: ******
Repeat Password: ******
ciscoasa# configure terminal
ciscoasa(config)#
4. Clear the current configuration using the clear configure all command.
5. Paste the modified configuration at the ASA CLI.
This guide assumes a factory default configuration, so if you paste in an existing configuration, some of the
procedures in this guide will not apply to your ASA.
Initial ASDM access Remove any VPN or other strong encryption feature
configuration—even if you only configured weak encryption—if
you cannot connect to ASDM or register with the Smart Licensing
server.
You can reenable these features after you obtain the Strong
Encryption (3DES) license.
The reason for this issue is that the ASA includes 3DES capability
by default for management access only. If you enable a strong
encryption feature, then ASDM and HTTPS traffic (like that to
and from the Smart Licensing server) are blocked. The exception
to this rule is if you are connected to a management-only interface,
such as Management 1/1. SSH is not affected.
Interface IDs Make sure you change the interface IDs to match the new
hardware IDs. For example, the ASA 5525-X includes
Management 0/0, and GigabitEthernet 0/0 through 0/5. The
Firepower 1120 includes Management 1/1 and Ethernet 1/1
through 1/8.
boot system commands The Secure Firewall 4200 only allows a single boot system
command, so you should remove all but one command before
The ASA 5500-X allows up to four boot system commands to
you paste. You actually do not need to have any boot system
specify the booting image to use.
commands present in your configuration, as it is not read at startup
to determine the booting image. The last-loaded boot image will
always run upon reload.
The boot system command performs an action when you enter
it: the system validates and unpacks the image and copies it to
the boot location (an internal location on disk0 managed by
FXOS). The new image will load when you reload the ASA.
End-to-End Tasks
See the following tasks to deploy and configure the ASA on your chassis.
Pre-Configuration Review the Network Deployment and Default Configuration, on page 115.
Cisco Commerce Obtain Standard license and optional feature licenses (Configure Licensing, on page 121).
Workspace
Smart Software Manager Generate a license token for the chassis (Configure Licensing, on page 121).
Note If you cannot use the default Management IP address for ASDM access, you can set the Management IP
address at the ASA CLI. See (Optional) Change the IP Address, on page 119.
If you need to change the inside IP address, you can do so using the ASDM Startup Wizard. For example,
you may need to change the inside IP address in the following circumstances:
• If the outside interface tries to obtain an IP address on the 192.168.1.0 network, which is a common
default network, the DHCP lease will fail, and the outside interface will not obtain an IP address. This
problem occurs because the ASA cannot have two interfaces on the same network. In this case you must
change the inside IP address to be on a new network.
• If you add the ASA to an existing inside network, you will need to change the inside IP address to be on
the existing network.
interface Management1/1
management-only
nameif management
security-level 100
ip address dhcp setroute
no shutdown
!
interface Ethernet1/1
nameif outside
security-level 0
ip address dhcp setroute
no shutdown
!
interface Ethernet1/2
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
no shutdown
!
object network obj_any
subnet 0.0.0.0 0.0.0.0
nat (any,outside) dynamic interface
!
http server enable
http 0.0.0.0 0.0.0.0 management
http 192.168.1.0 255.255.255.0 inside
!
dhcpd auto_config outside
dhcpd address 192.168.1.20-192.168.1.254 inside
dhcpd enable inside
!
dns domain-lookup outside
dns server-group DefaultDNS
name-server 208.67.222.222 outside
name-server 208.67.220.220 outside
!
Manage the Secure Firewall 4200 on either Management 1/1 or Ethernet 1/2. The default configuration also
configures Ethernet1/1 as outside.
• (Optional) Obtain a console cable—The firewall does not ship with a console cable by default, so you
will need to buy a third-party USB-to-RJ-45 serial cable, for example.
Procedure
You can later configure ASA management access from other interfaces; see the ASA general operations
configuration guide.
Procedure
Step 1 Attach the power cord to the firewall, and connect it to an electrical outlet.
Step 2 Turn the power on using the standard rocker-type power on/off switch located on the rear of the chassis,
adjacent to the power cord.
Step 3 Check the Power LED on the back of the firewall; if it is solid green, the firewall is powered on.
Step 4 Check the System LED on the back of the firewall; after it is solid green, the system has passed power-on
diagnostics.
Note When the switch is toggled from ON to OFF, it may take several seconds for the system to eventually
power off. During this time, the Power LED on the front of the chassis blinks green. Do not remove
the power until the Power LED is completely off.
Note This procedure restores the default configuration and also sets your chosen IP address, so if you made any
changes to the ASA configuration that you want to preserve, do not use this procedure.
Procedure
Step 1 Connect to the ASA console port, and enter global configuration mode. See Access the ASA and FXOS CLI,
on page 129 for more information.
Step 2 Restore the default configuration with your chosen IP address.
configure factory-default [ip_address [mask]]
Example:
Note If you attempt to configure any features that can use strong encryption before you register—even if you only
configure weak encryption—then your HTTPS connection will be dropped on that interface, and you cannot
reconnect. The exception to this rule is if you are connected to a management-only interface, such as
Management 1/1. SSH is not affected. If you lose your HTTPS connection, you can connect to the console
port to reconfigure the ASA, connect to a management-only interface, or connect to an interface not configured
for a strong encryption feature.
Procedure
Note Be sure to specify https://, and not http:// or just the IP address (which defaults to HTTP); the ASA
does not automatically forward an HTTP request to HTTPS.
The Cisco ASDM web page appears. You may see browser security warnings because the ASA does not have
a certificate installed; you can safely ignore these warnings and visit the web page.
Step 4 Leave the username and password fields empty, and click OK.
The main ASDM window appears.
Configure Licensing
The ASA uses Smart Licensing. You can use regular Smart Licensing, which requires internet access; or for
offline management, you can configure Permanent License Reservation or a Smart Software Manager On-Prem
(formerly known as a Satellite server). For more information about these offline licensing methods, see Cisco
ASA Series Feature Licenses; this guide applies to regular Smart Licensing.
For a more detailed overview on Cisco Licensing, go to cisco.com/go/licensingguide
When you register the chassis, the Smart Software Manager issues an ID certificate for communication between
the firewall and the Smart Software Manager. It also assigns the firewall to the appropriate virtual account.
Until you register with the Smart Software Manager, you will not be able to make configuration changes to
features requiring special licenses, but operation is otherwise unaffected. Licensed features include:
• Essentials
• Security Contexts
• Carrier—Diameter, GTP/GPRS, M3UA, SCTP
• Strong Encryption (3DES/AES)—If your Smart Account is not authorized for strong encryption, but
Cisco has determined that you are allowed to use strong encryption, you can manually add a stong
encryption license to your account.
• Cisco Secure Client—Secure Client Advantage, Secure Client Premier, or Secure Client VPN Only.
The ASA includes 3DES capability by default for management access only, so you can connect to the Smart
Software Manager and also use ASDM immediately. You can also use SSH and SCP if you later configure
SSH access on the ASA. Other features that require strong encryption (such as VPN) must have Strong
Encryption enabled, which requires you to first register to the Smart Software Manager.
Note If you attempt to configure any features that can use strong encryption before you register—even if you only
configure weak encryption—then your HTTPS connection will be dropped on that interface, and you cannot
reconnect. The exception to this rule is if you are connected to a management-only interface, such as
Management 1/1. SSH is not affected. If you lose your HTTPS connection, you can connect to the console
port to reconfigure the ASA, connect to a management-only interface, or connect to an interface not configured
for a strong encryption feature.
When you request the registration token for the ASA from the Smart Software Manager, check the Allow
export-controlled functionality on the products registered with this token check box so that the full Strong
Encryption license is applied (your account must be qualified for its use). The Strong Encryption license is
automatically enabled for qualified customers when you apply the registration token on the chassis, so no
additional action is required. If your Smart Account is not authorized for strong encryption, but Cisco has
determined that you are allowed to use strong encryption, you can manually add a strong encryption license
to your account.
Procedure
Step 1 Make sure your Smart Licensing account contains the available licenses you need, including at a minimum
the Essentials license.
When you bought your device from Cisco or a reseller, your licenses should have been linked to your Smart
Software License account. However, if you need to add licenses yourself, use the Search All field on the
Cisco Commerce Workspace.
Figure 91: License Search
• Cisco Secure Client—See the Cisco Secure Client Ordering Guide. You do not enable this license directly
in the ASA.
Step 2 In the Cisco Smart Software Manager, request and copy a registration token for the virtual account to which
you want to add this device.
a) Click Inventory.
c) On the Create Registration Token dialog box enter the following settings, and then click Create Token:
• Description
• Expire After—Cisco recommends 30 days.
• Max. Number of Uses
• Allow export-controlled functionaility on the products registered with this token—Enables the
export-compliance flag.
Step 3 In ASDM, choose Configuration > Device Management > Licensing > Smart Licensing.
Step 4 Click Register.
You can optionally check the Force registration check box to register the ASA that is already registered, but
that might be out of sync with the Smart Software Manager. For example, use Force registration if the ASA
was accidentally removed from the Smart Software Manager.
The ASA registers with the Smart Software Manager using the pre-configured outside interface, and requests
authorization for the configured license entitlements. The Smart Software Manager also applies the Strong
Encryption (3DES/AES) license if your account allows. ASDM refreshes the page when the license status is
updated. You can also choose Monitoring > Properties > Smart License to check the license status,
particularly if the registration fails.
For example, to use the maximum of 100 contexts on the Secure Firewall 4215, enter 98 for the number
of contexts; this value is added to the default of 2.
Procedure
Step 1 Choose Wizards > Startup Wizard, and click the Modify existing configuration radio button.
Procedure
Step 1 Connect your management computer to the console port. Be sure to install any necessary serial drivers for
your operating system. Use the following serial settings:
• 9600 baud
• 8 data bits
• No parity
• 1 stop bit
You connect to the ASA CLI. There are no user credentials required for console access by default.
ciscoasa> enable
Password:
The enable password is not set. Please set it now.
Enter Password: ******
Repeat Password: ******
ciscoasa#
The enable password that you set on the ASA is also the FXOS admin user password if the ASA fails to boot
up, and you enter FXOS failsafe mode.
All non-configuration commands are available in privileged EXEC mode. You can also enter configuration
mode from privileged EXEC mode.
To exit privileged EXEC mode, enter the disable, exit, or quit command.
You can begin to configure the ASA from global configuration mode. To exit global configuration mode,
enter the exit, quit, or end command.
You are not prompted for user credentials. The current ASA username is passed through to FXOS, and no
additional login is required. To return to the ASA CLI, enter exit or type Ctrl-Shift-6, x.
Within FXOS, you can view user activity using the scope security/show audit-logs command.
Example:
What's Next?
• To continue configuring your ASA, see the documents available for your software version at Navigating
the Cisco ASA Series Documentation.
• For troubleshooting, see the FXOS troubleshooting guide.