Cisco Firepower 1100 Getting Started Manual page 64

Hide thumbs Also See for Firepower 1100:
Table of Contents

Advertisement

Register the Threat Defense with the Management Center
Note
• Display Name—Enter the name for the threat defense as you want it to display in the management center.
• Registration Key—Enter the same registration key that you specified in the threat defense initial
configuration.
• Domain—Assign the device to a leaf domain if you have a multidomain environment.
• Group—Assign it to a device group if you are using groups.
• Access Control Policy—Choose an initial policy. Unless you already have a customized policy you
know you need to use, choose Create new policy, and choose Block all traffic. You can change this
later to allow traffic; see
Figure 19: New Policy
• Smart Licensing—Assign the Smart Licenses you need for the features you want to deploy: Malware
(if you intend to use malware inspection), Threat (if you intend to use intrusion prevention), and URL
(if you intend to implement category-based URL filtering). Note: You can apply an Secure Client remote
access VPN license after you add the device, from the System > Licenses > Smart Licenses page.
• Unique NAT ID—Specify the NAT ID that you specified in the threat defense initial configuration.
• Transfer Packets—Allow the device to transfer packets to the management center. When events like
IPS or Snort are triggered with this option enabled, the device sends event metadata information and
packet data to the management center for inspection. If you disable it, only event information will be
sent to the management center, but packet data is not sent.
Step 3
Click Register, and confirm a successful registration.
Cisco Firepower 1100 Getting Started Guide
62
In an HA environment, when both the management centers are behind a NAT, you can register
the threat defense without a host IP or name in the primary management center. However, for
registering the threat defense in a secondary management center, you must provide the IP
address or hostname for the threat defense.
Allow Traffic from Inside to Outside, on page
Threat Defense Deployment with a Remote Management Center
35.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Firepower 2100

Table of Contents