EasyManuals Logo
Home>Cisco>Firewall>Firepower 1010

Cisco Firepower 1010 User Manual

Cisco Firepower 1010
190 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #49 background imageLoading...
Page #49 background image
CHAPTER 3
Threat Defense Deployment with a Remote
Management Center
Is This Chapter for You?
To see all available operating systems and managers, see Which Operating System and Manager is Right for
You?, on page 1. This chapter applies to the threat defense at a remote branch office using the management
center at a central headquarters.
Each threat defense controls, inspects, monitors, and analyzes traffic, and then reports to a managing
management center. The management center provides a centralized management console with a web interface
that you can use to perform administrative, management, analysis, and reporting tasks in service to securing
your local network.
An administrator at the central headquarters pre-configures the threat defense at the CLI or using the
device manager, and then sends the threat defense to the remote branch office.
The branch office administrator cables and powers on the threat defense.
The central administrator completes configuration of the threat defense using the management center.
Remote branch deployment requires version 6.7 or later.
Note
About the Firewall
The hardware can run either threat defense software or ASA software. Switching between threat defense and
ASA requires you to reimage the device. You should also reimage if you need a different software version
than is currently installed. See Reimage the Cisco ASA or Firepower Threat Defense Device.
The firewall runs an underlying operating system called the Secure Firewall eXtensible Operating System
(FXOS). The firewall does not support the FXOS Secure Firewall chassis manager; only a limited CLI is
supported for troubleshooting purposes. See the Cisco FXOS Troubleshooting Guide for the Firepower
1000/2100 Series Running Firepower Threat Defense for more information.
Privacy Collection Statement—The firewall does not require or actively collect personally-identifiable
information. However, you can use personally-identifiable information in the configuration, for example for
usernames. In this case, an administrator might be able to see this information when working with the
configuration or when using SNMP.
How Remote Management Works, on page 48
Cisco Firepower 1010 Getting Started Guide
47

Table of Contents

Other manuals for Cisco Firepower 1010

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 1010 and is the answer not in the manual?

Cisco Firepower 1010 Specifications

General IconGeneral
BrandCisco
ModelFirepower 1010
CategoryFirewall
LanguageEnglish

Related product manuals