
C H A P T E R
6
Firepower Threat Defense Deployment with CDO
Is This Chapter for You?
This chapter explains how to onboard your Firepower Threat Defense (FTD) device to Cisco Defense
Orchestrator (CDO) using CDO's onboarding wizard. Before you onboard your FTD device, you need to
complete the initial system configuration using the local Firepower Device Manager (FDM), which is hosted
directly on the device.
CDO is a cloud-based multi-device manager that facilitates management of security policies in highly distributed
environments to achieve consistent policy implementation. CDO helps you optimize your security policies
by identifying inconsistencies with them and by giving you tools to fix them. CDO gives you ways to share
objects and policies, as well as make configuration templates, to promote policy consistency across devices.
This document assumes the Firepower 2100 hardware has a pre-installed FTD image on it. The Firepower
2100 hardware can run either FTD software or ASA software. Switching between FTD and ASA requires
you to reimage the device. See
Reimage the Cisco ASA or Firepower Threat Defense Device
.
Note
The Firepower 2100 runs an underlying operating system called the Firepower eXtensible Operating System
(FXOS). The Firepower 2100 does not support the FXOS Firepower Chassis Manager; only a limited CLI is
supported for troubleshooting purposes. See the
for more information.
Privacy Collection Statement
—The Firepower 1100 Series does not require or actively collect
personally-identifiable information. However, you can use personally-identifiable information in the
configuration, for example for usernames. In this case, an administrator might be able to see this information
when working with the configuration or when using SNMP.
•
End-to-End Procedure, on page 126
•
How Cisco Defense Orchestrator Works with Firepower Threat Defense, on page 128
•
Review the Network Deployment and Default Configuration, on page 129
•
•
Power on the Device, on page 135
•
(Optional) Change Management Network Settings at the CLI, on page 136
•
•
Complete the Initial Configuration, on page 139
•
•
Onboard the FTD to CDO, on page 144
•
Configure the Device in CDO, on page 151
Cisco Firepower 2100 Getting Started Guide
125
Содержание Firepower 2100
Страница 2: ......
Страница 30: ...Cisco Firepower 2100 Getting Started Guide 28 Firepower Threat Defense Deployment with FDM What s Next ...
Страница 64: ...Cisco Firepower 2100 Getting Started Guide 62 Firepower Threat Defense Deployment with FMC What s Next ...
Страница 108: ...Cisco Firepower 2100 Getting Started Guide 106 Firepower Threat Defense Deployment with a Remote FMC What s Next ...
Страница 164: ...Cisco Firepower 2100 Getting Started Guide 162 Firepower Threat Defense Deployment with CDO What s Next ...
Страница 166: ......
Страница 191: ...Cisco Firepower 2100 Getting Started Guide 189 ASA Deployment with ASDM End to End Procedure ...
Страница 220: ...Cisco Firepower 2100 Getting Started Guide 218 ASA Deployment with ASDM History for the Firepower 2100 in Platform Mode ...
Страница 221: ... 2021 Cisco Systems Inc All rights reserved ...
Страница 222: ......