EasyManua.ls Logo

Cisco Firepower 2100 User Manual

Cisco Firepower 2100
232 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #44 background imageLoading...
Page #44 background image
Access the Threat Defense and FXOS CLI
Use the command-line interface (CLI) to set up the system and do basic system troubleshooting. You cannot
configure policies through a CLI session. You can access the CLI by connecting to the console port.
You can also access the FXOS CLI for troubleshooting purposes.
You can alternatively SSH to the Management interface of the threat defense device. Unlike a console session,
the SSH session defaults to the threat defense CLI, from which you can connect to the FXOS CLI using the
connect fxos command. You can later connect to the address on a data interface if you open the interface for
SSH connections. SSH access to data interfaces is disabled by default. This procedure describes console port
access, which defaults to the FXOS CLI.
Note
Procedure
Step 1 To log into the CLI, connect your management computer to the console port. The Firepower 2100 ships with
a DB-9 to RJ-45 serial cable, so you may need a third party DB-9-to-USB serial cable to make the connection.
Be sure to install any necessary USB serial drivers for your operating system. The console port defaults to
the FXOS CLI. Use the following serial settings:
9600 baud
8 data bits
No parity
1 stop bit
You connect to the FXOS CLI. Log in to the CLI using the admin username and the password you set at
initial setup (the default is Admin123).
Example:
firepower login: admin
Password:
Last login: Thu May 16 14:01:03 UTC 2019 on ttyS0
Successful login attempts for user 'admin' : 1
firepower#
Step 2 Access the threat defense CLI.
connect ftd
Example:
firepower# connect ftd
>
Cisco Firepower 2100 Getting Started Guide
42
Threat Defense Deployment with the Management Center
Access the Threat Defense and FXOS CLI

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 2100 and is the answer not in the manual?

Cisco Firepower 2100 Specifications

General IconGeneral
BrandCisco
ModelFirepower 2100
CategoryGateway
LanguageEnglish

Summary

Which Application and Manager is Right for You?

Applications

Overview of the two available applications: Secure Firewall Threat Defense and ASA.

Managers

Discussion of the different manager choices available for the applications.

Threat Defense Deployment with the Management Center

Before You Start

Preparation steps before deploying the threat defense.

Review the Network Deployment

Details on how to review the network setup for deployment.

Cable the Device

Instructions on how to physically connect the device.

Power on the Device

Steps to power on the threat defense device.

Complete the Threat Defense Initial Configuration

Steps to perform the initial setup of the threat defense.

Log Into the Management Center

Instructions for accessing the management center interface.

Register the Threat Defense with the Management Center

Steps to register the threat defense device with the management center.

Configure a Basic Security Policy

Guidance on setting up fundamental security policies.

Threat Defense Deployment with a Remote Management Center

How Remote Management Works

Explains the mechanisms behind remote threat defense management.

End-to-End Tasks: Low-Touch Provisioning

Steps for deploying threat defense using low-touch provisioning.

Central Administrator Pre-Configuration

Steps for pre-configuring the device by a central administrator.

Deploy the Firewall With Low-Touch Provisioning

Procedures for deploying the firewall using low-touch provisioning.

Threat Defense Deployment with the Device Manager

Review the Network Deployment and Default Configuration

Details the default network setup for device manager deployment.

Cable the Device

Instructions on how to physically connect the device.

Log Into the Device Manager

Instructions for accessing the device manager interface.

Complete the Initial Configuration

Steps to complete the initial device setup.

Configure Licensing

Process for acquiring and applying necessary licenses for the device manager.

Configure the Firewall in the Device Manager

Steps for configuring firewall settings within the device manager.

Threat Defense Deployment with CDO

About Threat Defense Management by CDO

Explains how to manage threat defense using CDO.

End-to-End Tasks: Low-Touch Provisioning

Steps for deploying threat defense using CDO low-touch provisioning.

Central Administrator Pre-Configuration

Steps for pre-configuring the device by a central administrator.

Deploy the Firewall With the Onboarding Wizard

Steps to deploy the firewall using the CDO onboarding wizard.

Configure a Basic Security Policy

Guidance on setting up fundamental security policies.

ASA Appliance Mode Deployment with ASDM

About the ASA

Provides information about the ASA functionality.

Migrating an ASA 5500-X Configuration

Steps for migrating ASA 5500-X configurations.

Cable the Device

Instructions on how to physically connect the device.

Log Into ASDM

Instructions for accessing the ASDM interface.

Configure Licensing

Process for acquiring and applying necessary licenses for the ASA.

Configure the ASA

Steps for configuring the ASA using ASDM.

ASA Platform Mode Deployment with ASDM and Chassis Manager

About the ASA

Provides information about the ASA functionality.

Unsupported Features

Lists ASA and FXOS features not supported on Firepower 2100.

End-to-End Procedure

Outlines the tasks required for ASA platform mode deployment.

Enable Platform Mode

Procedure to switch the device to Platform mode.

Log Into the Chassis Manager

Instructions for accessing the chassis manager interface.

Access the ASA and FXOS CLI

How to access the command-line interfaces for ASA and FXOS.

Related product manuals