
a) Under
System Settings
, click
Cloud Services
.
b) Click
Get Started
in the
Cisco Defense Orchestrator
group.
c) In the
Region
field, choose the Cisco cloud region to which your tenant is assigned:
• Choose
US
if you log in to
defenseorchestrator.com
.
• Choose
EU
if you log in to
defenseorchestrator.eu
(Version 6.5).
• Choose
APJ
if you log in to
apj.cdo.cisco.com
(Version 6.5).
d) In the
Registration Key
field, paste the registration key that you generated in CDO.
e) Click
Register
and then
Accept
the Cisco Disclosure. FDM sends the registration request to CDO.
Step 9
Return to CDO. In the
Smart License
area, apply your Smart License to the FTD device and click
Next
.
For more information, see
Configure Licensing, on page 155
. Click
Skip
to continue the onboarding with a
90-day evaluation license.
Step 10
In the
Done
area, click
Go to devices
to view the onboarded device.
Step 11
On
Devices & Services
, observe that the device status progresses from
"Unprovisioned"
to
"Locating"
to
"Syncing"
to
"Synced"
.
Onboard an FTD Using Credentials and IP Address
You can onboard an FTD using login credentials (username and password) and the IP address or FQDN.
However, we recommend that you onboard your device with a registration key because it is not dependent
on a static IP address and does not require an on-premises SDC; see
Onboard an FTD with a Registration Key
Before you begin
• You can use this method to onboard your device to the US, EU, or APJ regions.
• Your device MUST be managed by Firepower Device Manager (FDM). Make sure that there are no
pending changes waiting on the device.
• Your device can use either a 90-day evaluation license or it can be smart-licensed. You will not need to
unregister licenses installed on the device from the Cisco Smart Software Manager.
• We recommend that you deploy an on-premises Secure Device Connector (SDC) connected to the inside
interface. Alternatively, if you want to use a cloud SDC through the outside interface, you need to allow
HTTPS access on outside (FDM
System Settings
>
Management Access
), which is not recommended
for security reasons. For more information about the SDC, see
How Cisco Defense Orchestrator Works
with Firepower Threat Defense, on page 128
.
• Configure the interface used for CDO management/SDC communication with a static IP address, or use
Dynamic DNS (DDNS) to maintain a consistent FQDN. You can configure DDNS in FDM.
Cisco Firepower 2100 Getting Started Guide
149
Firepower Threat Defense Deployment with CDO
Onboard an FTD Using Credentials and IP Address
Summary of Contents for Firepower 2100
Page 2: ......
Page 166: ......
Page 191: ...Cisco Firepower 2100 Getting Started Guide 189 ASA Deployment with ASDM End to End Procedure ...
Page 221: ... 2021 Cisco Systems Inc All rights reserved ...
Page 222: ......