Complete the Threat Defense Initial Configuration, on page 15.CLI or Device
Manager
Log Into the Management Center, on page 22.Management Center
Obtain Licenses for the Management Center, on page 23: Buy feature licenses.Cisco Commerce
Workspace
Obtain Licenses for the Management Center, on page 23: Generate a license
token for the management center.
Smart Software
Manager
Obtain Licenses for the Management Center, on page 23: Register the
management center with the Smart Licensing server.
Management Center
Register the Threat Defense with the Management Center, on page 24.Management Center
Configure a Basic Security Policy, on page 27.Management Center
Review the Network Deployment
The dedicated Management 1/1 interface is a special interface with its own network settings. By default, the
Management 1/1 interface is enabled and configured as a DHCP client. If your network does not include a
DHCP server, you can set the Management interface to use a static IP address during initial setup at the console
port. You can configure other interfaces after you connect the threat defense to the management center.
In 6.5 and earlier, the Management interface is configured with an IP address (192.168.45.45).
Note
See the following sample network deployments for ideas on how to place your threat defense device in your
network.
Separate Management Network
Both the management center and threat defense require internet access from Management for licensing and
updates.
The following figure shows a possible network deployment for the Firepower 1100 where the management
center and management computer connect to the management network. The management network has a path
to the internet for licensing and updates.
Cisco Firepower 1100 Getting Started Guide
8
Threat Defense Deployment with the Management Center
Review the Network Deployment