The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The Cisco Firepower™ Management Center increases the effectiveness of your Cisco® network security solutions by providing centralized, integrated, and streamlined management.
The Cisco Firepower Management Center (formerly FireSIGHT Management Center) is the administrative nerve center for select Cisco security products running on a number of different platforms. It provides complete and unified management of firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection. The Management Center is the centralized point for event and policy management for the following solutions:
● Cisco Firepower Next-Generation Firewall (NGFW)
● Cisco ASA with FirePOWER Services
● Cisco Firepower Next-Generation IPS (NGIPS)
● Cisco FirePOWER Threat Defense for ISR
● Cisco Advanced Malware Protection (AMP)
The Cisco Firepower Management Center provides extensive intelligence about the users, applications, devices, threats, and vulnerabilities that exist in your network. It also uses this information to analyze your network’s vulnerabilities. It then provides tailored recommendations on what security policies to put in place and what security events you should investigate.
The Management Center provides easy-to-use policy screens to control access and guard against known attacks. It integrates with advanced malware protection and sandboxing technology, and it provides tools to track malware infections throughout your network. It unifies all these capabilities in a single management interface. You can go from managing a firewall to controlling applications to investigating and remediating malware outbreaks with ease.
Centralized Policy, Event, and Device Management
Enterprise-Class Management
The Cisco Firepower Management Center discovers real-time information about changing network resources and operations. You get a full contextual basis for making informed decisions (see Figure 1). In addition to providing a wide breadth of intelligence, the Management Center delivers a fine level of detail, including:
● Trends and high-level statistics. This information helps you understand your security posture at a given moment in time as well as how it’s changing, for better or worse
● Event detail, compliance, and forensics. These provide an understanding of what happened during a security event. They help improve defenses, support breach containment efforts, and aid in legal enforcement actions
● Workflow data. You can easily export this data to other solutions to improve incident response management
Feature |
Benefit |
Unified management of multiple security functions across multiple solutions |
Facilitates the centralized management of the Cisco security environment, including:
● Cisco Firepower Next-Generation Firewall (NGFW)
● Cisco ASA with FirePOWER Services
● Cisco Firepower NGIPS
● Cisco FirePOWER Threat Defense for ISR
● Cisco AMP
|
Integrated policy management over multiple security functions |
Configures firewall access, application control, threat prevention, URL filtering, and advanced malware protection settings in a single policy Eases policy administration, reduces errors, and promotes consistency Enables a single policy to be deployed to multiple security solutions |
Integrated access policy control with Cisco Identify Services Engine |
Controls access based on ISE security group tag, device type and location IP, and rapid threat containment Helps enforce compliance, enhance infrastructure security, and streamline service operation |
Superior threat intelligence |
Integrates Cisco Talos Group’s security, threat, and vulnerability intelligence for up-to-minute threat protection Addresses new attack methods with both IP-based and URL-based security intelligence Includes Cisco Umbrella for threat visibility outside the network perimeter Enables ingestion and correlation of threat intelligence from third-party threat feeds and threat intelligence platforms in STIX/TAXII or flat file formats |
Application visibility and control |
Further reduces threats to your network with precise control of more than 4000 commercial applications Uses the open-source standard Open App ID for detailed identification and control over custom applications |
Multitenancy management and policy inheritance |
Creates up to 50 management domains with separate event data, reporting, and network mapping, enforced through role-based access control Implements consistent and efficient management through its policy hierarchy structure, with each level inheriting policies above it |
Reporting and dashboards |
Provides the visibility you need through customizable dashboards with custom and template-based reports Delivers comprehensive alerts and reports for both general and focused information Displays event and contextual information in hyperlinked tables, graphs, and charts for easy-to-use analysis Monitors network behavior and performance to identify anomalies and maintain system health |
Secure boot |
Secure boot is a mechanism to validate the integrity of Cisco software running on the FMC hardware as your system boots. If a signature is missing or software is invalid, it will not load and boot will fail. (FMC 1000, FMC 2500. FMC 4500 only) |
Single Policy for Multiple Security Functions
Exceptional visibility and insight
You can’t protect what you can’t see. The Cisco Firepower Management Center automatically collects, collates, and displays contextual information about everything running in your environment. Table 1 illustrates the breadth of contextual awareness provided into threat vectors that more traditional security technologies do not detect. This critical insight into your network is available for use in your protection policies and gives you a level of protection that other solutions cannot.
Table 1. Full stack visibility
Category |
Cisco Firepower Management Center |
Typical IPS |
Typical Next-Generation Firewall |
Threats |
Yes |
Yes |
Yes |
Users |
Yes |
Yes |
Yes |
Web applications |
Yes |
No |
Yes |
Application protocols |
Yes |
No |
Yes |
File transfers |
Yes |
No |
Yes |
Malware |
Yes |
No |
No |
Command-and-control servers |
Yes |
No |
No |
Client applications |
Yes |
No |
No |
Network servers |
Yes |
No |
No |
Operating systems |
Yes |
No |
No |
Routers and switches |
Yes |
No |
No |
Mobile devices |
Yes |
No |
No |
Printers |
Yes |
No |
No |
VoIP phones |
Yes |
No |
No |
Virtual machines |
Yes |
No |
No |
Vulnerability information |
Yes |
No |
No |
Management before, during, and after an attack
The Cisco Firepower Management Center provides unified management across the entire “attack continuum”—before, during, and after an attack.
Before
● Provides exceptional visibility into what is running in your network so you can see what needs to be protected
● Creates firewall rules, and controls how more than 4000 commercial and custom applications are used in your environment
During
● Defines the intrusion prevention levels, URL reputation rules, and advanced malware protection pieces to be put in place
● Applies policies such as: “When network traffic is coming from this country using this particular application with a file attached, I will apply this level of intrusion inspection and analyze the file for malware, and even send it to the integrated sandbox, if necessary”
After
● Generates a graphical representation of all the devices the attack has infected
● Provides the ability to easily create a custom rule to stop the attack from advancing
● Gives a detailed analysis of the malware to safely remediate it
Automated security for dynamic defense
The Cisco Firepower Management Center continually monitors how your network is changing. It streamlines operations and improves your security by:
● Automatically correlating new attack events with your network’s vulnerabilities to alert you to attacks that may have been successful. Your security team can focus on those events that matter the most
● Analyzing your network’s vulnerabilities and automatically recommending the appropriate security policies to put in place. You can adapt your defenses to changing conditions and implement security measures tailored specifically to your network
● Correlating specific events from network, endpoint, intrusion, and security intelligence sources. You’re alerted if individual hosts show signs of compromise from unknown attacks
● Applying file policy criteria. If those are met, it automatically analyzes the file to identify known malware and/or sends the file to an integrated sandbox to identify unknown malware
Open APIs for easy integration
The Cisco Firepower Management Center makes integration with third-party technologies possible through four powerful, feature-rich application programming interfaces. The APIs provide connection points for:
● Moving event data from the Management Center to another platform, such as a Security Information and Event Management (SIEM) solution
● Enhancing the information contained in the Cisco Firepower database with third-party data. Such data might include vulnerability management data or operating system information from active scanners
● Kicking off workflows and remediation steps that are activated by user-defined correlation rules. You could, for example, integrate your workflow with a Network Access Control (NAC) solution to quarantine an infected endpoint or initiate a digital forensic process
● Supporting third-party reporting and analytics by enabling those solutions to query the Management Center database
These APIs are also used to integrate with a number of Cisco security products and workflows. These include Cisco AMP Threat Grid for sandboxing; the Cisco Identity Services Engine for identity data and network segmentation; and Cisco Umbrella for Internet-wide domain visibility.
The Threat Intelligence Director will soon be available in an upcoming release of the Cisco Firepower Management Center. Using open APIs, the director facilitates the ingestion of third-party threat intelligence from sources such as threat feeds and Threat Intelligence Platforms (TIPs). The director supports the ingestion of Structured Threat Information Expression (STIX) and the Trusted Automated Exchange of Indicator Information (TAXII) or select, flat (unformatted) file formats. The Threat Intelligence Director deconstructs the ingested intelligence into observables (IoCs), including IP (IPv4, IPv6), domain, URL, and SHA-256. These are published to Cisco security appliances, which can automatically block malicious activity inline or monitor the network for rapid response.
The Threat Intelligence Director operationalizes available threat intelligence with the following Cisco security appliances:
● Cisco Firepower NGFW
● Cisco Firepower NGIPS
Threat Intelligence Director Integrates Third-Party Security Intelligence
To see the latest list of third-party cyber threat intelligence and TIP partners, visit the Cisco Technical Alliance Partners Listing.
The Cisco Firepower Management Center can be deployed as a physical or virtual appliance, or from the cloud (Table 2). You can choose which options work best for your environment. The physical appliances generally manage a higher number of sensors and provide greater event storage capabilities than their virtual counterparts. The virtual appliances provide the convenience of being able to use your existing VM infrastructure. You can also use cloud computing services to host the Management Center. These services can help you manage security without your having to invest in computing power and database storage. And they will give you the flexibility to scale quickly as needs change.
When using Threat Intelligence Director on NGFWv, for optimal performance, we recommend installing 15 GB memory on the host hardware. For FMC versions supported please visit the current release notes at https://www.cisco.com/c/en/us/support/security/defense-center/products-release-notes-list.html.
Table 2. Deployment options
Deployment Platform |
VMware ESX and ESXi hypervisors |
KVM hypervisor |
Amazon Web Services cloud platform |
There are a number of Cisco Firepower Management Center models. Choose the one that’s right for your organization based on the number of sensor appliances to be monitored (both physical and virtual), the number of hosts in your environment, and the anticipated security events rate (see Table 3). All models provide the same management capabilities, including:
● Centralized device, license, event, and policy management
● Role-based management (segmented and isolated views and duties based on administrator role or group)
● Customizable dashboard with custom and template-based reports
● Comprehensive reporting and alerts for both general and focused information
● Event and contextual information displayed in hyperlinked tables, graphs, and charts
● Network behavior and performance monitoring
● Robust high-availability options to help ensure there’s no single point of failure
● Correlation and remediation features for real-time threat response
● Open APIs for integration with third-party solutions and customer work streams, such as firewalls, network infrastructure, log management, SIEM, trouble ticketing, and patch management
Table 3 compares the capacities and throughputs of available Cisco Firepower Management Center appliances, both physical and virtual.
Table 3. Cisco Firepower Management Center Models
Performance and Functionality |
FMC 750 |
FMC 1000 |
FMC 2000 |
FMC 2500 |
FMC 4000 |
FMC 4500 |
FMCv |
Maximum number of sensors managed |
10 |
50 |
250 |
300 |
500 |
750 |
25* 10 2 |
Maximum IPS events |
20 million |
30 million |
60 million |
60 million |
300 million |
300 million |
10 million |
Management interface |
100/100/1000 RJ-45 |
||||||
Memory |
8 GB (currently shipping) |
32 GB |
64 GB |
64 GB |
128 GB |
128 GB |
– |
CPU |
4-core Xeon |
8-core Xeon |
6-core Xeon |
2 x 8-core Xeon |
2 x10-core Xeon |
2 x10-core Xeon |
– |
Event storage space |
100 GB |
900 GB |
1.8 TB |
1.8 TB |
3.2 TB |
3.2 TB |
250 GB |
Maximum network map size (hosts/users) |
2,000/2,000 |
50,000/50,000 |
150,000/150,000 |
150,000/150,000 |
600,000/600,000 |
600,000/600,000 |
50,000/50,000 |
Maximum flow rate (flows per second) |
2,000 fps |
5,000 fps |
12,000 fps |
12,000 fps |
20,000 fps |
20,000 fps |
Varies* |
Network interfaces |
2 x 1 Gbps |
2 x 1 Gbps |
2 x 1 Gbps RJ45 onboard 2 x 10 Gbps SFP+ (order SFPs via Cisco Commerce Workplace) |
2 x 1 Gbps RJ45 onboard 2 x 10 Gbps SFP+ (order SFPs via Cisco Commerce Workplace) |
2 x 1 Gbps RJ45 onboard 2 x 10 Gbps SFP+ (order SFPs via Cisco Commerce Workplace) |
2 x 1 Gbps RJ45 onboard 2 x 10 Gbps SFP+ (order SFPs via Cisco Commerce Workplace) |
- |
Secure boot |
- |
Yes |
- |
Yes |
- |
Yes |
- |
Redundancy Features |
|||||||
Supports high availability |
No |
Yes |
Yes |
Yes |
Yes |
Yes |
No |
Dual power supplies |
No |
Yes |
Yes |
Yes |
Yes |
Yes |
- |
RAID support |
No |
HDD RAID 1 |
HDD RAID 5 |
HDD RAID 1 |
SSD RAID 6 |
SSD RAID 6 |
- |
Physical and Environmental |
|||||||
Form factor |
1RU |
1RU |
1RU |
1RU |
1RU |
1RU |
- |
Dimensions depth x width x height (inches) |
27.19 x 16.9 x 1.7 (69 x 43 x 4.3 cm) |
29.8 x 16.9 x 1.7 (75.7 x 43 x 4.3 cm) |
28.5 x 16.9 x 1.7 (72.3 x 43 x 4.3 cm) |
29.8 x 16.9 x 1.7 (75.7 x 43 x 4.3 cm) |
28.5 x 16.9 x 1.7 (72.3 x 43 x 4.3 cm) |
29.8 x 16.9 x 1.7 (75.7 x 43 x 4.3 cm) |
- |
Shipping weight |
33 lb. (15 kg) |
39 lb. (17.7 kg) |
35.6 lb. (16.2 kg) |
39 lb. (17.7 kg) |
35.6 lb. (16.2 kg) |
39 lb. (17.7 kg) |
- |
Watts (max) |
350W |
770W |
650W |
770W |
650W |
770W |
- |
Power supply |
9.5 amp max at 110V, 50/60 Hz 4.75 amp max at 220V, 50/60 Hz |
100-240 VAC (nominal) 90-264 VAC (min/max) 9.5 amp max at 100 VAC 4.5 amp max at 208 VAC |
90 to 264 VAC self-ranging 100-120 VAC nominal 200-240 VAC nominal 7.6 amp peak at 100VAC 3.65 amp peak at 208VAC |
100-240 VAC (nominal) 90-264 VAC (min/max) 9.5 amp max at 100 VAC 4.5 amp max at 208 VAC |
90 to 264 VAC self-ranging 100-120 VAC nominal 200-240 VAC nominal 7.6 amp peak at 100VAC 3.65 amp peak at 208VAC |
100-240 VAC (nominal) 90-264 VAC (min/max) 9.5 amp max at 100 VAC 4.5 amps max at 208 VAC |
- |
Airflow |
Front to back |
Front to back |
Front to back |
Front to back |
Front to back |
Front to back |
- |
Operating temperature |
10°C to 35°C |
5°C to 35°C |
5°C to 40°C |
5°C to 35°C |
5°C to 40°C |
5°C to 35°C |
- |
Virtual Cisco Firepower Management Center performance is highly dependent on the virtual environment chosen: CPUs, memory, storage, etc.
Shared features
● Integrated Lights-Out Management (LOM)
● Central management of Cisco next-generation security solutions: NGIPS, NGIPS plus application control, NGFW
Note: When dealing with Cisco ASA with FirePOWER Services products, the Cisco Firepower Management Center manages only the FirePOWER portion of the deployment.
Table 4 lists the supported versions of Cisco Firepower products that the Management Center is able to manage, along with associated hardware platforms.
Table 4. Supported Firepower versions and their associated platforms
Management Platform |
Software Revision Level |
Hardware Platform |
Cisco Firepower Management Center |
Cisco Firepower Threat Defense 6.x (NGFW) |
ASA 5500-X (except ASA 5585-X) Cisco 2100 Series (min FMC 6.2.1) Cisco Firepower 4100 Series Cisco Firepower 9300 |
FirePOWER Services 6.x |
ASA 5500-X |
|
Cisco Firepower NGIPS 6.x |
Cisco Firepower 7000 Cisco Firepower 8000 |
|
FirePOWER Threat Defense for ISR 6.x (Cisco Firepower Services) |
4000 Series ISR ISR G2 |
|
FirePOWER Services 5.4.x |
ASA 5500-X |
|
Cisco Firepower NGIPS 5.4.x |
Cisco Firepower 7000 Cisco Firepower 8000 |
The Cisco Firepower Management Center virtual appliance supports the following hypervisor types. For current versions supported and compatibility with FMC versions, visit the current release notes at https://www.cisco.com/c/en/us/support/security/defense-center/products-release-notes-list.html.
Table 5. Virtual appliance hypervisor support
Hypervisor |
Version and Details |
VMware vSphere |
5.1, 5.5:, 6.0
● ESXi Server
● vSphere Web Client, vSphere Client, or OVF Tool for Windows or Linux
|
KVM |
Ubuntu 14.04 LTS Red Hat Enterprise Linux (RHEL) Version 7.1 |
Amazon Web Services |
AWS Instance Types: c3.xlarge and c3.2xlarge |
Licensing
Starting with version 6.0, license keys are no longer required to use the Cisco Firepower Management Center. Versions 5.4 and earlier will still require a Product Authorization Key (PAK) or smart key. Upgrading to version 6.0 will alleviate that need.
Cisco Smart Net Total Care Support
The award-winning Cisco Smart Net Total Care™ technical support service gives your IT staff direct, anytime access to Cisco Technical Assistance Center (TAC) engineers and Cisco.com resources. You receive the fast, expert response and the dedicated accountability you need to resolve critical network issues.
Smart Net Total Care provides the following device-level support:
● Global access 24 hours a day, 365 days a year to specialized engineers in the Cisco TAC
● Anytime access to the extensive Cisco.com online knowledge base, resources, and tools
● Hardware replacement options that include 2-hour, 4-hour, and Next-Business-Day (NDB) advance replacement, as well as Return For Repair (RFR)
● Ongoing operating system software updates, including both minor and major releases within your licensed feature set
● Proactive diagnostics and real-time alerts on select devices with Cisco Smart Call Home
In addition, the Cisco Smart Net Total Care Onsite Service is an option that provides a field engineer who will install replacement parts at your location and help ensure that your network operates at the highest levels. For more information on Smart Net Total Care please visit: https://www.cisco.com/c/en/us/services/portfolio/product-technical-support/smart-net-total-care.html.
How to order
Table 6 provides ordering information for virtual and physical Cisco Firepower Management Center appliances and spare hardware. Please consult the Cisco Network Security Ordering Guide for additional configuration options and accessories.
Table 6. Ordering information
Cisco Firepower Management Center (Hardware) Appliances |
|
Part Number |
Product Description |
FS750-K9 |
Cisco Firepower Management Center 750 Chassis, 1 Rack Unit (RU) |
FMC1000-K9 |
Cisco Firepower Management Center 1000 Chassis, 1RU |
FS2000-K9 |
Cisco Firepower Management Center 2000 Chassis, 1RU |
FMC2500-K9 |
Cisco Firepower Management Center 2500 Chassis, 1RU |
FS4000-K9 |
Cisco Firepower Management Center 4000 Chassis, 1RU |
FMC4500-K9 |
Cisco Firepower Management Center 4500 Chassis, 1RU |
Cisco Firepower Management Center (Hardware) Spare |
|
FS-PWR-AC-650W= |
Cisco Firepower 650W AC Power Supply for FS2000, FS4000 |
FS-PWR-AC-779W= |
Cisco AC Power Supply 770W for FMC1000, FMC2500, FMC4500 |
Cisco Firepower Management Center (Software) Virtual Appliance |
|
FS-VMW-SW-K9 |
Cisco Firepower Management Center, Virtual (VMware) Firepower License |
FS-VMW-10-SW-K9 |
Cisco Firepower Management Center, Virtual (VMware) Firepower License, for 10 devices |
FS-VMW-2-SW-K9 |
Cisco Firepower Management Center, Virtual (VMware) Firepower License, for 2 devices |
To place an order, visit the Cisco ordering homepage.
Find warranty information on Cisco.com at the Product Warranties page.
Cisco offers a wide range of service programs to accelerate customer success. These innovative services programs are delivered through a unique combination of people, processes, tools, and partners, resulting in high levels of customer satisfaction. Cisco services help you protect your network investment, optimize network operations, and prepare your network for new applications to extend network intelligence and the power of your business. For more information about Cisco services for security, visit https://www.cisco.com/go/services/security.
Flexible payment solutions to help you achieve your objectives
Cisco Capital makes it easier to get the right technology to achieve your objectives, enable business transformation and help you stay competitive. We can help you reduce the total cost of ownership, conserve capital, and accelerate growth. In more than 100 countries, our flexible payment solutions can help you acquire hardware, software, services and complementary third-party equipment in easy, predictable payments. Learn more.
For more information, please visit the following links:
● Cisco Firepower Management Center
● Cisco Firepower Next-Generation Firewalls
● Cisco Firepower Next-Generation IPS (NGIPS)
● Cisco Advanced Malware Protection (AMP)
● Cisco FirePOWER Threat Defense for ISR
For information about Cisco Firepower in service provider environments, please visit: https://www.cisco.com/c/en/us/solutions/enterprise-networks/service-provider-security-solutions/.