EasyManuals Logo
Home>Cisco>Network Hardware>Firepower 1140

Cisco Firepower 1140 Getting Started

Cisco Firepower 1140
42 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #7 background imageLoading...
Page #7 background image
DescriptionFeature
When you perform initial setup using FDM, all interface configuration
completed in FDM is retained when you switch to FMC for management,
in addition to the Management and FMC access settings. Note that other
default configuration settings, such as the access control policy or
security zones, are not retained. When you use the Firepower Threat
Defense CLI, only the Management and FMC access settings are retained
(for example, the default inside interface configuration is not retained).
After you switch to FMC, you can no longer use FDM to manage the
Firepower Threat Defense.
New/Modified screens: System Settings > Management Center
Use FDM to configure the
Firepower Threat Defense for
management by a FMC.
The local CA bundle contains certificates to access several Cisco
services. The system now automatically queries Cisco for new CA
certificates at a daily system-defined time. Previously, you had to
upgrade the software to update CA certificates. You can use the CLI to
disable this feature.
This feature is not supported in Version 7.0.0–7.0.4,
7.1.0–7.1.0.2, or 7.2.0–7.2.3. If you upgrade from a
supported version to an unsupported version, the feature
is temporarily disabled and the system stops contacting
Cisco.
Note
New/modified CLI commands: configure cert-update auto-update,
configure cert-update run-now, configure cert-update test, show
cert-update
For more information, see the Cisco Secure Firewall Threat Defense
Command Reference.
Automatically update CA bundles
The Firepower Threat Defense REST API for software version 7.1 is
version 6.2. You can use v6 in the API URLs, or preferentially, use
/latest/ to signify you are using the most recent API version that is
supported on the device. Note that the URL version path element for
6.2 is the same as 6.0/1: v6.
Please re-evaluate all existing calls, as changes might have been mode
to the resource models you are using. To open the API Explorer, where
you can view the resources, log into FDM, then click the more options
button ( ) and choose API Explorer.
FTD REST API version 6.2 (v6).
Logging Into the System
There are two interfaces to the Firepower Threat Defense device:
FDM Web Interface
The FDM runs in your web browser. You use this interface to configure, manage, and monitor the system.
Getting Started
7
Getting Started
Logging Into the System

Other manuals for Cisco Firepower 1140

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 1140 and is the answer not in the manual?

Cisco Firepower 1140 Specifications

General IconGeneral
Processor cores16
Processor familyIntel
Built-in processorYes
Firewall throughput2200 Mbit/s
IPSec VPN throughput1.2 Gbit/s
Maximum firewall connections400000
Maximum firewall connections per second100000
Wi-FiNo
Supported network protocolsSMTP
Console portRJ-45
Connectivity technologyWired
SFP module slots quantity4
Ethernet LAN (RJ-45) ports8
USB 3.2 Gen 1 (3.1 Gen 1) Type-A ports quantity1
SSD capacity200 GB
Storage media typeSSD
Form factor1U
Input current2 A
AC input voltage100-240 V
AC input frequency50 - 60 Hz
Power consumption (max)100 W
Operating altitude0 - 3000 m
Storage temperature (T-T)-25 - 70 °C
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)10 - 90 %
Country of originMexico
Quantity per pack1 pc(s)
Harmonized System (HS) code85176990
Package depth1409.7 mm
Package width990.6 mm
Package height457.2 mm
Package weight5782.31 g
Weight and Dimensions IconWeight and Dimensions
Depth436.9 mm
Width268.7 mm
Height43.7 mm

Related product manuals