EasyManuals Logo

Cisco Firepower 1010 User Manual

Cisco Firepower 1010
190 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #113 background imageLoading...
Page #113 background image
Intrusion—Use the intrusion policies to inspect for known threats. Although you apply intrusion policies
using access control rules, you can edit the intrusion policies to selectively enable or disable specific
intrusion rules.
The following example shows how to allow traffic between the inside-zone and dmz-zone in the access control
policy. In this example, no options are set on any of the other tabs except for Logging, where At End of
Connection is selected.
Figure 34: Access Control Policy
Step 6 Choose Device, then click View Configuration in the Updates group and configure the update schedules for
the system databases.
If you are using intrusion policies, set up regular updates for the Rules and VDB databases. If you use Security
Intelligence feeds, set an update schedule for them. If you use geolocation in any security policies as matching
criteria, set an update schedule for that database.
Step 7 Click the Deploy button in the menu, then click the Deploy Now button ( ), to deploy your changes to
the device.
Changes are not active on the device until you deploy them.
Access the Threat Defense and FXOS CLI
Use the command-line interface (CLI) to set up the system and do basic system troubleshooting. You cannot
configure policies through a CLI session. You can access the CLI by connecting to the console port.
You can also access the FXOS CLI for troubleshooting purposes.
You can alternatively SSH to the Management interface of the threat defense device. Unlike a console session,
the SSH session defaults to the threat defense CLI, from which you can connect to the FXOS CLI using the
connect fxos command. You can later connect to the address on a data interface if you open the interface for
SSH connections. SSH access to data interfaces is disabled by default. This procedure describes console port
access, which defaults to the FXOS CLI.
Note
Cisco Firepower 1010 Getting Started Guide
111
Threat Defense Deployment with the Device Manager
Access the Threat Defense and FXOS CLI

Table of Contents

Other manuals for Cisco Firepower 1010

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 1010 and is the answer not in the manual?

Cisco Firepower 1010 Specifications

General IconGeneral
VPN Throughput500 Mbps
Concurrent Sessions100, 000
Maximum Concurrent Sessions200, 000
Ports8 x 1 GE
Humidity10% to 90% non-condensing
Form FactorDesktop
Flash Memory8 GB
Interfaces8 x RJ-45
Power SupplyInternal
Dimensions (H x W x D)4.44 x 21.59 x 17.27 cm
Operating Temperature32°F to 104°F (0°C to 40°C)
Storage Temperature-20 to 70°C
Memory4 GB

Related product manuals