C H A P T E R
2
Threat Defense Deployment with the
Management Center
Is This Chapter for You?
To see all available operating systems and managers, see
Which Operating System and Manager is Right for
. This chapter applies to the threat defense with the management center.
This chapter explains how to complete the initial configuration of your threat defense and how to register the
firewall to the management center located on your management network. For remote branch deployment,
where the management center resides at a central headquarters, see
Threat Defense Deployment with a Remote
.
In a typical deployment on a large network, you install multiple managed devices on network segments. Each
device controls, inspects, monitors, and analyzes traffic, and then reports to a managing management center.
The management center provides a centralized management console with a web interface that you can use to
perform administrative, management, analysis, and reporting tasks in service to securing your local network.
About the Firewall
The hardware can run either threat defense software or ASA software. Switching between threat defense and
ASA requires you to reimage the device. You should also reimage if you need a different software version
than is currently installed. See
Reimage the Cisco ASA or Firepower Threat Defense Device
.
The firewall runs an underlying operating system called the Secure Firewall eXtensible Operating System
(FXOS). The firewall does not support the FXOS Secure Firewall chassis manager; only a limited CLI is
supported for troubleshooting purposes. See the
Cisco FXOS Troubleshooting Guide for the Firepower
1000/2100 Series Running Firepower Threat Defense
for more information.
Privacy Collection Statement
—The firewall does not require or actively collect personally-identifiable
information. However, you can use personally-identifiable information in the configuration, for example for
usernames. In this case, an administrator might be able to see this information when working with the
configuration or when using SNMP.
•
•
End-to-End Procedure, on page 6
•
Review the Network Deployment, on page 8
•
Cable the Device (6.5 and Later), on page 10
•
Cable the Device (6.4), on page 12
•
Power On the Firewall, on page 13
•
(Optional) Check the Software and Install a New Version, on page 13
Cisco Firepower 1010 Getting Started Guide
5
Summary of Contents for Firepower 1010
Page 2: ......
Page 168: ...Cisco Firepower 1010 Getting Started Guide 166 Threat Defense Deployment with CDO What s Next ...
Page 189: ... 2022 Cisco Systems Inc All rights reserved ...
Page 190: ......