Add a Standalone Threat Defense for the Cisco Security Cloud Control
You can use Security Cloud Control with both native and container instances. Standalone logical devices work either alone or in a High Availability pair.
Before you begin
-
Download the application image you want to use for the logical device from Cisco.com, and then upload that image to the Firepower 4100/9300 chassis.
NoteFor the Firepower 9300, you can install different application types (ASA and threat defense) on separate modules in the chassis. You can also run different versions of an application instance type on separate modules.
-
Configure a management interface to use with the logical device. The management interface is required. Note that this management interface is not the same as the chassis management port that is used only for chassis management (and that appears at the top of the Interfaces tab as MGMT).
-
You must also configure at least one Data type interface.
-
You must onboard the FTD device in Security Cloud Control.
-
Gather the following information:
-
Interface IDs for this device
-
Management interface IP address and network mask
-
Gateway IP address
-
DNS server IP address
-
Threat Defense hostname and domain name
-
Security Cloud Control onboard string
-
Threat Defense hostname and domain name
-
Procedure
Step 1 | Choose Logical Devices. |
Step 2 | Click , and set the following parameters: |
Step 3 | Expand the Data Ports area, and click each interface that you want to assign to the device. You can only assign data and data-sharing interfaces that you previously enabled on the Interfaces page. You will later enable and configure these interfaces in management center, including setting the IP addresses. You can only assign up to 10 data-sharing interfaces to a container instance. Also, each data-sharing interface can be assigned to at most 14 container instances. A data-sharing interface is indicated by the sharing icon (). Hardware Bypass-capable ports are shown with the following icon: . For certain interface modules, you can enable the Hardware Bypass feature for Inline Set interfaces only (see the management center configuration guide). Hardware Bypass ensures that traffic continues to flow between an inline interface pair during a power outage. This feature can be used to maintain network connectivity in the case of software or hardware failures. If you do not assign both interfaces in a Hardware Bypass pair, you see a warning message to make sure your assignment is intentional. You do not need to use the Hardware Bypass feature, so you can assign single interfaces if you prefer. |
Step 4 | Click the device icon in the center of the screen. A dialog box appears where you can configure initial bootstrap settings. These settings are meant for initial deployment only, or for disaster recovery. For normal operation, you can later change most values in the application CLI configuration. |
Step 5 | On the General Information page, complete the following: |
Step 6 | On the Settings tab, complete the following: |
Step 7 | On the Agreement tab, read and accept the end user license agreement (EULA). |
Step 8 | Click OK to close the configuration dialog box. |
Step 9 | Click Save. The chassis deploys the logical device by downloading the specified software version and pushing the bootstrap configuration and management interface settings to the application instance. Check the Logical Devices page for the status of the new logical device. When the logical device shows its Status as online, you can start configuring the security policy in the application. |
Step 10 | Save the configuration. commit-buffer The chassis deploys the logical device by downloading the specified software version and pushing the bootstrap configuration and management interface settings to the application instance. Check the status of the deployment using the show app-instance command. The application instance is running and ready to use when the Admin State is Enabled and the Oper State is Online. Example:
|
Step 11 | See the Security Cloud Control configuration guide to start configuring your security policy. |