Cisco Cisco ASA 5506H-X with FirePOWER Services Guia Da Instalação
Cisco Firepower Threat Defense for the ASA 5508-X and ASA 5516-X Using Firepower Device Manager Quick Start Guide
6. Launch Firepower Device Manager
5
Before You Begin
Ensure that you connect a data interface to your gateway device, for example, a cable modem or router. For edge
deployments, this would be your Internet-facing gateway. For data center deployments, this would be a back-bone
router.
deployments, this would be your Internet-facing gateway. For data center deployments, this would be a back-bone
router.
The Management interface must also be connected to a gateway through which the Internet is accessible. System
licensing and database updates require Internet access.
licensing and database updates require Internet access.
Procedure
1.
From the local management computer, launch a web browser. You can use the
suggested cabling and topology in
, or you can connect the local management
computer to the Management 1/1 interface directly.
2.
In the Address field, enter the following
URL:
. The Firepower Device Manager web page
appears.
3.
Log in with the default credentials of username admin and the password Admin123.
You must first read and accept the end user license agreement (EULA), then change the password. Next,
complete the device setup wizard as prompted.
complete the device setup wizard as prompted.
Note:
You can choose to skip the device setup wizard if you want to manually configure the device.
4.
Select an Outside Interface—This is the data port that you connected to your gateway mode or router. By
default, GigabitEthernet 1/1 interface is selected.
default, GigabitEthernet 1/1 interface is selected.
Select the outside interface and click Next.
5.
Configure Internet Connection—Configure the following options for the outside interface and click Next.
Note:
Your settings are deployed to the device when you click Next. The interface will be named “outside”
and it will be added to the “outside_zone” security zone. Ensure that your settings are correct.
—
Configure IPv4—The IPv4 address for the interface. You can use DHCP or manually enter a static IP
address, subnet mask, and gateway. You can also select Off to not configure an IPv4 address.
address, subnet mask, and gateway. You can also select Off to not configure an IPv4 address.
—
Configure IPv6—The IPv6 address for the interface. You can use DHCP or manually enter a static IP
address, prefix, and gateway. You can also select Off to not configure an IPv6 address.
address, prefix, and gateway. You can also select Off to not configure an IPv6 address.
—
DNS—The DNS server for the system's management address. This is not related to the outside interface
configuration. Enter one or more addresses of DNS servers for name resolution. Click Use OpenDNS if you
want to configure the OpenDNS public DNS servers. Clicking the button loads the appropriate IP addresses
into the fields.
configuration. Enter one or more addresses of DNS servers for name resolution. Click Use OpenDNS if you
want to configure the OpenDNS public DNS servers. Clicking the button loads the appropriate IP addresses
into the fields.
—
Firewall Hostname—The hostname for the system's management address. This is not related to the outside
interface configuration.
interface configuration.
Note:
When you configure the Firepower Threat Defense device using the device setup wizard, the system
provides two default access rules for outbound and inbound traffic. You can go back and edit these access
rules after initial setup.
rules after initial setup.
6.
Configure Time Settings—Configure the system time settings and click Next.
—
Time Zone—Select the time zone for the system.
—
NTP Time Server—Select whether to use the Cisco-provided NTP servers or to manually enter the
addresses of your NTP servers. You can add multiple servers to provide backups.
addresses of your NTP servers. You can add multiple servers to provide backups.
7.
Smart License Registration—Configure the smart licenses for the system.
You must have a smart license account to obtain and apply the licenses that the system requires. Initially, you
can use the 90-day evaluation license and set up smart licensing later.
can use the 90-day evaluation license and set up smart licensing later.