Quick Start: Basic Setup
The Firepower feature set is powerful and flexible enough to support basic and advanced configurations. Use the following sections to quickly set up a Firepower Management Center and its managed devices to begin controlling and analyzing traffic.
Installing and Performing Initial Setup on Physical Appliances
Procedure
Install and perform initial setup on all physical appliances using the documentation for your appliance:
|
Deploying Virtual Appliances
Follow these steps if your deployment includes virtual appliances. Use the documentation roadmap to locate the documents listed below: http://www.cisco.com/c/en/us/td/docs/security/firepower/roadmap/firepower-roadmap.html.
Procedure
Step 1 |
Determine the supported virtual platforms you will use for the Management Center and devices (these may not be the same). See the Cisco Firepower Compatibility Guide. |
Step 2 |
Deploy virtual Firepower Management Centers on the supported Public and Private cloud environment. See, Cisco Secure Firewall Management Center Virtual Getting Started Guide. |
Step 3 |
Deploy virtual devices for your appliance on the supported Public and Private cloud environment. For details, see the following documentation.
|
Logging In for the First Time
Before you begin
-
Prepare your appliances as described in Installing and Performing Initial Setup on Physical Appliances or Deploying Virtual Appliances.
Procedure
Step 1 |
Log in to the Firepower Management Center web interface with admin as the username and Admin123 as the password. Change the password for this account as described in the Quick Start Guide for your appliance. |
Step 2 |
Set a time zone for this account as described in Setting Your Default Time Zone. |
Step 3 |
Add licenses as described in Licensing the Firepower System. |
Step 4 |
Register managed devices as described in Add a Device to the FMC. |
Step 5 |
Configure your managed devices as described in:
|
What to do next
-
Begin controlling and analyzing traffic by configuring basic policies as described in Setting Up Basic Policies and Configurations.
Setting Up Basic Policies and Configurations
You must configure and deploy basic policies in order to see data in the dashboard, Context Explorer, and event tables.
Note |
This is not a full discussion of policy or feature capabilities. For guidance on other features and more advanced configurations, see the rest of this guide. |
Before you begin
-
Log into the web interface, set your time zone, add licenses, register devices, and configure devices as described in Logging In for the First Time.
Procedure
Step 1 |
Configure an access control policy as described in Creating a Basic Access Control Policy.
|
Step 2 |
Apply the system-provided default health policy as described in Applying Health Policies. |
Step 3 |
Customize a few of your system configuration settings:
|
Step 4 |
Customize your network discovery policy as described in Configuring the Network Discovery Policy. By default, the network discovery policy analyzes all traffic on your network. In most cases, Cisco suggests restricting discovery to the addresses in RFC 1918. |
Step 5 |
Consider customizing these other common settings:
|
Step 6 |
Deploy configuration changes; see Deploy Configuration Changes. |
What to do next
-
Review and consider configuring other features described in Firepower Features and the rest of this guide.