5-9
Firepower 7000 and 8000 Series Installation Guide
Chapter 5 Setting Up Firepower Managed Devices
Next Steps
Note that security zones are a Firepower Management Center-level configuration which the system does
not create until you actually register the device to the Firepower Management Center. Upon registration,
if the appropriate zone (Internal, External, or Passive) already exists on the Firepower Management
Center, the registration process adds the listed interfaces to the existing zone. If the zone does not exist,
the system creates it and adds the interfaces. For detailed information on interfaces, inline sets, and
security zones, see the
Firepower Management Center Configuration Guide
.
Automatic Backups
The device provides a mechanism for archiving data so that configuration and event data can be restored
in case of failure. As part of the initial setup, you can
Enable Automatic Backups
.
Enabling this setting creates a scheduled task that creates a weekly backup of the configurations on the
device.
End User License Agreement
Read the EULA carefully and, if you agree to abide by its provisions, select the check box. Make sure
that all the information you provided is correct, and click
Apply
. The device is configured according to
your selections and is ready to be added to its managing Firepower Management Center.
Next Steps
After you complete the initial setup process for an appliance and verify its success, Cisco recommends
that you complete various administrative tasks that make your deployment easier to manage. You should
also complete any tasks you skipped during the initial setup, such as device registration and licensing.
For detailed information on any the tasks described in the following sections, as well as information on
how you can begin to configure your deployment, see the
Firepower Management Center Configuration
Guide
.
Tip
If you want to use a serial or LOM/SOL connection to access your appliance’s console, you should
redirect console output; see
Testing an Inline Bypass Interface Installation, page 4-24
. If you want to use
LOM specifically, you must enable the feature as well as enable at least one LOM user; see
.
Table 5-1
Initial Configurations Based on Detection Mode
Detection Mode
Security Zones
Inline Sets
Interfaces
Inline
Internal and
External
Default Inline
Set
first pair added to Default Inline Set—one
to the Internal and one to the External zone
Passive
Passive
none
first pair assigned to Passive zone
Access Control
none
none
none
Network Discovery
Passive
none
first pair assigned to Passive zone