November 2019
November 2019
CDO Support for Devices Running Firepower Threat Defense 6.5.0
CDO now manages FTD 6.5.0 devices. These are the aspects of support CDO provides:
-
Onboading a device running Firepower Threat Defense (FTD) 6.5.0.
-
Support for additional Firepower series devices such as the Firepower 4100 and Firepower 9300.
-
Support for a virtual FTD instance on Microsoft Azure. For a complete list of supported devices, see "Firepower Threat Defense Support Specifics" in Managing FTD with Cisco Defense Orchestrator.
-
Devices can be individual FTDs or FTDs configured in a high-availability pair. For more information, see "Firepower Software Upgrade Path" in Managing FTD with Cisco Defense Orchestrator. These caveats apply to upgrade support:
-
Upgrading an HA pair will not be supported for FTDs running 6.5.0 if the device is using a data interface for management.
-
Upgrades on Firepower 4100 and Firepower 9300 devices are not currently supported.
-
Customers will be able to upgrade to FTD 6.5.0 using the drop-down in the upgrade page in CDO. The link that is provided to the device for 6.5 image download will be a HTTP. This may mean that the image download time could be slightly longer than if the download were done over HTTPS. In addition, if outbound HTTP traffic from the FTD is blocked, the image download will fail.
-
-
When FTD 6.5.0 is installed on a Firepower 1010 you can configure interfaces to run as a regular firewall interface or as a Layer 2 hardware switch port. At this time, switch mode support on CDO is read-only. To create or modify an interface for switch port mode, use the FDM console. CDO continues to develop its support for switch port mode on Firepower 1010s and will announce its full support in What's New when it is available.
-
When you onboard an FTD 6.5.0 device using a registration token, you can send connection events, file and malware events, and intrusion events directly to the Cisco cloud without using a Secure Event Connector. See "mplementing Cisco Security Analytics and Logging" in Managing FTD with Cisco Defense Orchestrator.
-
Continued support for FTD 6.4.x features. CDO is continuously developing support for FTD 6.5 features and will release support as it is ready.
For more information about the FTD features CDO supports, see Managing FTD with Cisco Defense Orchestrator.
IKEv1 Support for Site to Site VPN Connections
CDO now supports creating site-to-site VPN tunnels using Internet Key Exchange version 1 (IKEv1). It helps you to configure site-to-site VPN on legacy firewalls, which does not support Internet Key Exchange version 2 (IKEv2). Internet Key Exchange (IKE) is a key management protocol that is used for authenticating IPsec peers, negotiate and distribute IPsec encryption keys, and automatically establish IPsec security associations (SAs).
For more information, see "Site-to-Site Virtual Private Network" in Managing FTD with Cisco Defense Orchestrator.
Firepower Threat Defense Template Improvements
CDO now allows you to parameterize some aspects of the FTD template to further customize templates. For more information, see "Configure FTD Templates" in Managing FTD with Cisco Defense Orchestrator.
Smart License Management
You can now manage Cisco Smart Licenses for Firepower Threat Defense devices within CDO. Smart Licensing is conveniently built into our workflows and easily accessible from the CDO interface. You can now perform these Cisco Smart Licensing tasks within CDO:
-
Apply a Smart License while onboarding an FTD device using a registration token
-
View the licenses applied to a device
-
Register the licenses with Cisco Smart Software Manager
-
Enable and Disable different license types for your device
For more information, see "Onboard a Firepower Threat Defense Device with a Registration Token" and "Smart-licensing an Onboarded FTD" in Managing FTD with Cisco Defense Orchestrator.