What's In This Guide
This guide discusses setting up a basic network with the Firepower Version 6.2.3 System (that is, Firepower Management Center and a Firepower Threat Defense device both running Version 6.2.3). This basic setup is required to use the Firepower Management Center for access control, intrusion prevention, and monitoring. You must perform these tasks before you can do anything else with the Firepower System.
Note |
This guide has sample IP addresses that you can use in your system, provided they do not conflict with addresses in your network. You can either use the same IP addresses described in this guide or you can use IP addresses that are compatible with your network. If you change IP addresses to conform with your network, make sure that the Firepower Threat Defense management interface and the Firepower Management Center interface are on the same subnet. |
Setup Tasks Covered in this Guide
This guide uses sample values to tell you step by step how to:
-
Configure a Firepower Management Center on the network.
-
Configure a Firepower Threat Defense on the network.
-
License the Firepower Management Center.
-
Manage the Firepower Threat Defense device using Firepower Management Center.
-
Configure a NAT policy and a static route.
-
Set up an initial access control rule that allows all traffic so you can test internet access from a client connected to the inside network and make sure the managed device is filtering the traffic.
Who Should Use This Guide
Anyone who wants to configure the Firepower System, including administrators and integrators.
What You'll Need
To complete the tasks discussed in this guide, you'll need:
-
Firepower Management Center (any model, physical or virtual) running version 6.2.3
-
Firepower Threat Defense (any model, physical or virtual) running version 6.2.3
For information about upgrading a Firepower Management Center or Firepower Threat Defense device, see the Firepower Management Center Upgrade Guide.
Note
You can use another version of the Firepower System software but additional tasks, or different tasks, might be required. Consult the appropriate configuration or quick start guide for the version you're using for details.
-
For virtual devices, a hypervisor manager and client.
-
A private network so the IP addresses used in this system don't conflict with IP addresses used in your network. For example, you can set up a Virtual LAN (VLAN). Explaining how to isolate this system from the rest of your network is beyond the scope of this guide.
-
(Optional.) Cisco Smart License. If you don't have a Smart License, you can use a 90-day evaluation license.
For more information about Smart Licenses in version 6.2.3, see Smart Licensing for the Firepower System.