Download Print this page
Cisco Firepower Management Center 750 Getting Started Manual
Cisco Firepower Management Center 750 Getting Started Manual

Cisco Firepower Management Center 750 Getting Started Manual

Firepower management center

Advertisement

Quick Links

Cisco Firepower Management Center 750,
1500, 2000, 3500, and 4000 Getting
Started Guide
Updated: April 6, 2020
This guide is organized as follows:
Package Contents
License Requirements
Installation and Initial Setup for Versions 6.5+
Installation and Initial Setup for Versions 5.4 - 6.4.x
Administration Recommendations
Redirecting Console Output
Setting Up Lights-Out Management
Restoring a Firepower Management Center to Factory Defaults
Preconfiguring Firepower Management Centers
Scrubbing the Hard Drive
Related Documentation
Package Contents
This section lists the items included with each model. Note that contents are subject to change, and your exact contents
might contain additional or fewer items.
Chassis Models
Firepower Management Center 750 (1U model). The following illustration of the rear of the chassis indicates
the location of the management interface on a MC750.
Figure 1
MC750 Chassis and Management Interface
1
Management interface
Cisco Firepower Management Center Getting Started Guide
Cisco Systems, Inc.
www.cisco.com
1

Advertisement

loading

Summary of Contents for Cisco Firepower Management Center 750

  • Page 1 Chassis Models  Firepower Management Center 750 (1U model). The following illustration of the rear of the chassis indicates the location of the management interface on a MC750. Figure 1 MC750 Chassis and Management Interface Management interface Cisco Systems, Inc.
  • Page 2 Figure 4 MC2000 and MC4000 Management interface Included Items  One power cord per power supply.  One straight-through Cat 5e Ethernet cables per chassis.  One rack-mounting kit per chassis. Cisco Firepower Management Center Getting Started Guide...
  • Page 3 Classic Licenses are sometimes referred to as Classic devices. If your FMC is using a Firepower Version previous to 6.5: Cisco recommends that you use the initial setup page to add the classic licenses your organization has purchased; see License Settings, page 15.
  • Page 4 Access the Firepower Management Center Using a Keyboard and Monitor, page Install the Appliance These instructions are an abbreviated version of the steps to physically install the appliance. For detailed instructions, see the Cisco Firepower Management Center 750, 1500, 2000, 3500, and 4000 Hardware Installation Guide. Procedure Mount the appliance in your rack using the mounting kit and its supplied instructions.
  • Page 5 Using the supplied Ethernet cable, connect the network interface on the preconfigured computer directly to the management interface on the appliance. Confirm that the link LED is on for both the network interface on the local computer and the management interface on the appliance. Cisco Firepower Management Center Getting Started Guide...
  • Page 6 Note that the password admin Admin123 is case-sensitive. What to Do Next  Complete the setup process using the procedures in Firepower Management Center Initial Configuration Wizard, page Cisco Firepower Management Center Getting Started Guide...
  • Page 7 Before using the Firepower Management Center, you must accept the EULA displayed on the second Initial Configuration Wizard screen. Read the EULA and click Accept to proceed. If you click Decline the wizard logs you out of the FMC. Cisco Firepower Management Center Getting Started Guide...
  • Page 8 You can accept the displayed gateway value if one is shown, or enter a new default gateway. Use dotted decimal form (for example, 192.168.0.1). DNS Group Choose an optional Domain Name Server group for the FMC. You can:  Accept the default value, Cisco Umbrella DNS Cisco Firepower Management Center Getting Started Guide...
  • Page 9 Firepower Management Center Configuration Guide for your version. This task only downloads software patch and hotfix updates for the version your appliances are currently running; it is your responsibility to install any updates this task downloads. See the Cisco Firepower Management Center Upgrade Guide for more information.
  • Page 10  Daily Intrusion Rule Update In Versions 6.6+, the FMC configures a daily automatic intrusion rule update from the Cisco support site. The FMC deploys automatic intrusion rule updates to affected managed devices when it next deploys affected policies. You can observe the status of this update using the web interface Message Center. You can see the...
  • Page 11 Install the Appliance These instructions are an abbreviated version of the steps to physically install the appliance. For detailed instructions, see the Cisco Firepower Management Center 1000, 2500, and 4500 Hardware Installation Guide. Procedure Mount the appliance in your rack using the mounting kit and its supplied instructions.
  • Page 12 For example: 10.2.2.20 The following prompt (appended with the current value) appears: Management netmask? Enter the netmask for the interface’s IP address or press Enter to accept the current value. For example: Cisco Firepower Management Center Getting Started Guide...
  • Page 13 Recurring Rule Update Imports, page 15 — Recurring Geolocation Updates, page 15 — Automatic Backups, page 15 — License Settings, page 15 — Device Registration, page 16 — End User License Agreement, page 17 Cisco Firepower Management Center Getting Started Guide...
  • Page 14 This account has Administrator privileges and cannot be admin deleted. Cisco recommends that you use a strong password that is at least eight alphanumeric characters of mixed case and includes at least one numeric character. Avoid using words that appear in a dictionary. Note: The admin accounts for accessing a Firepower Management Center using the shell versus accessing a Firepower Management Center using the web interface are not the same, and may use different passwords.
  • Page 15 Rule updates may also delete rules and provide new rule categories and system variables. If you plan to perform intrusion detection and prevention in your deployment, Cisco recommends that you Enable Recurring Rule Update Imports from the Support Site...
  • Page 16 Installation and Initial Setup for Versions 5.4 - 6.4.x Before you add a classic license to the Firepower Management Center, make sure you have the PAK provided by Cisco when you purchased the license. If you have a legacy, pre-Cisco license, contact Support. Note: You must enable Classic Licenses on your managed devices before you can use licensed features.
  • Page 17 Management Center. Administration Recommendations After you complete the initial setup process for an appliance and verify its success, Cisco recommends that you complete various administrative tasks that make your deployment easier to manage. You should also complete any tasks you skipped during the initial setup, such as device registration and licensing.
  • Page 18 Cisco recommends that you use the Management Center to apply the same system policy to itself and all the devices it manages.
  • Page 19 By default, Management Centers direct initialization status, or init, messages to the VGA port. If you want to use the physical serial port or SOL to access the console, Cisco recommends you redirect console output to the serial port after you complete the initial setup.
  • Page 20 The Firepower Management Center 2000 and 4000 introduced Cisco's Unified Computing System (UCS) platform into the Firepower System. These models do not support Cisco functionality that uses tools on the baseboard management controller (BMC), such as the UCS Manager or the Cisco Integrated Management Controller (CIMC), to make any configuration changes or firmware updates.
  • Page 21 IP address assigned to it by the DHCP server. Because of this, Cisco recommends you configure the Firepower 7050 BMC with a static IP address. Alternately, you can disconnect the network cable and reconnect it, or remove and restore power to the device to force renegotiation of the link.
  • Page 22 For more information, use your favorite search engine or see this site: http://ipmiutil.sourceforge.net/ Restoring a Firepower Management Center to Factory Defaults Cisco provides ISO images on its Support Site for restoring, or reimaging, Firepower Management Centers to their original factory settings. For more information, see the following sections: ...
  • Page 23 ISO image name. Configuration and Event Backup Guidelines Before you begin the restore process, Cisco recommends that you delete or move any backup files that reside on your appliance, then back up current event and configuration data to an external location.
  • Page 24 Serial Connection/Laptop You can use a rollover serial cable (also known as a NULL modem cable or a Cisco console cable) to connect a computer to the appliance. See the hardware specifications for your appliance to locate the serial port. To interact with the appliance, use terminal emulation software such as HyperTerminal or XModem.
  • Page 25 ISO image from the Support Site. The ISO image you should use to restore an appliance depends on when Cisco introduced support for that appliance model. Unless the ISO image was released with a minor version to accommodate a new appliance model, ISO images are usually associated with major versions of the system software (for example, 5.2 or 5.3).
  • Page 26 Starting the Restore Utility Using KVM or Physical Serial Port For Firepower devices, Cisco provides a restore utility on an internal flash drive. Note: Do not use a KVM console with USB mass storage to access the appliance for the initial setup because the appliance may attempt to use the mass storage device as a boot device.
  • Page 27 Unless this is the first time you have restored the appliance to this major version, the utility automatically loads the last restore configuration you used. To continue, confirm the settings in a series of pages until the “Cisco Firepower Appliance <Version> Configuration Menu” appears.
  • Page 28 Unless this is the first time you have restored the appliance to this major version, the utility automatically loads the last restore configuration you used. To continue, confirm the settings in a series of pages until the “Cisco Firepower Appliance <Version> Configuration Menu” appears.
  • Page 29 Downloading the ISO and Update Files and Mounting the Image, page However, Cisco recommends you double-check the settings in the restore configuration before proceeding. Note: To use a previously saved configuration, start with menu option...
  • Page 30 Obtaining the Restore ISO and Update Files, page 25), and stored on a web server, FTP server, or SCP-enabled host. The interactive menu prompts you to enter any necessary information to complete the download, as listed in the following table. Cisco Firepower Management Center Getting Started Guide...
  • Page 31 Table 4 on page -31. If your information was correct, the appliance connects to the server and displays a list of the Cisco ISO images in the location you specified. Select the ISO image you want to use.
  • Page 32 First Pass of Two (Changing Major Versions Only) When restoring an appliance to a different major version, a first pass by the restore utility updates the appliance’s operating system, and, if necessary, the restore utility itself. Cisco Firepower Management Center Getting Started Guide...
  • Page 33 If you are performing the second pass of a two-pass restore process, download and mount the ISO image again, as described in Downloading the ISO and Update Files and Mounting the Image, page From the restore utility main menu, select 5 Run the Install Cisco Firepower Management Center Getting Started Guide...
  • Page 34 The best time to save a restore configuration is after you provide the information listed above, but before you download and mount the ISO image. To save a restore configuration: From the restore utility main menu, select 6 Save Configuration The utility displays the settings in the configuration you are saving. Cisco Firepower Management Center Getting Started Guide...
  • Page 35 If you did not delete the appliance’s license and network settings, you can use a computer on your management network to browse directly to the appliance’s web interface to perform the setup. For more information: — For Versions 5.4.x - 6.4.x, see Initial Setup Page: Management Centers, page Cisco Firepower Management Center Getting Started Guide...
  • Page 36  If you deregistered the Firepower Management Center from the Cisco Smart Software Manager, register the appliance to the Cisco Smart Software Manager. Choose System > Licenses > Smart Licenses and click the register icon. After you complete the initial setup process: ...
  • Page 37 IP address assigned to it by the DHCP server. Because of this, Cisco recommends you configure the Firepower 7050 BMC with a static IP address. Alternately, you can disconnect the network cable and reconnect it, or remove and restore power to the device to force renegotiation of the link.
  • Page 38 Shut down and ship the appliance to the target location.  Deploy the appliances in the target locations. Note: Save all packing materials and include all reference material and power cords when repackaging the appliance. Cisco Firepower Management Center Getting Started Guide...
  • Page 39 IP address assigned to it by the DHCP server. Because of this, Cisco recommends you configure the 3D7050 BMC with a static IP address. Alternately, you can disconnect the network cable and reconnect it, or remove and restore power to the device to force renegotiation of the link.
  • Page 40 Deleting a License from a Management Center Use the following procedure if you need to delete a license for any reason. Keep in mind that, because Cisco generates licenses based on each Management Center’s unique license key, you cannot delete a license from one Management Center and reuse it on a different Management Center.
  • Page 41 The hard drive is scrubbed. The scrub process may take several hours to complete; larger drives take longer. Related Documentation For a complete list of the Cisco Firepower Management Center series documentation and where to find it, see the documentation roadmap at the following URL: https://www.cisco.com/c/en/us/support/security/defense-center/tsd-products-support-series-home.html...
  • Page 42 Related Documentation Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners.