Introduction to Managed Devices
Managed devices installed on network segments monitor traffic for analysis. Deployed passively, managed devices gather detailed information about your organization’s assets: hosts, operating systems, applications, users, sent files (including malware), vulnerabilities, and so on. The Firepower System correlates this information for your analysis so you can monitor the websites your users visit and the applications they use, assess traffic patterns, and receive notifications of intrusions and other attacks.
Deployed inline, the system can affect the flow of traffic using access control, which allows you to specify, in a granular fashion, how to handle the traffic entering, exiting, and traversing your network. The data that you collect about your network traffic and all the information you glean from it can be used to filter and control that traffic based on:
-
Simple, easily-determined transport and network layer characteristics: source and destination, port, protocol, and so on
-
The latest contextual information on the traffic, including characteristics such as reputation, risk, business relevance, application used, or URL visited
-
Microsoft Active Directory and LDAP users in your organization; you can grant different levels of access to different users
-
Characteristics of encrypted traffic; you can also decrypt this traffic for further analysis
-
Whether unencrypted or decrypted traffic contains a prohibited file, detected malware, or intrusion event
Note |
For the system to affect traffic, you must deploy relevant configurations to managed devices using routed, switched, or transparent interfaces, or inline interface pairs. |
Each type of traffic inspection and control occurs where it makes the most sense for maximum flexibility and performance. For example, reputation-based blacklisting, because it uses simple source and destination data, can block prohibited traffic early in the process. In contrast, detecting and blocking intrusions and exploits is a last-line defense.
Network management features on 7000 and 8000 Series devices allow them to serve in switched and routed environments, perform network address translation (NAT), and to build secure virtual private network (VPN) tunnels between virtual routers you configure. You can also configure bypass interfaces, aggregated interfaces, 8000 Series fastpath rules, and strict TCP enforcement.
7000 and 8000 Series Managed Devices
Cisco Firepower 7000 and 8000 Series appliances are physical devices purpose-built for the Firepower System. 7000 and 8000 Series devices have a range of throughputs, but share most of the same capabilities. In general, 8000 Series devices are more powerful than 7000 Series; they also support additional features such as 8000 Series fastpath rules, link aggregation, and stacking.
NGIPSv
You can deploy NGIPSv (a 64-bit virtual device as an ESXi host) using the VMware vSphere Hypervisor or vCloud Director environment. You can also enable VMware Tools on all supported ESXi versions.
By default, NGIPSv uses e1000 (1 Gbit/s) interfaces. You can also use the VMware vSphere Client to replace the default sensing and management interfaces with vmxnet3 (10 Gbit/s) interfaces.
Regardless of license, NGIPSv does not support any of the system’s hardware-based features: redundancy and resource sharing, switching, routing, and so on.
Cisco ASA with FirePOWER Services
Cisco ASA with FirePOWER Services (or an ASA FirePOWER module) functions similarly to NGIPSv. In an ASA FirePOWER deployment, the ASA device provides the first-line system policy and passes traffic to the Firepower System for discovery and access control.
Regardless of the licenses installed and applied, ASA FirePOWER does not support any of the following Firepower System features:
-
ASA FirePOWER does not support the Firepower System 7000 and 8000 Series hardware-based features: device high availability, stacking, switching, routing, VPN, NAT, and so on. However, the ASA platform does provide these features, which you can configure using the ASA CLI and ASDM. See the ASA documentation for more information.
-
You cannot use the Firepower Management Center web interface to configure ASA FirePOWER interfaces. The Firepower Management Center does not display ASA interfaces when the ASA FirePOWER is deployed in SPAN port mode.
-
You cannot use the Firepower Management Center to shut down, restart, or otherwise manage ASA FirePOWER processes.
ASA FirePOWER has a software and a command line interface (CLI) unique to the ASA platform. You use these ASA-specific tools to install the system and to perform other platform-specific administrative tasks.
Note |
If you edit an ASA FirePOWER and switch from multiple context mode to single context mode (or vice versa), the device renames all of its interfaces. You must reconfigure all Firepower System security zones, correlation rules, and related configurations to use the updated ASA FirePOWER interface names. |
Firepower Threat Defense
The Firepower Threat Defense appliance provides a unified next-generation firewall and next-generation IPS device. In addition to the IPS features available on Firepower Software models, firewall and platform features include Site-to-Site VPN, robust routing, NAT, clustering (for the Firepower 9300), and other optimizations in application inspection and access control.
The Firepower Threat Defense software is supported on the following platforms:
-
Firepower 9300
-
Firepower 4100 series
-
ASA 5512-X through 5555-X
-
ASA 5508-X and 5516-X
-
ASA 5506-X series
Firepower Threat Defense Virtual
The Firepower Threat Defense Virtual (a 64-bit virtual appliance) provides unified next-generation firewall and next-generation IPS capabilities to virtualized environments. Firepower Threat Defense Virtual is designed to work in multiple hypervisor environments, reduce administrative overhead, and increase operational efficiency.
You can deploy Firepower Threat Defense Virtual using the VMware vSphere hypervisor and the KVM (Kernel-based Virtual Machine) hypervisor environments. You can also deploy Firepower Threat Defense Virtual through Amazon Web Services (AWS) cloud platform.
You can use the Firepower Management Center for comprehensive multi-device deployment and management of both the virtual appliance and the physical Firepower Threat Defense appliances.