EasyManua.ls Logo

Cisco 7010 - Communication Ports Requirements

Cisco 7010
204 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
1-14
Firepower 7000 and 8000 Series Installation Guide
Chapter 1 Introduction to the Firepower System
Security, Internet Access, and Communication Ports
Communication Ports Requirements
Firepower System appliances communicate using a two-way, SSL-encrypted communication channel,
which by default uses port 8305/tcp. The system requires this port remain open for basic intra-appliance
communication. Other open ports allow:
access to an appliance’s web interface
secure remote connections to an appliance
certain features of the system to access the local or Internet resources they need to function correctly
In general, feature-related ports remain closed until you enable or configure the associated feature. For
example, until you connect the Firepower Management Center to a User Agent, the agent
communications port (3306/tcp) remains closed. As another example, port 623/udp remains closed on
7000 and 8000 Series appliances until you enable LOM.
Caution Do not close an open port until you understand how this action will affect your deployment.
For example, closing port 25/tcp (SMTP) outbound on a managed device blocks the device from sending
email notifications for individual intrusion events (see the Firepower Management Center Configuration
Guide). As another example, you can disable access to a physical managed device’s web interface by
closing port 443/tcp (HTTPS), but this also prevents the device from submitting suspected malware files
to the cloud for dynamic analysis.
FireAMP integration receive endpoint-based (FireAMP) malware
events from the Collective Security Intelligence
Cloud cloud.
Management Center
intrusion rule, VDB, and GeoDB
updates
download or schedule the download of a
intrusion rule, GeoDB, or VDB update directly
to an appliance.
Management Center
network-based AMP perform malware cloud lookups. Management Center
RSS feed dashboard widget download RSS feed data from an external
source, including Cisco.
Any except virtual devices and
ASA FirePOWER
Security Intelligence filtering download Security Intelligence feed data from
an external source, including the Firepower
System Intelligence Feed.
Management Center
system software updates download or schedule the download of a system
update directly to an appliance.
Any except virtual devices and
ASA FirePOWER
URL Filtering download cloud-based URL category and
reputation data for access control, and perform
lookups for uncategorized URLs.
Management Center
whois request whois information for an external host. Any except virtual devices and
ASA FirePOWER
Table 1-6 Firepower System Feature Internet Access Requirements (continued)
Feature Internet access is required to... Appliances

Table of Contents

Related product manuals