EasyManuals Logo

Cisco Firepower 1100 User Manual

Cisco Firepower 1100
176 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #59 background imageLoading...
Page #59 background image
Security Intelligence—Use the Security Intelligence policy to quickly drop connections from or to
blacklisted IP addresses or URLs. By blacklisting known bad sites, you do not need to account for them
in your access control policy. Cisco provides regularly updated feeds of known bad addresses and URLs
so that the Security Intelligence blacklist updates dynamically. Using feeds, you do not need to edit the
policy to add or remove items in the blacklist.
Access Control—Use the access control policy to determine which connections are allowed on the
network. You can filter by security zone, IP address, protocol, port, application, URL, user or user group.
You also apply intrusion and file (malware) policies using access control rules. Use this policy to
implement URL filtering.
The following example shows how to allow traffic between the inside-zone and dmz-zone in the access control
policy. In this example, no options are set on any of the other tabs except for Logging, where At End of
Connection is selected.
Figure 25: Access Control Policy
Step 9 Locate the Security Database Updates section to create a scheduled task to check and update the security
databases for an FTD device.
When you onboard an FTD device to CDO, part of the onboarding process allows you to Enable scheduled
recurring updates for databases. This option is checked by default. When enabled, CDO immediately checks
for and applies any security updates as well as automatically schedules the device to check for additional
updates. You are able to modify the date and time of the scheduled task after the device is onboarded.
If you are using intrusion policies, set up regular updates for the Rules and VDB databases. If you use Security
Intelligence feeds, set an update schedule for them. If you use geolocation in any security policies as matching
criteria, set an update schedule for that database.
Step 10 Click the Preview and Deploy button in the menu, then click the Deploy Now button, to deploy your changes
to the device.
Changes are not active on the device until you deploy them.
Access the FTD and FXOS CLI
Use the command-line interface (CLI) to set up the system and do basic system troubleshooting. You cannot
configure policies through a CLI session. You can access the CLI by connecting to the console port.
You can also access the FXOS CLI for troubleshooting purposes.
Cisco Firepower 1100 Getting Started Guide
57
Firepower Threat Defense Deployment with CDO
Access the FTD and FXOS CLI

Table of Contents

Other manuals for Cisco Firepower 1100

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 1100 and is the answer not in the manual?

Cisco Firepower 1100 Specifications

General IconGeneral
BrandCisco
ModelFirepower 1100
CategoryFirewall
LanguageEnglish

Related product manuals