Cisco Cisco ASA 5506H-X with FirePOWER Services Guia Da Instalação

Página de 6
   
Cisco Firepower Threat Defense for the ASA 5508-X and ASA 5516-X Using Firepower Device Manager Quick Start Guide
6. Launch Firepower Device Manager
5
Before You Begin
Ensure that you connect a data interface to your gateway device, for example, a cable modem or router. For edge 
deployments, this would be your Internet-facing gateway. For data center deployments, this would be a back-bone 
router. 
The Management interface must also be connected to a gateway through which the Internet is accessible. System 
licensing and database updates require Internet access. 
Procedure 
1.
From the local management computer, launch a web browser. You can use the 
suggested cabling and topology in 
, or you can connect the local management 
computer to the Management 1/1 interface directly. 
2.
In the Address field, enter the following 
URL: 
. The Firepower Device Manager web page 
appears. 
3.
Log in with the default credentials of username admin and the password Admin123
You must first read and accept the end user license agreement (EULA), then change the password. Next, 
complete the device setup wizard as prompted.
Note: 
You can choose to skip the device setup wizard if you want to manually configure the device. 
4.
Select an Outside Interface—This is the data port that you connected to your gateway mode or router. By 
default, GigabitEthernet 1/1 interface is selected. 
Select the outside interface and click Next.
5.
Configure Internet Connection—Configure the following options for the outside interface and click Next.
Note: 
Your settings are deployed to the device when you click Next. The interface will be named “outside” 
and it will be added to the “outside_zone” security zone. Ensure that your settings are correct. 
Configure IPv4—The IPv4 address for the interface. You can use DHCP or manually enter a static IP 
address, subnet mask, and gateway. You can also select Off to not configure an IPv4 address. 
Configure IPv6—The IPv6 address for the interface. You can use DHCP or manually enter a static IP 
address, prefix, and gateway. You can also select Off to not configure an IPv6 address. 
DNS—The DNS server for the system's management address. This is not related to the outside interface 
configuration. Enter one or more addresses of DNS servers for name resolution. Click Use OpenDNS if you 
want to configure the OpenDNS public DNS servers. Clicking the button loads the appropriate IP addresses 
into the fields. 
Firewall Hostname—The hostname for the system's management address. This is not related to the outside 
interface configuration. 
Note: 
When you configure the Firepower Threat Defense device using the device setup wizard, the system 
provides two default access rules for outbound and inbound traffic. You can go back and edit these access 
rules after initial setup.
6.
Configure Time Settings—Configure the system time settings and click Next
Time Zone—Select the time zone for the system. 
NTP Time Server—Select whether to use the Cisco-provided NTP servers or to manually enter the 
addresses of your NTP servers. You can add multiple servers to provide backups.
7.
Smart License Registration—Configure the smart licenses for the system. 
You must have a smart license account to obtain and apply the licenses that the system requires. Initially, you 
can use the 90-day evaluation license and set up smart licensing later.