EasyManuals Logo
Home>Cisco>Network Hardware>Firepower 1120

Cisco Firepower 1120 Getting Started

Cisco Firepower 1120
42 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #4 background imageLoading...
Page #4 background image
DescriptionFeature
Firewall and IPS Features
You can use FDM to configure the Network Analysis Policy (NAP)
when running Snort 3. Network analysis policies control traffic
preprocessing inspection. Inspectors prepare traffic to be further
inspected by normalizing traffic and identifying protocol anomalies.
You can select which NAP is used for all traffic, and customize the
settings to work best with the traffic in your network. You cannot
configure the NAP when running Snort 2.
We added the Network Analysis Policy to the Policies > Intrusion
settings dialog box, with an embedded JSON editor to allow direct
changes, and other features to let you upload overrides, or download
the ones you create.
Network Analysis Policy (NAP)
configuration for Snort 3.
You can use an FQDN network object, such as one specifying
www.example.com, as the translated destination address in manual NAT
rules. The system configures the rule based on the IP address returned
from the DNS server.
Manual NAT support for
fully-qualified domain name
(FQDN) objects as the translated
destination.
You can configure active authentication for identity policy rules to
redirect the users authentication to a fully-qualified domain name
(FQDN) rather than the IP address of the interface through which the
users connection enters the device. The FQDN must resolve to the IP
address of one of the interfaces on the device. By using an FQDN, you
can assign a certificate for active authentication that the client will
recognize, thus avoiding the untrusted certificate warning users get when
being redirected to an IP address. The certificate can specify the FQDN,
a wildcard FQDN, or multiple FQDNs in the Subject Alternate Names
(SAN) in the certificate.
We added the Redirect to Host Name option in the identity policy
settings.
Improved active authentication for
identity rules.
VPN Features
You can configure a site-to-site VPN connection to include remote
backup peers. If the primary remote peer is unavailable, the system will
try to re-establish the VPN connection using one of the backup peers.
You can configure separate pre-shared keys or certificates for each
backup peer. Backup peers are supported for policy-based connections
only, and are not available for route-based (virtual tunnel interface)
connections.
We updated the site-to-site VPN wizard to include backup peer
configuration.
Backup remote peers for site-to-site
VPN.
Getting Started
4
Getting Started
New Features in FDM/FTD Version 7.1.0

Other manuals for Cisco Firepower 1120

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 1120 and is the answer not in the manual?

Cisco Firepower 1120 Specifications

General IconGeneral
Processor cores12
Processor familyIntel
Built-in processorYes
Firewall throughput1500 Mbit/s
Wi-FiNo
IPSec VPN throughput1 Gbit/s
Maximum firewall connections200000
Maximum firewall connections per second75000
Supported network protocolsSMTP
Console portRJ-45
Connectivity technologyWired
Number of console ports1
SFP module slots quantity4
Ethernet LAN (RJ-45) ports8
SSD capacity200 GB
Storage media typeSSD
Form factor1U
Input current2 A
AC input voltage100-240 V
AC input frequency50 - 60 Hz
Power consumption (max)100 W
Operating altitude0 - 3000 m
Storage temperature (T-T)-25 - 70 °C
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)10 - 90 %
Country of originMexico
Quantity per pack1 pc(s)
Harmonized System (HS) code85176990
Package depth1409.7 mm
Package width990.6 mm
Package height457.2 mm
Package weight5782.31 g
Weight and Dimensions IconWeight and Dimensions
Depth436.9 mm
Width268.7 mm
Height43.7 mm

Related product manuals