background image

   

Cisco Firepower Threat Defense for the ASA 5506-X Series Using Firepower Device Manager Quick Start Guide

5. Power on the Firepower Threat Defense Device

7

Figure 8

ASA 5506H-X for Version 6.1.

Procedure

1.

Cable the following to a Layer 2 Ethernet switch:

GigabitEthernet 1/2 interface (inside)

Management 1/1 interface (for the Firepower Device Manager)

A local management computer

Note: 

You can connect inside and management on the same network because the management interface acts 

like a separate device that belongs only to the Firepower Device Manager.

2.

Connect the GigabitEthernet 1/1 (outside) interface to your ISP/WAN modem or other outside device. By 
default, the IP address is obtained using DHCP, but you can set a static address during initial configuration.

5. Power on the Firepower Threat Defense Device

Procedure

1.

Attach the power cable to the Firepower Threat Defense device and connect it to an electrical outlet.

The power turns on automatically when you plug in the power cable. There is no power button.

2.

Check the Power LED on the back of the Firepower Threat Defense device; if it is solid green, the device is 
powered on.

3.

Check the Status LED on the back of the Firepower Threat Defense device; after it is solid green, the system 
has passed power-on diagnostics.

6. Launch Firepower Device Manager

When you initially log into Firepower Device Manager, you are taken through the device setup wizard to complete 
the initial system configuration. 

Power

12VDC, 5A

Power

Status

Active

USB

RESET

GE MGMT

L

S

CONSOLE

4

3

2

1

GigabitEthernet 1/1

outside, DHCP from Modem

Management 1/1

192.168.45.45

Layer 2 Switch

WAN Modem

Management Computer

DHCP from inside: 192.168.45.x

GigabitEthernet 1/2

inside, 192.168.45.1
(Gateway)

Internet

Summary of Contents for ASA 5506-X

Page 1: ...where you do not want to use a high powered multiple device manager to control a large network containing many Firepower Threat Defense devices If you are managing large numbers of devices or if you want to use the more complex features and configurations that Firepower Threat Defense allows use the Firepower Management Center to configure your devices instead of the integrated Firepower Device Ma...

Page 2: ...der approval When you purchase one or more Smart Licenses for Firepower features you manage them in the Cisco Smart Software Manager http www cisco com web ordering smart software manager index html The Smart Software Manager lets you create a master account for your organization For more information about the Cisco Smart Software Manager see the Cisco Smart Software Manager User Guide Your purcha...

Page 3: ...figuration enables the above network deployment with the following behavior inside outside traffic flow outside IP address from DHCP ASA 5506W X wifi inside wifi outside traffic flow DHCP for clients on inside and wifi There is a DHCP server on the inside bridge group You can plug endpoints or switches directly into one of the bridged interfaces and get addresses on the 192 168 1 0 24 network Ther...

Page 4: ...d network deployment for Firepower Threat Defense on the ASA 5506 X series of appliances including the ASA 5506W X with the built in wireless access point Figure 4 Suggested Network Deployment Version 6 1 Note You must use a separate inside switch in your deployment The example configuration enables the above network deployment with the following behavior inside outside traffic flow outside IP add...

Page 5: ...pologies can be used and your deployment will vary depending on your basic logical network connectivity ports addressing and configuration requirements Version 6 2 Figure 5 ASA 5506W X with Wi Fi 5506 X without Wi Fi for Version 6 2 Figure 6 ASA 5506H X for Version 6 2 USB RESET GE MGMT L S S L S L S L S L S L S L S L S L Status Power Active Power 12VDC 5A 1 2 3 4 5 6 7 8 wLAN CONSOLE GigabitEther...

Page 6: ...t it to the Management port The workstation gets an address through DHCP on the 192 168 45 0 24 network Another option is to leave your workstation attached to a switch and attach that switch to one of the inside ports such as GigabitEthernet1 2 However you must ensure that no other device on the switch s network is running a DHCP server because it will conflict with the one running on the inside ...

Page 7: ...ower on the Firepower Threat Defense Device Procedure 1 Attach the power cable to the Firepower Threat Defense device and connect it to an electrical outlet The power turns on automatically when you plug in the power cable There is no power button 2 Check the Power LED on the back of the Firepower Threat Defense device if it is solid green the device is powered on 3 Check the Status LED on the bac...

Page 8: ...t the End User License Agreement and change the admin password You must complete these steps to continue 4 Configure the following options for the outside and management interfaces and click Next Note Your settings are deployed to the device when you click Next The interface will be named outside and it will be added to the outside_zone security zone Ensure that your settings are correct a Outside...

Page 9: ... includes a Cisco Aironet 702i wireless access point integrated into the device The wireless access point is disabled by default Connect to the access point web interface so that you can enable the wireless radios and configure the SSID and security settings The access point connects internally over the GigabitEthernet1 9 interface All Wi Fi clients belong to the GigabitEthernet1 9 network Your se...

Page 10: ...raffic so you must create a rule to enable traffic between the interfaces in the inside_zone security zone a Click Policies in the menu b Click above the Access Control table to add a rule c Configure at least the following options in the rule Title Enter a name for the rule For example Inside_Inside Action Either Allow or Trust Source Destination Source Zones Select inside_zone Source Destination...

Page 11: ... see this name when selecting a wireless network for their Wi Fi connection Broadcast SSID in Beacon Select this option Universal Admin Mode Disable Security Select whichever security option you want to use 7 While in the wireless access point web interface enable the radios a On the left click Summary and then on the main page under Network Interfaces click the link for the 2 4 GHz radio b Click ...

Page 12: ...from the Firepower Threat Defense CLI connect to the console port or configure Telnet or SSH access Procedure 1 From the Firepower Threat Defense CLI navigate to the system support CLI menu system support diagnostic cli Example system support diagnostic cli Attaching to ASA console Press Ctrl a then d to detach Type help or for a list of available commands firepower 2 Enter the enable command to t...

Page 13: ...or Firepower Device Manager or the Firepower Device Manager online help Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and or its affiliates in the U S and other countries To view a list of Cisco trademarks go to this URL www cisco com go trademarks Third party trademarks mentioned are the property of their respective owners The use of the word partner does not imply a p...

Page 14: ...Cisco Firepower Threat Defense for the ASA 5506 X Series Using Firepower Device Manager Quick Start Guide 8 Where to Go Next 14 ...

Reviews: