Download Print this page

Advertisement

Quick Links

Cisco Secure Firewall Management Center 1700,
2700, and 4700 Getting Started Guide
First Published: 2023-11-28
Last Modified: 2023-11-28
About the Secure Firewall Management Center 1700, 2700, and 4700
The management center provides centralized, integrated, and streamlined management of threat defense
devices. It also provides application control, intrusion prevention system (IPS), URL filtering, and malware
protection functions. In a typical deployment on a large network, you install multiple managed threat defense
devices on network segments. Each device controls, inspects, monitors, and analyzes traffic, and then reports
to a management center.
The Secure Firewall Management Center 1700, 2700, and 4700 appliances provide significant performance
and efficiency.
This doc explains how to complete the cabling and the initial configuration of the management center.
Before You Begin
Install the management center. For more information, see the
1700, 2700 and 4700 Hardware Installation
For a complete list of the Cisco Secure Firewall series documentation and where to find it, see the
roadmap.
End-to-End Procedure
The following flowchart illustrates the tasks to deploy and configure the management center.
Guide.
Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide
Cisco Secure Firewall Management Center
documentation
1

Advertisement

loading

Summary of Contents for Cisco Secure Firewall Management Center 1700

  • Page 1 Install the management center. For more information, see the Cisco Secure Firewall Management Center 1700, 2700 and 4700 Hardware Installation Guide. For a complete list of the Cisco Secure Firewall series documentation and where to find it, see the documentation roadmap. End-to-End Procedure The following flowchart illustrates the tasks to deploy and configure the management center.
  • Page 2 Before you deploy the management center, you need information about the environment in which it operates. The following figure shows a typical network deployment for a management center. Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 3 If you deploy a management center in an air-gapped environment, see the Cisco Secure Firewall Management Center Administration Guide for your version for alternative methods you can use to support Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 4 • Connect the management center CIMC port to a local network reachable from a local computer where you can run an IPMI utility for Lights-Out Management. To use this connection see Set Up Light-Out Management, on page Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 5 Rack-mount the appliance as described in the Cisco Secure Firewall Management Center 1700, 2700, and 4700 Hardware Installation Guide. If you plan to cable the appliance using the console port and a local computer, redirect the console output to the console port.
  • Page 6 Power on the Management Center The management center 1700, 2700, and 4700 appliances use 1050-W AC power supplies. For more information about the power supplies and the supported power cords, see the Cisco Firepower Management Center 1700, 2700, and 4700 Hardware Installation Guide.
  • Page 7 Figure 2: Power Button and Power Supply Status LED Access the CLI or the Linux Shell on the Management Center Caution We strongly recommend that you do not use the Linux shell unless directed by Cisco TAC or explicit instructions in the user documentation. Before you begin Establish a direct physical connection with the management center using the serial port, a keyboard and monitor, or establish an SSH session with the management center interface.
  • Page 8 • An IPv4 management IP address • A network mask and a default gateway (if not using DHCP) • Connect to the management center using one of three methods: Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 9 To recover from a DHCP address change, connect to the management center (using the hostname or the new IP address) and navigate to System ( ) > Configuration > Management Interfaces to reset the network. Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 10 If your networking information has changed, you will need to reconnect. Updated network configuration. Step 8 After you accept the settings, you can enter exit to exit the management center CLI. Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 11 • Choose Physical Serial Port to use the appliance’s serial port. Step 4 Click Save. Redirect the Console Output Using the CLI Before you begin Complete the initial setup process of the management center. Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 12 Log in to the management center CLI as the admin user. Step 2 In the console, choose Power > Reset System. The following messages appear in the console: Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 13 At the shell prompt, enter the sudo usertool.pl -p "admin password" command. Here password is the new password for the web interface admin user. In the following example, the password is SourcefireM1!. Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 14 The management center System > Tools > center software updates automatically schedules a Scheduling weekly task to download the latest software for the management center and its managed devices. Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 15 Chrome), or set the browser to incognito or private mode. Procedure Step 1 Log in to your management center. Step 2 In the Username and Password fields, enter your username and password. Step 3 Click Login. Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 16 The hostname of the device is the fully qualified name or the name that resolves through the local DNS to a valid IP address. Use a hostname rather than an IP address if your network uses DHCP to assign IP addresses. Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 17 LOM. When restoring a device to factory settings using LOM, if you do not have physical access to the appliance and you delete the license and network settings, you cannot access the appliance after the restore. Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 18 (any location other than the staging location). To preconfigure and deploy an appliance to a target location, perform the following steps: Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 19 Procedure Step 1 Synchronize time to a physical NTP server. Step 2 Set the IP addresses for the DNS and NTP servers using one of the following methods: Cisco Secure Firewall Management Center 1700, 2700, and 4700 Getting Started Guide...
  • Page 20 Prepare the Management Center for Shipment Procedure Step 1 Install the chassis according to the instructions in the Cisco Secure Firewall Management Center 1700, 2700, and 4700 Hardware Installation Guide. Step 2 Cable the appliance and power on the appliance.
  • Page 21: What's Next

    Administration Guide for your version. If you continue to experience difficulty logging in to the appliance, contact Cisco TAC. Power Off the Management Center It is important that you shut down your system properly. Simply unplugging the power or pressing the power switch can cause serious file system damage.
  • Page 22 Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html.