EasyManua.ls Logo

Cisco Firepower 1010 User Manual

Cisco Firepower 1010
190 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Cisco Firepower 1010 Getting Started Guide
First Published: 2019-06-13
Last Modified: 2022-02-28
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883

Table of Contents

Other manuals for Cisco Firepower 1010

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 1010 and is the answer not in the manual?

Cisco Firepower 1010 Specifications

General IconGeneral
VPN Throughput500 Mbps
Concurrent Sessions100, 000
Maximum Concurrent Sessions200, 000
Ports8 x 1 GE
Humidity10% to 90% non-condensing
Form FactorDesktop
Flash Memory8 GB
Interfaces8 x RJ-45
Power SupplyInternal
Dimensions (H x W x D)4.44 x 21.59 x 17.27 cm
Operating Temperature32°F to 104°F (0°C to 40°C)
Storage Temperature-20 to 70°C
Memory4 GB

Summary

Which Operating System and Manager is Right for You?

Operating Systems

Explains the choice between Secure Firewall ASA and Secure Firewall Threat Defense operating systems.

Threat Defense Managers

Details various management options for Threat Defense, including FMC, FDM, and CDO.

ASA Managers

Lists management options for ASA, including ASDM, CLI, CDO, and CSM.

Threat Defense Deployment with the Management Center

Is This Chapter for You?

Helps determine if this chapter is relevant to the user's needs.

About the Firewall

Provides background information on the firewall hardware and operating system.

Privacy Collection Statement

Details privacy information regarding data collection by the firewall.

Before You Start

Lists prerequisites and initial steps before starting the deployment process.

End-to-End Procedure

Outlines the sequential tasks for deploying threat defense with a management center.

Power On the Firewall

Step-by-step instructions for powering on the firewall.

(Optional) Check the Software and Install a New Version

Guide to checking, installing, or upgrading the software version.

Complete the Threat Defense Initial Configuration

Complete the Threat Defense Initial Configuration Using the Device Manager

Steps to perform initial setup using the web-based device manager.

Complete the Threat Defense Initial Configuration Using the CLI

Steps to perform initial setup using the command-line interface.

Power Off the Firewall

Power Off the Firewall Using the Management Center

Steps to shut down the firewall using the management center interface.

Power Off the Device at the CLI

Steps to shut down the firewall using the command-line interface.

Threat Defense Deployment with a Remote Management Center

Is This Chapter for You?

Helps determine if this chapter is relevant to the user's needs.

About the Firewall

Provides background information on the firewall hardware and operating system.

Privacy Collection Statement

Details privacy information regarding data collection by the firewall.

How Remote Management Works

Explains how remote management connectivity is established and its limitations.

Before You Start

Lists prerequisites for remote deployment.

End-to-End Procedure

Outlines the sequential tasks for remote deployment.

Central Administrator Pre-Configuration

Steps for pre-configuring the threat defense before sending it to the branch office.

(Optional) Check the Software and Install a New Version

Guide to checking, installing, or upgrading the software version.

Pre-Configuration Using the Device Manager

Before you begin

Prerequisites for pre-configuration using the device manager.

Procedure

Step-by-step instructions for pre-configuration using the device manager.

Pre-Configuration Using the CLI

Before you begin

Prerequisites for pre-configuration using the CLI.

Procedure

Step-by-step instructions for pre-configuration using the CLI.

Threat Defense Deployment with CDO

Is This Chapter for You?

Helps determine if this chapter is relevant to the user's needs.

About Threat Defense Management by CDO

Overview of managing threat defense using Cisco Defense Orchestrator (CDO).

About the Firewall

Provides background information on the firewall hardware and operating system.

Privacy Collection Statement

Details privacy information regarding data collection by the firewall.

End-to-End Procedure: Low-Touch Provisioning

Cisco Commerce Workspace

Steps for obtaining licenses via Cisco Commerce Workspace for CDO deployment.

End-to-End Procedure: Onboarding Wizard

CLI

Optional step to check software and install new version before onboarding.

CDO

Steps for logging into CDO and onboarding the device.

Branch Office Tasks

Tasks for the branch office administrator during onboarding.

Central Administrator Pre-Configuration

Obtain Licenses

Procedures for obtaining feature licenses for the firewall.

(Optional) Check the Software and Install a New Version

Guide to checking, installing, or upgrading the software version.

Log Into CDO

Create a New Cisco Secure Sign-On Account

Steps to create a new Cisco Secure Sign-On account for CDO access.

Deploy the Firewall With Low-Touch Provisioning

Provide the Firewall Serial Number to the Central Administrator

Instructions for providing the firewall serial number for low-touch provisioning.

Cable the Firewall

Steps for cabling the firewall for CDO management.

Power On the Firewall

Onboard a Device with the Onboarding Wizard

Procedure

Step-by-step guide to onboarding the device using the CDO wizard.

Perform Initial Configuration

Perform Initial Configuration Using the CLI

Steps for initial configuration using the command-line interface.

Perform Initial Configuration Using the Device Manager

Steps for initial configuration using the web-based device manager.

Configure a Basic Security Policy

Configure Interfaces

Steps to configure firewall interfaces for basic security policies.

Configure the DHCP Server

Steps to enable and configure the DHCP server on the inside interface.

Configure NAT

Steps to configure interface PAT for traffic from inside to outside.

Allow Traffic from Inside to Outside

Steps to create an access control rule allowing inside to outside traffic.

Configure SSH on the Manager Access Data Interface

Steps to enable SSH access on data interfaces for management.

Deploy the Configuration

Procedure

Steps to deploy configuration changes to the threat defense devices.

Troubleshooting and Maintenance

Access the Threat Defense and FXOS CLI

Guide to accessing the command-line interface for troubleshooting.

Troubleshoot Management Connectivity on a Data Interface

Steps to troubleshoot issues with management connectivity over data interfaces.

Roll Back the Configuration if CDO Loses Connectivity

Procedure

Steps to roll back the configuration to restore CDO connectivity.

ASA Deployment with ASDM

Is This Chapter for You?

Helps determine if this chapter is relevant to ASA deployment using ASDM.

About the ASA

Overview of ASA features and management options.

Unsupported Features

Lists ASA features not supported on the Firepower 1010.

Migrating an ASA 5500-X Configuration

Guidance on copying and adapting ASA 5500-X configurations.

End-to-End Procedure

Outlines the sequential tasks for deploying and configuring the ASA.

Log Into the ASDM

Before you begin

Prerequisites for launching ASDM.

Procedure

Step-by-step instructions for launching ASDM.

Configure Licensing

Before you begin

Prerequisites for configuring Smart Licensing for the ASA.

Configure the ASA

Procedure

Steps to configure the ASA using wizards or manual settings.

Access the ASA and FXOS CLI

Procedure

Steps to access the ASA and FXOS command-line interfaces.

What's Next?

Related product manuals