Introduction to Managed Devices
Managed devices installed on network segments monitor traffic for analysis. Deployed passively, managed devices gather detailed information about your organization’s assets: hosts, operating systems, applications, users, sent files (including malware), vulnerabilities, and so on. The Firepower System correlates this information for your analysis so you can monitor the websites your users visit and the applications they use, assess traffic patterns, and receive notifications of intrusions and other attacks.
Deployed inline, the system can affect the flow of traffic using access control, which allows you to specify, in a granular fashion, how to handle the traffic entering, exiting, and traversing your network. The data that you collect about your network traffic and all the information you glean from it can be used to filter and control that traffic based on:
-
Simple, easily-determined transport and network layer characteristics: source and destination, port, protocol, and so on
-
The latest contextual information on the traffic, including characteristics such as reputation, risk, business relevance, application used, or URL visited
-
Microsoft Active Directory and LDAP users in your organization; you can grant different levels of access to different users
-
Characteristics of encrypted traffic; you can also decrypt this traffic for further analysis
-
Whether unencrypted or decrypted traffic contains a prohibited file, detected malware, or intrusion event
Note |
For the system to affect traffic, you must deploy relevant configurations to managed devices using routed, switched, or transparent interfaces, or inline interface pairs. |
Each type of traffic inspection and control occurs where it makes the most sense for maximum flexibility and performance. For example, reputation-based blacklisting, because it uses simple source and destination data, can block prohibited traffic early in the process. In contrast, detecting and blocking intrusions and exploits is a last-line defense.
Network management features on 7000 and 8000 Series devices allow them to serve in switched and routed environments, perform network address translation (NAT), and to build secure virtual private network (VPN) tunnels between virtual routers you configure. You can also configure bypass interfaces, aggregated interfaces, 8000 Series fastpath rules, and strict TCP enforcement.
7000 and 8000 Series Managed Devices
Cisco Firepower 7000 and 8000 Series appliances are physical devices purpose-built for the Firepower System. 7000 and 8000 Series devices have a range of throughputs, but share most of the same capabilities. In general, 8000 Series devices are more powerful than 7000 Series; they also support additional features such as 8000 Series fastpath rules, link aggregation, and stacking.
NGIPSv
You can deploy NGIPSv (a 64-bit virtual device as an ESXi host) using the VMware vSphere Hypervisor or vCloud Director environment. You can also enable VMware Tools on all supported ESXi versions.
By default, NGIPSv uses e1000 (1 Gbit/s) interfaces. You can also use the VMware vSphere Client to replace the default sensing and management interfaces with vmxnet3 (10 Gbit/s) interfaces.
Regardless of license, NGIPSv does not support any of the system’s hardware-based features: redundancy and resource sharing, switching, routing, and so on.
Cisco ASA with FirePOWER Services
Cisco ASA with FirePOWER Services (or an ASA FirePOWER module) functions similarly to NGIPSv. In an ASA FirePOWER deployment, the ASA device provides the first-line system policy and passes traffic to the Firepower System for discovery and access control.
Regardless of the licenses installed and applied, ASA FirePOWER does not support any of the following Firepower System features:
-
ASA FirePOWER does not support the Firepower System 7000 and 8000 Series hardware-based features: device high availability, stacking, switching, routing, VPN, NAT, and so on. However, the ASA platform does provide these features, which you can configure using the ASA CLI and ASDM. See the ASA documentation for more information.
-
You cannot use the Firepower Management Center web interface to configure ASA FirePOWER interfaces. The Firepower Management Center does not display ASA interfaces when the ASA FirePOWER is deployed in SPAN port mode.
-
You cannot use the Firepower Management Center to shut down, restart, or otherwise manage ASA FirePOWER processes.
ASA FirePOWER has a software and a command line interface (CLI) unique to the ASA platform. You use these ASA-specific tools to install the system and to perform other platform-specific administrative tasks.
Note |
If you edit an ASA FirePOWER and switch from multiple context mode to single context mode (or vice versa), the device renames all of its interfaces. You must reconfigure all Firepower System security zones, correlation rules, and related configurations to use the updated ASA FirePOWER interface names. |
Network Management Capabilities by Classic Device Model
Firepower System Classic devices have varying throughputs and capabilities, which depend on model and license. The following table matches the network management capabilities of the system with 7000 and 8000 Series devices, and the licenses you must enable. All models of Classic device can perform access control.
Feature or Capability |
7000 & 8000 Series |
ASA FirePOWER |
NGIPSv |
Classic License |
---|---|---|---|---|
traffic channels |
yes |
no |
no |
Any |
multiple management interfaces |
yes |
no |
no |
Any |
link aggregation |
yes |
no |
no |
Any |
Firepower System web interface |
limited |
no |
no |
Any |
restricted (auxiliary) command line interface (CLI) |
yes |
yes |
yes |
Any |
external authentication |
yes |
no |
no |
Any |
connect to an eStreamer client |
yes |
yes |
no |
Any |
Automatic Application Bypass |
yes |
yes |
yes |
Any |
tap mode |
yes |
no |
no |
Any |
8000 Series fastpath rules |
8000 Series |
no |
no |
Any |
strict TCP enforcement |
yes |
no |
no |
Protection |
bypass mode for inline sets |
NetMod/SFP dependent |
no |
no |
Protection |
malware storage pack |
yes |
no |
no |
Malware |
switching, routing, switched and routed aggregate interfaces |
yes |
no |
no |
Control |
NAT policies |
yes |
no |
no |
Control |
device stacking |
8140 |
no |
no |
Any |
device high availability |
yes |
no |
no |
Control |
device stack high availability |
8140 |
no |
no |
Control |
VPN |
yes |
no |
no |
VPN |