Step 4 Check the Status LED on the back of the device; after it is solid green, the system has passed power-on
diagnostics.
When the switch is toggled from ON to OFF, it may take several seconds for the system to eventually
power off. During this time, the Power LED on the front of the chassis blinks green. Do not remove
the power until the Power LED is completely off.
Note
Step 5 Observe the Status LED on the back the device; when the device is booting correctly, the Status LED flashes
fast green.
If there is a problem, the Status LED flashes fast amber. If this happens, call your IT department.
Step 6 Observe the Status LED on the back; when the device connects to the Cisco cloud, the Status LED slowly
flashes green.
If there is a problem, the Status LED flashes amber and green, and the device did not reach the Cisco Cloud.
If this happens, make sure that your network cable is connected to the Ethernet 1/1 interface and to your WAN
modem. If after adjusting the network cable, the device does not reach the Cisco cloud after about 10 more
minutes, call your IT department.
What to do next
• Communicate with your IT department to confirm your onboarding timeline and activities. You should
have a communication plan in place with the CDO administrator at your central headquarters.
• After you complete this task, your CDO administrator will be able to configure and manage the Firepower
device remotely. You're done.
CDO Administrator Onboarding and Management
After the remote branch administrator sends the serial number information to the central headquarters, the
CDO administrator onboards the FTD to CDO. When you onboard the firewall in CDO using the serial number,
the firewall is associated with your CDO tenant in the Cisco cloud.
After the branch office administrator cables and powers on the FTD, the firewall connects to the Cisco cloud,
and CDO syncs the firewall's configuration automatically.
You can then license your firewall, and configure and manage your firewall with CDO.
Log Into CDO
CDO uses Cisco Secure Sign-On as its identity provider and Duo Security for multi-factor authentication
(MFA). CDO requires MFA which provides an added layer of security in protecting your user identity.
Cisco Firepower 1100 Getting Started Guide
10
Firepower Threat Defense Deployment with CDO and Low-Touch Provisioning
CDO Administrator Onboarding and Management