EasyManuals Logo
Home>Cisco>Network Hardware>Firepower 1120

Cisco Firepower 1120 Getting Started

Cisco Firepower 1120
42 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #37 background imageLoading...
Page #37 background image
Download Changes—To download the list of changes as a file, click More Options > Download as
Text. You are prompted to save the file to your workstation. The file is in YAML format. You can view
it in a text editor if you do not have an editor that specifically supports YAML format.
Configuration Changes that Restart Inspection Engines
Any of the following configurations or actions restart inspection engines when you deploy configuration
changes.
When you deploy, resource demands may result in a small number of packets dropping without inspection.
Additionally, deploying some configurations requires inspection engines to restart, which interrupts traffic
inspection and drops traffic.
Caution
Deployment
Some changes require that inspection engines be restarted, which will result in momentary traffic loss. Following
are the changes that require inspection engine restart:
SSL decryption policy is enabled or disabled.
The MTU changed on one or more physical interfaces (but not subinterfaces).
You add or remove a file policy on an access control rule.
The VDB was updated.
Creating or breaking the high availability configuration.
In addition, some packets might be dropped during deployment if the Snort process is busy, with the total
CPU utilization exceeding 60%. You can check the current CPU utilization for Snort using the show asp
inspect-dp snort command.
System Database Updates
If you download an update to the Rules database or VDB, you must deploy the update for it to become active.
This deployment might restart inspection engines. When you manually download an update, or schedule an
update, you can indicate whether the system should automatically deploy changes after the download is
complete. If you do not have the system automatically deploy the update, the update is applied the next time
you deploy changes, at which time inspection engines might restart.
System Updates
Installing a system update or patch that does not reboot the system and includes a binary change requires
inspection engines to restart. Binary changes can include changes to inspection engines, a preprocessor, the
vulnerability database (VDB), or a shared object rule. Note also that a patch that does not include a binary
change can sometimes require a Snort restart.
Getting Started
37
Getting Started
Configuration Changes that Restart Inspection Engines

Other manuals for Cisco Firepower 1120

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 1120 and is the answer not in the manual?

Cisco Firepower 1120 Specifications

General IconGeneral
Processor cores12
Processor familyIntel
Built-in processorYes
Firewall throughput1500 Mbit/s
Wi-FiNo
IPSec VPN throughput1 Gbit/s
Maximum firewall connections200000
Maximum firewall connections per second75000
Supported network protocolsSMTP
Console portRJ-45
Connectivity technologyWired
Number of console ports1
SFP module slots quantity4
Ethernet LAN (RJ-45) ports8
SSD capacity200 GB
Storage media typeSSD
Form factor1U
Input current2 A
AC input voltage100-240 V
AC input frequency50 - 60 Hz
Power consumption (max)100 W
Operating altitude0 - 3000 m
Storage temperature (T-T)-25 - 70 °C
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)10 - 90 %
Country of originMexico
Quantity per pack1 pc(s)
Harmonized System (HS) code85176990
Package depth1409.7 mm
Package width990.6 mm
Package height457.2 mm
Package weight5782.31 g
Weight and Dimensions IconWeight and Dimensions
Depth436.9 mm
Width268.7 mm
Height43.7 mm

Related product manuals