Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

LLC Firepower

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 36

Cisco Firepower Basic Training

Andrelo Pagobo – Technical Engineer


April 2019

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
Topics
- FMC Installation on VMware
- ASA 55xx FTD Installation
- Basic Routing Configuration
- Basic adding of Objects
- NAT Rules (static/dynamic)
- Backup and Restore
- Basic Troubleshooting

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
VM Ware Installation

- Login to Cisco account and download:

Cisco_Firepower_Management_Center_Virtual_VMware-6.2.3-83.tar

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
VM Ware Installation

- Extract files and Create New Virtual Machine (OVF/VMDK)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
VM Ware Installation

- Select .OVF and .vmdk files and proceed with the installation.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
VM Ware Installation

- Select thin provisioning and complete the installation.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
VM Ware Installation

- Select thin provisioning and complete the installation.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
- Try to access Virtual Machine to test after installation.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
FMC Reimaging

- Connect to console and boot ASA Device


- When prompted, press ESC to enter ROMMON.
- Configure basic Network Settings (ASA Device and
TFTP/FTP Server.
- Proceed TFTP to copy files and run installation.
- Last output is “firepower-boot>”

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
FMC Reimaging

- Install FTD System Image on ASA

- Type “setup” on console

- Set IP addresses (can be the same as boot


setup)

- Follow through with the installation.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
FMC Reimaging

- Install FTD System Image on ASA

- Type “setup” on console

- Set IP addresses (can be the same as boot


setup)

- Follow through with the installation.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
FMC Reimaging

- Install FTD System Image on ASA

- Type “setup” on console

- Set IP addresses (can be the same as boot


setup)

- Follow through with the installation.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
- Agree to EULA and Input IP Address of
Device, as well as point to FMC

- say NO on “Manage Device Locally”

NOTE: Manage Device Locally is for FDM


when you do not have FMC.

- Execute command “configure manager


add IPADDRESS ****”

**** stands for encryption key

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Login to FMC, add feature Licenses to activate console and device.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
- Go to DEVICES and add the device.

- Check feature to be activated on device

NOTE: Remember the details set during


configuration of ASA Device (IP ADDRESS,
REGISTRATION KEY)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Go to OBJECTS and add security Zones for interfaces

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
- Go to DEVICES -> DEVICE MANAGEMENT -> INTERFACES.

- Select your preferred OUTSIDE and INSIDE interfaces, define their IP addresses.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
- Go to DEVICES -> DEVICE MANAGEMENT ->
ROUTES

- Select your preferred OUTSIDE and INSIDE


interfaces, define their IP addresses.

- Click on ADD route and configure route from


ANY network to OUTSIDE interface.

- ADD Next hop (GATEWAY) for traffic and save.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
- Go to POLICIES and select ACCESS CONTROL

NOTE: By default, all traffic is BLOCKED (Implicit Deny)

- Add “ALLOW ALL” rule to enable traffic from ANY network to ANY destinations.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
- ENABLE LOGGING in your rule to generate data on dashboard:

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
- Go to POLICIES>NETWORK DISCOVERY and ensure you discover hosts, users and application for full visibility.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
- Go to DEVICES and select NAT and ADD Rule.

- Configure DYNAMIC AUTO NAT and select appropriate interfaces on your network in INTERFACE OBJECTS.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
- Go to TRANSLATION tab and select appropriate SOURCE and DESTINATION networks.

Click OK and SAVE Changes

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
- Click on DEPLOY up top, select the DEVICE and hit DEPLOY. Device should proceed to deployment and you will
get notification that it’s done.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
- Sample Dashboard screenshots

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
- Sample Dashboard screenshots

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
- GO to SYSTEM>TOOLS>BACKUP/Restore
- Click on Firepower Management Backup

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
- Check on TASKS to see process running, you will get
notification when done.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
- Check on TASKS to see process running, you will get
notification when done.

- To restore, go to Backup Management, select the profile


and click Restore.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Go to DEVICES > DEVICE MANAGEMENT > and click on troubleshooting icon.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Click on Advanced Troubleshooting

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
- Select Packet Tracer and specify parameters.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
- Sample Output

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
CLI packet tracer

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
REFERENCE LINKS:

https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/vmware/fmcv/FMCv-quick.html

https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200884-installing-and-upgrading-
firepower-threa.html

https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-
v622/firepower_threat_defense_site_to_site_vpns.pdf

THANK YOU
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35

You might also like