EasyManua.ls Logo

Cisco Firepower 1100

Cisco Firepower 1100
178 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
In an HA environment, when both the management centers are behind a NAT, you can register
the threat defense without a host IP or name in the primary management center. However, for
registering the threat defense in a secondary management center, you must provide the IP
address or hostname for the threat defense.
Note
• Display Name—Enter the name for the threat defense as you want it to display in the management center.
• Registration Key—Enter the same registration key that you specified in the threat defense initial
configuration.
• Domain—Assign the device to a leaf domain if you have a multidomain environment.
• Group—Assign it to a device group if you are using groups.
• Access Control Policy—Choose an initial policy. Unless you already have a customized policy you
know you need to use, choose Create new policy, and choose Block all traffic. You can change this
later to allow traffic; see Allow Traffic from Inside to Outside, on page 35.
Figure 19: New Policy
• Smart Licensing—Assign the Smart Licenses you need for the features you want to deploy: Malware
(if you intend to use malware inspection), Threat (if you intend to use intrusion prevention), and URL
(if you intend to implement category-based URL filtering). Note: You can apply an Secure Client remote
access VPN license after you add the device, from the System > Licenses > Smart Licenses page.
• Unique NAT ID—Specify the NAT ID that you specified in the threat defense initial configuration.
• Transfer Packets—Allow the device to transfer packets to the management center. When events like
IPS or Snort are triggered with this option enabled, the device sends event metadata information and
packet data to the management center for inspection. If you disable it, only event information will be
sent to the management center, but packet data is not sent.
Step 3 Click Register, and confirm a successful registration.
Cisco Firepower 1100 Getting Started Guide
62
Threat Defense Deployment with a Remote Management Center
Register the Threat Defense with the Management Center

Table of Contents

Other manuals for Cisco Firepower 1100

Related product manuals