Cisco Firepower Management Center 750, 1500, 2000, 3500, and 4000 Getting Started Guide
Accessing the CLI or the Linux Shell on the FMC
Installation and Initial Setup for Versions 6.5+
Access the Firepower Management Center Using the Management Interface
Access the Firepower Management Center Using a Keyboard and Monitor
Firepower Management Center Initial Configuration Wizard
End User License Agreement (EULA)
Automatic Initial Configuration
Installation and Initial Setup for Versions 5.4 - 6.4.x
Management Center Setup Using the Management Interface
Management Center Setup Using a Keyboard and Monitor (KVM)
Initial Setup Page: Management Centers
Administration Recommendations
Using the Shell to Redirect the Console Output
Using the Web Interface to Redirect the Console Output
Setting Up LightsOut Management
Restoring a Firepower Management Center to Factory Defaults
Reimaging Version 5.x Hardware to Version 6.3+
Configuration and Event Backup Guidelines
Traffic Flow During the Restore Process
Understanding the Restore Process
Obtaining the Restore ISO and Update Files
Starting the Restore Utility Using KVM or Physical Serial Port
Starting the Restore Utility Using LightsOut Management
Using the Interactive Menu to Restore an Appliance
Identifying the Appliance’s Management Interface
Specifying ISO Image Location and Transport Method
Updating System Software and Intrusion Rules During Restore
Downloading the ISO and Update Files and Mounting the Image
Saving and Loading Restore Configurations
Setting Up LightsOut Management
Preconfiguring Firepower Management Centers
Required Preconfiguration Information
Optional Preconfiguration Information
Preconfiguring Time Management
Preparing the Appliance for Shipment
Deleting a License from a Management Center
Troubleshooting the Appliance Preconfiguration
This guide is organized as follows:
This section lists the items included with each model. Note that contents are subject to change, and your exact contents might contain additional or fewer items.
Figure 1 MC750 Chassis and Management Interface
Figure 2 MC1500 Chassis and Management Interface
Figure 3 MC3500 Chassis and Management Interface
You can license a variety of features to create an optimal Firepower System deployment for your organization. You use the Firepower Management Center to manage licenses for itself and the devices it manages. The license types offered by the Firepower System depend upon the type of device you want to manage:
For 7000 and 8000 Series, ASA FirePOWER, and NGIPSv devices, you must use Classic Licenses. Devices that use Classic Licenses are sometimes referred to as Classic devices.
If your FMC is using a Firepower Version previous to 6.5: Cisco recommends that you use the initial setup page to add the classic licenses your organization has purchased; see License Settings. If you do not add classic licenses during initial setup, any devices you register during initial setup are added to the Management Center as unlicensed; you must license each of them individually after the initial setup process is over. Note that if you are setting up a reimaged appliance and you kept your license settings as part of the restore process, this section of the initial setup page may be prepopulated.
If your FMC is using Firepower Version 6.5+: You must add classic licenses for managed devices after completing the Initial Configuration Wizard. You can assign licenses to managed devices when you register them to the Firepower Management Center, or after you have registered them to the Firepower Management Center.
For Firepower Threat Defense physical and virtual devices, you must use Smart Licenses.
Cisco Smart Licensing lets you purchase and manage a pool of licenses centrally. Unlike product authorization key (PAK) licenses, smart licenses are not tied to a specific serial number or license key. Smart licensing lets you assess your license usage and needs at a glance.
Refer to the Firepower Management Center Configuration Guide for information about Classic Licenses and Smart Licenses, the types of licenses for each class, and how to manage the licenses across your deployment.
Accessing the FMC CLI or the Linux shell requires a different sequence of steps depending on what Firepower version the FMC is running. Refer to this topic when you encounter instructions in this document to log into to the FMC CLI or Linux shell.
Establish a direct physical connection with the FMC using a keyboard and monitor or establish an SSH session with the FMC’s managment interface.
1. Log into the FMC using the credentials for the CLI admin user.
Determine your next action depending on the Firepower version in use:
–If your FMC is running Firepower Version 5.4 - 6.2.x, this gives you direct access to the Linux shell.
–If your FMC is running Firepower Version 6.3.x or 6.4.x and the FMC CLI is not enabled, this gives you direct access to the Linux shell.
–If your FMC is running Firepower Version 6.3.x or 6.4.x and the FMC CLI is enabled, this gives you access to the FMC CLI. To access the Linux shell, continue with Step 2.
–If your FMC is running Firepower Version 6.5+, this gives you access to the FMC CLI. To access the Linux shell, continue with Step 2.
2. To access the Linux shell form the FMC CLI, enter the expert command.
Note: Firepower Versions 6.5+ are not supported on FMC models 750, 1500, and 3500.
The first time you log into the FMC running Versions 6.5+, an Initial Configuration Wizard guides you through configuring the new appliance to communicate on your trusted management network. The wizard presents a streamlined initial configuration process and automatically establishes some weekly maintenance activities to keep your system up-to-date and your data backed up.
The FMC management interface is pre-configured to accept an IPv4 address assigned by the Dynamic Host Configuration Protocol (DHCP). If the FMC fails to obtain a DHCP lease, the management interface uses a fallback IPv4 address of 192.168.45.45.
Note: If you are connecting to an FMC for the first time after performing a System Restore and you chose to retain license and network settings, the management interface IP address is the same as it was before you performed the System Restore. Proceed directly to Firepower Management Center Initial Configuration Wizard.
To install and set up an FMC running Versions 6.5+:
1. Install the appliance as described in Install the Appliance.
2. To perform the initial setup you have one of two choices:
– If your network does not use DHCP and your PC cannot reach the fallback address (or the address retained in a System Restore), we recommend you perform the initial setup by connecting a computer directly to the FMC’s physical management interface as described in Access the Firepower Management Center Using the Management Interface.
–If your local DHCP will assign an address to the FMC, use a keyboard and monitor to set up the appliance; see Access the Firepower Management Center Using a Keyboard and Monitor.
These instructions are an abbreviated version of the steps to physically install the appliance. For detailed instructions, see the Cisco Firepower Management Center 750, 1500, 2000, 3500, and 4000 Hardware Installation Guide.
1. Mount the appliance in your rack using the mounting kit and its supplied instructions.
2. Attach power cords to both power supplies and plug them into separate power sources.
If you do not connect both power supplies, an amber warning indicator lights on the chassis front panel and the FMC web interface displays a health alert.
3. Turn on the appliance by pressing the power switch located on the front panel.
After you press the power switch the appliance may turn on briefly and then appear to shut down with the exception of the amber power indicator light on the chassis front panel. This is normal; pressing the power button again causes the appliance to power up with the power indicator light green.
– If your network does not use DHCP and your PC cannot reach the fallback address (or the address retained in a System Restore), we recommend you perform the initial setup by connecting a computer directly to the FMC’s physical management interface as described in Access the Firepower Management Center Using the Management Interface.
–If your local DHCP will assign an address to the FMC, use a keyboard and monitor to set up the appliance; see Access the Firepower Management Center Using a Keyboard and Monitor.
After you complete setup, you will use the Firepower Management Center‘s web interface to perform most management and analysis tasks for your deployment. For more information, see Administration Recommendations.
The FMC management interface is pre-configured to accept an IPv4 address assigned by DHCP, but in scenarios where no DHCP is involved, the management interface uses the IPv4 address 192.168.45.45. Or, if you are connecting to an FMC for the first time after performing a System Restore and you chose to retain license and network settings, the IP address is the same as it was before you performed the System Restore.
–default gateway: 192.168.45.1
–If you are connecting to an FMC for the first time after performing a System Restore (see Restoring a Firepower Management Center to Factory Defaults) and you chose to retain license and network settings, the IP address is the same as it was before you performed the System Restore.
–Otherwise the FMC management interface IP address is 192.168.45.45.
1. Using the supplied Ethernet cable, connect the network interface on the preconfigured computer directly to the management interface on the appliance.
Confirm that the link LED is on for both the network interface on the local computer and the management interface on the appliance.
2. Use a web browser to navigate to the appliance’s IP address:
3. Log in to the web interface using admin
as the username and Admin123
as the password. (Note the password is case-sensitive.)
You can connect a USB keyboard and VGA monitor to the appliance, which is useful for rack-mounted appliances connected to a keyboard, video, and mouse (KVM) switch. The FMC management interface is pre-configured to accept an IPv4 address assigned by DHCP, but failing to obtain a DHCP lease, the management interface uses a fallback IPv4 address of 192.168.45.45. If your network does not use DHCP and your PC cannot reach that address, we recommend you perform the initial setup by connecting to the FMC directly as described in Access the Firepower Management Center Using the Management Interface.
Determine the IP address assigned to the management interface of the FMC:
1. Using the supplied Ethernet cable, connect the management interface on the back of the FMC to a protected management network.
2. Use a web browser to navigate to the FMC web interface login page:
3. Log into the web interface using admin
as the username and Admin123
as the password. Note that the password is case-sensitive.
When you log into the FMC web interface for the first time on a new appliance, or an appliance on which you have just performed a System Restore, the FMC presents an Initial Configuration Wizard to enable you to quickly and easily configure basic settings for the appliance. This wizard consists of three screens and one pop-up dialog:
admin
user from the default value of Admin123
.When you have completed the Initial Configuration Wizard and completed or dismissed the Smart Licensing dialog, the system displays the device management page, described in “Device Management Basics” in the Firepower Management Center Configuration Guide for your version.
To ensure system security and privacy, the first time you log in to the FMC you are required to change the admin
password. When the Change Password wizard screen appears, you have two options:
Check the Show password checkbox to see the password while using this screen. The wizard displays a list of criteria the new password must satisfy; a green check mark appears next to each criterion that has been met. If the new password does not meet all the listed criteria the wizard rejects the password and prevents you from proceeding to the next page.
The FMC compares your password against a password cracking dictionary that checks not only for many English dictionary words but also for other character strings that could be easily cracked with common password hacking techniques. For example, the initial configuration script may reject passwords such as “abcdefg” or “passw0rd”.
Note: On completion of the initial configuration process the system sets the passwords for the two admin accounts (one for web access and the other for CLI access) to the same value, complying with the strong password requirements described in the Firepower Management Center Configuration Guide for your version. If you change the password for either admin account thereafter, they will no longer be the same, and the strong password requirement can be removed from the web interface admin account.
Note: Once you click Next on the Change Password screen and the wizard has accepted the new admin
password, that password is in effect for both the web interface and CLI admin
accounts even if you do not complete the remaining wizard activities.
Before using the Firepower Management Center, you must accept the EULA displayed on the second Initial Configuration Wizard screen. Read the EULA and click Accept to proceed. If you click Decline the wizard logs you out of the FMC.
The final Initial Configuration Wizard screen gives you the opportunity to change the network settings the FMC uses for network communications through its management interface (eth0). If you are logging in for the first time after performing a System Restore in which you chose to retain network and license settings, the wizard is pre-populated with the same values the FMC used before the System Restore.
The wizard performs validation on the values you enter on this screen to confirm the following:
The wizard displays the results of these tests in real-time on the screen, permitting you to make corrections and test the viability of your configuration before clicking Finish at the bottom of the screen. The NTP and DNS connectivity tests are not blocking; you can click Finish before the wizard completes the connectivity tests. If the system reports a connectivity problem after you click Finish, you cannot change the settings in the wizard, but you can configure these connections using the FMC web interface after completing the initial setup.
The system does not perform connectivity testing if you enter configuration values that would result in cutting off the existing connection between the FMC and the browser. In this case the wizard displays no connectivity status information for DNS or NTP.
You can set values for the following fields:
You must provide a FQDN. You can do one of the following:
<hostname>.<domain>)
or host nameBoot Protocol for IPv4 Configuration
Choose one of the following methods of IP address assignment from the drop-down labeled Configure IPv4 :
This field is required. You can accept the displayed value, if one is shown, or enter a new value. Use dotted decimal form (for example, 192.168.45.45).
This field is required. You can accept the displayed value, if one is shown, or enter a new value. Use dotted decimal form (for example, 255.255.0.0).
You can accept the displayed gateway value if one is shown, or enter a new default gateway. Use dotted decimal form (for example, 192.168.0.1).
Choose an optional Domain Name Server group for the FMC. You can:
You must use an NTP Server to ensure proper synchronization between the FMC and its managed devices. Choose one of the following from the drop-down list:
After you click Finish on the Change Network Settings screen of the Initial Configuration Wizard, the system displays a pop-up that offers you the opportunity to quickly and easily set up Smart Licensing. Using this dialog is optional; if your FMC will be managing Firepower Threat Defense devices and you are familiar with Smart Licensing, use this dialog. Otherwise dismiss this dialog and refer to ”Licensing the Firepower System” in the Firepower Management Center Configuration Guide for your version.
After you have completed the Initial Configuration Wizard the FMC automatically configures weekly maintenance activities to keep your system up-to-date and your data backed up:
The tasks are scheduled in UTC, which means that when they occur locally depends on the date and your specific location. Also, because tasks are schedule in UTC, they do not adjust for Daylight Saving Time, summer time, or any such seasonal adjustments that you may observe in your location. If you are affected, scheduled tasks occur one hour “later” in the summer than in the winter, according to local time.
Note: We strongly recommend you review the auto-scheduled configurations and adjust them if necessary.
The FMC automatically schedules GeoDB updates to occur each week at the same randomly selected time. You can observe the status of this task using the web interface Message Center. If the system fails to configure the update and your FMC has internet access, we recommend you configure regular GeoDB updates as described in the Firepower Management Center Configuration Guide for your software version.
The FMC automatically schedules a weekly task to download the latest software for the FMC and its managed devices. This task is scheduled to occur between 2 and 3 AM UTC on Sunday mornings; depending on the date and your specific location this can occur anywhere from Saturday afternoon to Sunday afternoon local time. You can observe the status of this task using the web interface Message Center. If the task scheduling fails and your FMC has internet access, we recommend you schedule a recurring task for downloading software updates as described in the Firepower Management Center Configuration Guide for your version.
This task only downloads software patch and hotfix updates for the version your appliances are currently running; it is your responsibility to install any updates this task downloads. See the Cisco Firepower Management Center Upgrade Guide for more information.
The FMC automatically schedules a weekly task to perform a locally-stored configuration-only backup at 2 AM UTC on Monday mornings; depending on the date and your specific location this can occur anywhere from Saturday afternoon to Sunday afternoon local time. You can observe the status of this task using the web interface Message Center. If the task scheduling fails, we recommend you schedule a recurring task to perform backups as described in the Firepower Management Center Configuration Guide for your version.
In Versions 6.6+, the FMC downloads and installs the latest vulnerability database (VDB) update from the Cisco support site. This is a one-time operation. You can observe the status of this update using the web interface Message Center. To keep your system up to date, if your FMC has internet access, we recommend you schedule tasks to perform automatic recurring VDB update downloads and installations as described in the Firepower Management Center Configuration Guide for your version.
In Versions 6.6+, the FMC configures a daily automatic intrusion rule update from the Cisco support site. The FMC deploys automatic intrusion rule updates to affected managed devices when it next deploys affected policies. You can observe the status of this update using the web interface Message Center. You can see the configuration for this task in the web interface under System > Updates > Rule Updates. If configuring the update fails and your FMC has internet access, we recommend you configure regular intrusion rule updates as described in the Firepower Management Center Configuration Guide for your version.
Firepower Versions 5.4 - 6.4.x are supported on all FMC models addressed in this document: 750, 1500, 2000, 3500 and 4000.
When you install an appliance, make sure that you can access the appliance’s console for initial setup. You can access the console for initial setup using a keyboard and monitor with KVM, or using an Ethernet connection to the management interface.
The first time you log into the FMC web interface, the initial administration page provides you with the ability to configure the new appliance to communicate on your trusted management network. You must also perform initial administrative-level tasks such as changing the administrator password, accepting the end user license agreement (EULA), setting the time, and scheduling updates. The options you choose during setup and registration determine the default interfaces, inline sets, zones, and policies that the system creates and applies to managed devices.
You can perform this initial setup process accessing the FMC either using a laptop directly connected to the appliance, or using an Ethernet connection through your trusted local management network. The following diagram illustrates the choices you can make when setting up FMC’s running Firepower Versions 5.4 - 6.4.x:
Note: If you are deploying multiple appliances, set up your devices first, then their managing Firepower Management Center. The initial setup process for a device allows you to preregister it to a Management Center; the setup process for a Management Center allows you to add and license preregistered managed devices.
Note: If you are setting up an appliance after restoring it to factory defaults (see Restoring a Firepower Management Center to Factory Defaults) and you did not delete the appliance’s license and network settings, you can use a computer on your management network to browse directly to the appliance’s web interface to perform the setup. Skip to Initial Setup Page: Management Centers.
To install and set up an FMC running Versions 5.4 - 6.4.x:
1. Install the appliance as described in Install the Appliance.
2. Before connecting the FMC to your network you must change the FMC eth0 IP address to match your network and perform the initial setup; you have one of two choices:
–Access the FMC using the VGA/keyboard connection to set the eth0 IP address before performing the initial setup; see Access the Firepower Management Center Using a Keyboard and Monitor.
Then access the FMC with a web browser to perform the initial configuration process; see Initial Setup Page: Management Centers.
–Access the FMC using an ethernet connection directly from the eth0 interface to a local computer; see Access the Firepower Management Center Using the Management Interface.
Then access the FMC with a web browser to perform the initial configuration and set the eth0 IP address as a part of that process; see Initial Setup Page: Management Centers.
These instructions are an abbreviated version of the steps to physically install the appliance. For detailed instructions, see the Cisco Firepower Management Center 1000, 2500, and 4500 Hardware Installation Guide.
1. Mount the appliance in your rack using the mounting kit and its supplied instructions.
2. Attach the power cord to the appliance and plug into a power source.
If your appliance has redundant power supplies, attach power cords to both power supplies and plug them into separate power sources.
1. Configure a local computer, which must not be connected to the internet, with the following network settings:
–default gateway: 192.168.45.1
(The FMC management interface is preconfigured with a default IPv4 address. However, you can reconfigure the management interface with an IPv6 address as part of the setup process.)
2. Using the supplied Ethernet cable, connect the network interface on the preconfigured computer directly to the management interface on the appliance.
Confirm that the link LED is on for both the network interface on the local computer and the management interface on the appliance.
3. Use a web browser to navigate to the appliance’s default IP address:
4. Log in using admin
as the username and Admin123
as the password.
You can connect a USB keyboard and VGA monitor to the appliance, which is useful for rack-mounted appliances connected to a keyboard, video, and mouse (KVM) switch.
Be sure you have, at minimum, the information needed to allow the appliance to communicate on your management network:
–An IPv4 or IPv6 management IP address
1. Using the supplied Ethernet cable, connect the management interface on the back of the appliance to a protected management network.
2. Connect the monitor to the VGA port and the keyboard to one of the USB ports.
3. Access the Linux shell on the FMC using using admin
as the username and Admin123
as the password. (Note that the password is case-sensitive.) Use the steps appropriate to your Firepower version; see Accessing the CLI or the Linux Shell on the FMC.
The following prompt (appended with the current value) appears:
5. Enter the IP address you want to assign to the management interface or press Enter to accept the current value. For example:
The following prompt (appended with the current value) appears:
6. Enter the netmask for the interface’s IP address or press Enter to accept the current value. For example:
The following prompt (appended with the current value) appears:
7. Enter the gateway for the interface’s IP address or press Enter to accept the current value. For example:
8. If the settings are correct, type y and press Enter to accept the settings and continue.
If the settings are incorrect, type n and press Enter. You are prompted to enter the information again.
9. After you have accepted the settings, log out of the shell.
For all Management Centers, you must complete the setup process by logging into the Management Center’s web interface and specifying initial configuration options on a setup page. You must change the administrator password, specify network settings if you haven’t already, and accept the EULA.
In Versions 5.4.x, the setup process also allows you to register and license devices. Before you can register a device, you must complete the setup process on the device itself, as well as add the Management Center as a remote manager, or the registration will fail.
1. Direct your browser to https://
mgmt_ip /
, where mgmt_ip is the IP address of the Management Center’s management interface:
–For a Management Center connected to a computer with an Ethernet cable, direct the browser on that computer to the default management interface IPv4 address: https://192.168.45.45/
.
–For a Management Center where network settings are already configured, use a computer on your management network to browse to the IP address of the Management Center’s management interface.
2. Log in using admin
as the username and Admin123
as the password.
See the following sections for information on completing the setup:
–Recurring Rule Update Imports
–Recurring Geolocation Updates
3. When you are finished, click Apply.
The Management Center is configured according to your selections. You are logged into the web interface as the admin
user, which has the Administrator role.
Note: If you connected directly to the device using an Ethernet cable, disconnect the computer and connect the Management Center’s management interface to the management network. Use a browser on a computer on the management network to access the Management Center at the IP address or host name that you just configured, and complete the rest of the procedures in this guide.
4. Confirm that the initial setup was successful:
–For versions previous to 6.0, use the Task Status page ( System > Monitoring > Task Status) to verify that the initial setup was successful.
The page auto-refreshes every ten seconds. Monitor the page until it lists a status of Completed for the initial device registration and policy apply tasks. If, as part of setup, you configured an intrusion rule or geolocation update, you can also monitor those tasks.
–For versions 6.0+, click the System Status icon and view the Tasks tab in the Message Center.
The Management Center is ready to use. See the Firepower Management Center Configuration Guide for more information on configuring your deployment.
You must change the password for the admin
account. This account has Administrator privileges and cannot be deleted.
Cisco recommends that you use a strong password that is at least eight alphanumeric characters of mixed case and includes at least one numeric character. Avoid using words that appear in a dictionary.
Note: The admin accounts for accessing a Firepower Management Center using the shell versus accessing a Firepower Management Center using the web interface are not the same, and may use different passwords.
A Management Center’s network settings allow it to communicate on your management network. If you already configured the network settings, this section of the page may be prepopulated.
The Firepower System provides a dual stack implementation for both IPv4 and IPv6 management environments. You must specify the management network protocol ( IPv4, IPv6, or Both). Depending on your choice, the setup page displays various fields where you must set the IPv4 or IPv6 management IP address, netmask or prefix length, and default gateway:
You can also specify up to three DNS servers, as well as the host name and domain for the device.
You can set the time for a Management Center either manually or via network time protocol (NTP) from an NTP server.
You can also specify the time zone used on the local web interface for the admin
account. Click the current time zone to change it using a pop-up window.
As new vulnerabilities become known, the Cisco Talos Intelligence Group releases intrusion rule updates. Rule updates provide new and updated intrusion rules and preprocessor rules, modified states for existing rules, and modified default intrusion policy settings. Rule updates may also delete rules and provide new rule categories and system variables.
If you plan to perform intrusion detection and prevention in your deployment, Cisco recommends that you Enable Recurring Rule Update Imports from the Support Site.
You can specify the Import Frequency, as well as configure the system to perform an intrusion Policy Reapply after each rule update. To perform a rule update as part of the initial configuration process, select Install Now.
Rule updates may contain new binaries. Make sure your process for downloading and installing rule updates complies with your security policies. In addition, rule updates may be large, so make sure to import rules during periods of low network use.
Firepower Management Centers can display geographical information about the routed IP addresses associated with events generated by the system, as well as monitor geolocation statistics in the dashboard and Context Explorer.
The Management Center’s geolocation database (GeoDB) contains information such as an IP address’s associated Internet service provider (ISP), connection type, proxy information, and exact location. Enabling regular GeoDB updates ensures that the system uses up-to-date geolocation information. If you plan to perform geolocation-related analysis in your deployment, Cisco recommends that you Enable Recurring Weekly Updates from the Support Site.
You can specify the weekly update frequency for the GeoDB. Click the time zone to change it using a pop-up window. To download the database as part of the initial configuration process, select Install Now.
GeoDB updates may be large and may take up to 45 minutes to install after download. You should update the GeoDB during periods of low network use.
The Firepower Management Center provides a mechanism for archiving data so configurations can be restored in case of failure. As part of the initial setup, you can Enable Automatic Backups.
Enabling this setting creates a scheduled task that creates a weekly backup of the configurations on the Management Center.
You use the Firepower Management Center to manage licenses for itself and the devices it manages. The license types offered by the Firepower System depend upon the type of device you want to manage:
Before you add a classic license to the Firepower Management Center, make sure you have the PAK provided by Cisco when you purchased the license. If you have a legacy, pre-Cisco license, contact Support.
Note: You must enable Classic Licenses on your managed devices before you can use licensed features. You can enable a license during the initial setup of the Firepower Management Center, when you add a device to the Firepower Management Center, or by editing the device’s general properties after you add the device.
1. Obtain the License Key for your chassis during the initial setup from the License Settings section of the initial setup page.
The License Key is clearly labeled; for example, 66:18:E7:6E:D9:93:35.
Note: You can find the License Key on a Firepower Management Center at any time when you click the Add New License button from the System>Licenses>Classic Licenses page.
2. To obtain your license, navigate to https://www.cisco.com/go/license/ where you will be prompted for the license key (66:18:E7:6E:D9:93:35) and the Product Authorization Key (PAK).
Note: If you ordered additional licenses, you can enter the PAKs separated commas for those licenses at the same time.
3. Follow the on-screen instructions to generate a license or licenses, which will be emailed to you.
4. Paste the license or licenses in the validation box click Add/Verify.
Note: If you have devices that use Cisco Smart Licensing, you use the System>Licenses>Smart Licenses page to add and verify licenses. Refer to the product documentation for those devices for information on how to add Smart Licenses to the Firepower Management Center. The Firepower Management Center Configuration Guide provides more information about Classic Licenses and Smart Licenses, the types of licenses for each class, and how to manage the licenses across your deployment.
A Firepower Management Center can manage any device, physical or virtual, currently supported by the Firepower System. You must configure remote management on the device before you can register the device to a Management Center.
If you are using Firepower System Version 6.0 or greater, see the device management information in the Firepower Management Center Configuration Guide for instructions on registering your devices.
If you are using a Firepower System Version previous to 6.0, you can add 7000 and 8000 Series devices to the Management Center during the initial setup process. However, if a device and the Management Center are separated by a NAT device, you must add it after the setup process completes; see the Firepower 7000 and 8000 Series Installation Guide.
You must configure both traffic channels to use the same management interface when you use a non-default management interface to connect your Management Center and managed device and those appliances are separated by a NAT device. See “Deploying on a Management Network” in the Firepower 7000 and 8000 Series Installation Guide for more information.
When you register a managed device to a Management Center, leave the Apply Default Access Control Policies check box enabled if you want to automatically apply access control policies to devices upon registration. Note that you cannot choose which policy the Management Center applies to each device, only whether to apply them. The policy that is applied to each device depends on the detection mode (see Setting Up Firepower Managed Devices in the Firepower 7000 and 8000 Series Installation Guide) you chose when configuring the device, as listed in the following table.
An exception occurs if you previously managed a device with a Management Center and you changed the device’s initial interface configuration. In this case, the policy applied by this new Management Center page depends on the changed (current) configuration of the device. If there are interfaces configured, the Management Center applies the Default Intrusion Prevention policy. Otherwise, the Management Center applies the Default Access Control policy.
If a device is incompatible with an access control policy, the policy apply fails. This incompatibility could occur for multiple reasons, including licensing mismatches, model restrictions, passive vs inline issues, and other misconfigurations. If the initial access control policy apply fails, the initial network discovery policy apply also fails. After you resolve the issue that caused the failure, you must manually apply access control and network discovery policies to the device. For more information about issues that could cause access control policy apply to fail, see the Firepower Management Center Configuration Guide.
To add a device, type its Hostname or IP Address, as well as the Registration Key you specified when you registered the device. Remember this is a simple key that you specified, up to 37 characters in length, and is not the same as a license key.
Then, use the check boxes to add licensed capabilities to the device. You can only select licenses you have already added to the Management Center; see License Settings.
Not all licenses are supported on all managed devices. However, the setup page does not prevent you from enabling unsupported licenses on managed devices, or enabling a capability for which you do not have a model-specific license. This is because the Management Center does not determine the device model until later. The system cannot enable an invalid license, and attempting to enable an invalid license does not decrement your available license count.
After you enable licenses, click Add to save the device’s registration settings and, optionally, add more devices. If you selected the wrong options or mis-typed a device name, click Delete to remove it. You can then re-add the device.
Read the EULA carefully and, if you agree to abide by its provisions, select the check box. Make sure that all the information you provided is correct, and click Apply.
The Management Center is configured according to your selections. You are logged into the web interface as the admin
user, which has the Administrator role. Continue with step 3. in Initial Setup Page: Management Centers to complete the initial setup of the Management Center.
After you complete the initial setup process for an appliance and verify its success, Cisco recommends that you complete various administrative tasks that make your deployment easier to manage. You should also complete any tasks you skipped during the initial setup, such as device registration and licensing. For detailed information on any the tasks described in the following sections, as well as information on how you can begin to configure your deployment, see the Firepower Management Center Configuration Guide for your software version.
After you complete the initial setup, the only user on the system is the admin
user, which has the Administrator role and access. Users with that role have full menu and configuration access to the system, including via the shell or CLI. Cisco recommends that you limit the use of the admin
account (and the Administrator role) for security and auditing reasons.
Note: The admin
accounts for accessing a Firepower Management Center via the shell versus accessing a Firepower Management Center via the web interface are not the same, and may use different passwords.
Creating a separate account for each person who will use the system allows your organization not only to audit actions and changes made by each user, but also to limit each person’s associated user access role or roles. This is especially important on the Management Center, where you perform most of your configuration and analysis tasks. For example, an analyst needs access to event data to analyze the security of your network, but may not require access to administrative functions for the deployment.
The system includes ten predefined user roles designed for a variety of administrators and analysts. You can also create custom user roles with specialized access privileges.
For all Firepower versions you can register devices to the FMC after completing the FMC initial setup.
Note: If you are using a Firepower System version previous to 6.0, you can add 7000 and 8000 Series devices to the Management Center during the initial setup process; see Device Registration for information.
A Firepower Management Center can manage any device, physical or virtual, currently supported by your version of the Firepower System. Depending on your Firepower version this may include:
To register managed devices to a Firepower Management Center, see the device management information in the Firepower Management Center Configuration Guide for your software version. For information on compatibility among Firepower devices and software versions, see the Cisco Firepower Compatibility Guide.
By default, all appliances have an initial system policy applied. The system policy governs settings that are likely to be similar for multiple appliances in a deployment, such as mail relay host preferences and time synchronization settings. Cisco recommends that you use the Management Center to apply the same system policy to itself and all the devices it manages.
By default, the Management Center also has a health policy applied. A health policy, as part of the health monitoring feature, provides the criteria for the system continuously monitoring the performance of the appliances in your deployment. Cisco recommends that you use the Management Center to apply a health policy to all the devices it manages.
You should update the system software on your appliances before you begin any deployment. Cisco recommends that all the appliances in your deployment run the most recent version of the Firepower System. If you are using them in your deployment, you should also install the latest intrusion rule updates, VDB, and GeoDB. For Versions 6.5+, the Initial Configuration Wizard automatically configures some of these update activities for you; see Automatic Initial Configuration for more information.
By default, Management Centers direct initialization status, or init, messages to the VGA port. If you want to use the physical serial port or SOL to access the console, Cisco recommends you redirect console output to the serial port after you complete the initial setup.
To redirect console output using the shell, you run a script from the appliance’s shell.
1. Using your keyboard/monitor or serial connection, log into the appliance’s shell using an account with Administrator privileges. Use the steps appropriate to your Firepower version; see Accessing the CLI or the Linux Shell on the FMC.
The prompt for the appliance appears.
2. At the prompt, set the console output by typing one of the following commands:
–To access the appliance using the VGA port:
–To access the appliance using the physical serial port:
–To access the appliance using LOM via SOL:
3. To implement your changes, reboot the appliance by typing sudo
reboot
.
1. Select System > Configuration.
2. Select Console Configuration.
3. Select a remote console access option:
–Select VGA to use the appliance's VGA port. This is the default option.
–Select Physical Serial Port to use the appliance's serial port, or to use LOM/SOL on a Management Center.
If you selected Physical Serial Port, the LOM settings appear.
4. To configure LOM via SOL, enter the appropriate settings:
– DHCP Configuration for the appliance ( DHCP or Static).
– IP Address to be used for LOM. The LOM IP address must be different from the management interface IP address of the appliance.
– Default Gateway for the appliance.
Remote console configuration for the appliance is saved. If you configured Lights-Out Management, you must enable it for at least one user; see Enabling LOM and LOM Users.
If you need to restore a Firepower device to factory defaults and do not have physical access to the appliance, you can use Lights-Out Management (LOM) to perform the restore process. Note that you can use Lights-Out Management on the default ( eth0
) management interface only.
The LOM feature allows you to perform a limited set of actions on a Firepower device, using a Serial over LAN (SOL) connection. With LOM, you use a command line interface on an out-of-band management connection to perform tasks such as viewing the chassis serial number, or monitoring conditions such as fan speed and temperature.
The syntax of LOM commands depends on the utility you are using, but LOM commands generally contain the elements listed in the following table.
Note that the chassis power off
and chassis power cycle
commands are not valid on 70xx Family appliances. For a full list of LOM commands supported by the Firepower System, see the Configuring Appliance Settings chapter in the Firepower Management Center Configuration Guide.
Note: In some power cycle scenarios, the baseboard management controller (BMC) of a Firepower 7050 connected to the network via the management interface could lose the IP address assigned to it by the DHCP server. Because of this, Cisco recommends you configure the Firepower 7050 BMC with a static IP address. Alternately, you can disconnect the network cable and reconnect it, or remove and restore power to the device to force renegotiation of the link.
Before you can restore an appliance using LOM, you must enable LOM for both the appliance and the user who will perform the restore. Then, use a third-party Intelligent Platform Management Interface (IPMI) utility to access the appliance. You must also make sure you redirect the appliance’s console output to the serial port.
For more information, see the following sections:
Before you can use LOM to restore an appliance, you must enable and configure the feature. You must also explicitly grant LOM permissions to users who will use the feature.
You configure LOM and LOM users on a per-appliance basis using each appliance’s local web interface. That is, you cannot use the Management Center to configure LOM on a Firepower device. Similarly, because users are managed independently per appliance, enabling or creating a LOM-enabled user on the Management Center does not transfer that capability to users on Firepower devices.
LOM users also have the following restrictions:
Note: For detailed instructions on the following tasks, see the Configuring Appliance Settings chapter in the Firepower Management Center Configuration Guide.
1. Select System > Configuration, then click Console Configuration.
2. For Console, choose Physical Serial Port.
3. Specify the LOM IP address, netmask, and default gateway (or use DHCP to have these values automatically assigned).
Note: The LOM IP address must be different from the management interface IP address of the appliance.
To enable LOM capabilities for a Firepower System user:
1. Select System > User Management, then either edit an existing user to add LOM permissions, or create a new user that you will use for LOM access to the appliance.
2. On the User Configuration page, enable the Administrator role if it is not already enabled.
3. Enable the Allow Lights-Out Management Access check box and save your changes.
You use a third-party IPMI utility on your computer to create an SOL connection to the appliance.
If your computer is running Linux or Mac OS, use IPMItool. Although IPMItool is standard with many Linux distributions, you must install IPMItool on a Mac. First, confirm that your Mac has Apple's xCode developer tools package installed. Also, make sure the optional components for command line development are installed ("UNIX Development” and "System Tools" in newer versions, or "Command Line Support" in older versions). Finally, install MacPorts and IPMItool. For more information, use your favorite search engine or see these sites:
For Windows environments, use ipmiutil, which you must compile yourself. If you do not have access to a compiler, you can use ipmiutil itself to compile. For more information, use your favorite search engine or see this site:
Cisco provides ISO images on its Support Site for restoring, or reimaging, Firepower Management Centers to their original factory settings.
For more information, see the following sections:
Before you begin restoring your appliances to factory defaults, you should familiarize yourself with the expected behavior of the system during the restore process.
Because of a change to ISO image names, you cannot freshly install Version 6.3+ on a physical Firepower appliance that is currently running Version 5.x. This includes the following Firepower Management Centers models covered in this guide:
The quickest path to Version 6.3 is:
1. Freshly install Version 6.2.3, then
2. Freshly install (or upgrade to) Version 6.3+.
Note: After you reimage a Version 5.x Defense Center/Management Center to a Version 6.2.3 Firepower Management Center, it cannot manage its older devices. You should also reimage those devices, then re-add them to the Management Center.
See the Firepower Release Notes for more information about the change to ISO image name.
Before you begin the restore process, Cisco recommends that you delete or move any backup files that reside on your appliance, then back up current event and configuration data to an external location.
Restoring your appliance to factory defaults results in the loss of almost all configuration and event data on the appliance. Although the restore utility can retain the appliance’s license, network, and (in some cases) Lights-Out Management (LOM) settings, you must perform all other setup tasks after the restore process completes.
Retention of LOM settings after the restore process varies by model and Firepower version:
–If you restore the FMC to Version 6.2.3 or earlier, the system does not reset LOM settings regardless of whether you choose to delete the license and network settings.
–If you restore the FMC to Version 6.3+, the system resets LOM settings regardless of whether you choose to delete the license and network settings.
To avoid disruptions in traffic flow on your network, Cisco recommends restoring your appliances during a maintenance window or at a time when the interruption will have the least impact on your deployment.
Restoring a Firepower device that is deployed inline resets the device to a non-bypass (fail closed) configuration, disrupting traffic on your network. Traffic is blocked until you configure bypass-enabled inline sets on the device. For more information about editing your device configuration to configure bypass, see the Managing Devices chapter of the Firepower Management Center Configuration Guide.
To restore a Firepower device, you boot from the appliance’s internal flash drive and use an interactive menu to download and install the ISO image on the appliance. For your convenience, you can install system software and intrusion rule updates as part of the restore process.
Only reimage your appliances during a maintenance window. Reimaging resets appliances in bypass mode to a non-bypass configuration and disrupts traffic on your network until you reconfigure bypass mode. For more information, see Traffic Flow During the Restore Process.
Note that you cannot restore an appliance using its web interface. To restore an appliance, you must connect to it in one of the following ways:
You can connect a USB keyboard and VGA monitor to the appliance, which is useful for rack-mounted appliances connected to a KVM (keyboard, video, and mouse) switch. If you have a KVM that is remote-accessible, you can restore appliances without having physical access.
You can use a rollover serial cable (also known as a NULL modem cable or a Cisco console cable) to connect a computer to the appliance. See the hardware specifications for your appliance to locate the serial port. To interact with the appliance, use terminal emulation software such as HyperTerminal or XModem.
Lights-Out Management Using Serial over LAN
You can perform a limited set of actions on Management Centers and Firepower devices using Lights-Out Management (LOM) with a Serial over LAN (SOL) connection. If you do not have physical access to an appliance, you can use LOM to perform the restore process. After you connect to an appliance using LOM, you issue commands to the restore utility as if you were using a physical serial connection. Note that you can use Lights-Out Management on the default ( eth0
) management interface only. For more information, see Setting Up Lights-Out Management.
To restore a Firepower device:
1. Copy the image to an appropriate storage medium.
3. Reboot the appliance and invoke the restore utility.
Cisco provides ISO images for restoring appliances to their original factory settings. Before you restore an appliance, obtain the correct ISO image from the Support Site.
The ISO image you should use to restore an appliance depends on when Cisco introduced support for that appliance model. Unless the ISO image was released with a minor version to accommodate a new appliance model, ISO images are usually associated with major versions of the system software (for example, 5.2 or 5.3). To avoid installing an incompatible version of the system, Cisco recommends that you always use the most recent ISO image available for your appliance.
Firepower devices use an internal flash drive to boot the appliance so you can run the restore utility.
Cisco also recommends that you always run the latest version of the system software supported by your appliance. After you restore an appliance to the latest supported major version, you should update its system software, intrusion rules, and Vulnerability Database (VDB). For more information, see the release notes for the update you want to apply, as well as the Firepower Management Center Configuration Guide.
For your convenience, you can install system software and intrusion rule updates as part of the restore process. For example, you could restore a device to Version 6.0, and also update the device to Version 6.0.0.1 as part of that process. Keep in mind that only Management Centers require rule updates.
To obtain the restore ISO and other update files:
1. Using the user name and password for your support account, log into the Support Site ( https://sso.cisco.com/autho/forms/CDClogin.html).
2. Browse to the software download section ( https://software.cisco.com/download/navigator.html).
3. Enter a search string in the Find area on the page that appears for the system software you want to download and install.
For example, to find software downloads for Firepower, you would enter Firepower.
4. Find the image (ISO image) that you want to download.
You can click one of the links on the left side of the page to view the appropriate section of the page. For example, you would click 6.0 Images to view the images and release notes for Version 6.0 of the Firepower System.
5. Click the ISO image you want to download.
6. Copy the files to an HTTP (web) server, FTP server, or SCP-enabled host that the appliance can access on its management network.
Begin the restore process by booting the appliance from an internal flash drive.
After you make sure that you have the appropriate level of access and connection to an appliance, as well the correct ISO image, use one of the following procedures to restore your appliance:
system shutdown
command from the CLI, or the
shutdown -h now
command from an appliance’s shell (sometimes called expert mode).
For Firepower devices, Cisco provides a restore utility on an internal flash drive.
Note: Do not use a KVM console with USB mass storage to access the appliance for the initial setup because the appliance may attempt to use the mass storage device as a boot device.
If you need to restore an appliance to factory defaults and do not have physical access, you can use LOM to perform the restore process; see Starting the Restore Utility Using Lights-Out Management.
1. Using your keyboard/monitor or serial connection, log into the appliance using the admin account. Use the steps appropriate to your Firepower version; see Accessing the CLI or the Linux Shell on the FMC.
2. Reboot the appliance; type sudo reboot. Provide the admin password when prompted.
–If the system is performing a database check, you may see the following message:
The system is not operational yet. Checking and repairing database are in progress. This may take a long time to finish.
–For a keyboard and monitor connection, quickly press one of the arrow keys repeatedly to prevent the appliance from booting the currently installed version of the system.
–For a serial connection, when you see the BIOS boot options, press Tab slowly and repeatedly to prevent the appliance from booting the currently installed version of the system.
4. The system responds differently depending on the hardware model and type of connection:
For models 750, 1500, or 3500:
– For a keyboard and monitor connection:
The red LILO menu appears offering three options: to boot the current version of the system, perform a system restore using the standard console (System_Restore), or perform a system restore using a serial connection (Restore_Serial). Use the arrow keys to select System_Restore and press Enter.
The LILO boot prompt appears. For example:
Type Restore_Serial and press Enter.
– For a keyboard and monitor connection:
The red LILO menu appears offering two options: to restore the current version of the system, or to perform a system restore (System_Restore). Use the arrow keys to select System_Restore and press Enter.
The boot: prompt appears after the following choices:
The LILO boot prompt appears. For example:
Type System_Restore and press Enter.
The boot: prompt appears after the following choices:
5. Press Enter to confirm the copyright notice.
6. Unless this is the first time you have restored the appliance to this major version, the utility automatically loads the last restore configuration you used. To continue, confirm the settings in a series of pages until the “Cisco Firepower Appliance <Version> Configuration Menu” appears.
If you need to restore an appliance to factory defaults and do not have physical access to the appliance, you can use LOM to perform the restore process. Note that you can use Lights-Out Management on the default ( eth0
) management interface only.
Note: Before you can restore an appliance using LOM, you must enable the feature; see Setting Up Lights-Out Management.
To start the restore utility using Lights-Out Management:
1. Access the Linux shell using the admin account. Use the steps appropriate to your Firepower version; see Accessing the CLI or the Linux Shell on the FMC.
2. At your computer’s command prompt, enter the IPMI command to start the SOL session:
Where IP_address is the IP address of the management interface on the appliance, username is user name of an authorized LOM account, and password is the password for that account. Note that IPMItool prompts you for the password after you issue the sol activate command.
3. Reboot the appliance; type sudo reboot. Provide the admin password when prompted.
If the system is performing a database check, you may see the following message:
The system is not operational yet. Checking and repairing database are in progress. This may take a long time to finish.
When you see the BIOS boot options, press Tab slowly and repeatedly (to prevent the appliance from booting the currently installed version of the system) until the LILO boot prompt appears. For example:
5. At the boot prompt, start the restore utility by typing Restore_Serial.
The boot prompt appears after the following choices:
6. Type 1
and press Enter to load the interactive restore menu via the appliance’s serial connection.
Note: If you do not select a display mode, the restore utility defaults to the standard console after 30 seconds.
7. Press Enter to confirm the copyright notice.
8. Unless this is the first time you have restored the appliance to this major version, the utility automatically loads the last restore configuration you used. To continue, confirm the settings in a series of pages until the “Cisco Firepower Appliance <Version> Configuration Menu” appears.
The restore utility for Firepower devices uses an interactive menu to guide you through the restoration.
Note: Only reimage your appliances during a maintenance window. Reimaging resets appliances in bypass mode to a non-bypass configuration and disrupts traffic on your network until you reconfigure bypass mode. For more information, see Traffic Flow During the Restore Process.
The menu displays the options listed in the following table.
Navigate the menu using your arrow keys. To select a menu option, use the up and down arrows. Use the right and left arrow keys to toggle between the OK and Cancel buttons at the bottom of the page.
The menu presents two different kinds of options:
X
. To accept your selection, press Enter while the OK button is highlighted.In most cases, complete menu options 1, 2, 4, and 5, in order. Optionally, add menu option 3 to install system software and intrusion rule updates during the restore process.
If you are restoring an appliance to a different major version from the version currently installed on the appliance, a two-pass restore process is required. The first pass updates the operating system, and the second pass installs the new version of the system software.
If this is your second pass, or if the restore utility automatically loaded the restore configuration you want to use, you can start with menu option 4 : Downloading the ISO and Update Files and Mounting the Image. However, Cisco recommends you double-check the settings in the restore configuration before proceeding.
Note: To use a previously saved configuration, start with menu option 6: Saving and Loading Restore Configurations. After you load the configuration, skip to menu option 4: Downloading the ISO and Update Files and Mounting the Image.
To restore an appliance using the interactive menu, use the following steps:
1. 1 IP Configuration — see Identifying the Appliance’s Management Interface.
2. 2 Choose the transport protocol — see Specifying ISO Image Location and Transport Method.
3. 3 Select Patches/Rule Updates (optional) — Updating System Software and Intrusion Rules During Restore.
4. 4 Download and Mount ISO — see Downloading the ISO and Update Files and Mounting the Image.
5. 5 Run the Install — see Invoking the Restore Process.
The first step in running the restore utility is to identify the management interface on the appliance you want to restore, so that the appliance can communicate with the server where you copied the ISO and any update files. If you are using LOM, remember that the management IP address for the appliance is not the LOM IP address.
To identify the appliance’s management interface:
1. From the restore utility main menu, select 1 IP Configuration.
2. Select the appliance’s management interface (generally eth0).
3. Select the protocol you are using for your management network: IPv4 or IPv6.
Options for assigning an IP address to the management interface appear.
4. Select a method to assign an IP address to the management interface: Static or DHCP :
–If you select Static, a series of pages prompts you to manually enter the IP address, network mask or prefix length, and default gateway for the management interface.
–If you select DHCP, the appliance automatically detects the IP address, network mask or prefix length, and default gateway for the management interface, then displays the IP address.
5. When prompted, confirm your settings.
If prompted, confirm the IP address assigned to the appliance’s management interface.
After you configure the management IP address that the restore process will use to download files it needs, you must identify which ISO image you will use to restore the appliance. This is the ISO image that you downloaded from the Support Site (see Obtaining the Restore ISO and Update Files), and stored on a web server, FTP server, or SCP-enabled host.
The interactive menu prompts you to enter any necessary information to complete the download, as listed in the following table.
Note that the restore utility will also look for update files in the ISO image directory.
To specify the restore files’ location and transport method:
1. From the restore utility main menu, select 2 Choose the transport protocol.
2. On the page that appears, select either HTTP, FTP, or SCP.
3. Use the series of pages presented by the restore utility to provide the necessary information for the protocol you chose, as described in Table 4.
If your information was correct, the appliance connects to the server and displays a list of the Cisco ISO images in the location you specified.
4. Select the ISO image you want to use.
5. When prompted, confirm your settings.
6. Do you want to install a system software or intrusion rule update as a part of the restore process?
–If yes, continue with the next section, Updating System Software and Intrusion Rules During Restore.
–If no, continue with Downloading the ISO and Update Files and Mounting the Image. Note that you can use the system’s web interface to manually install updates after the restore process completes.
Optionally, you can use the restore utility to update the system software and intrusion rules after the appliance is restored to the base version in the ISO image. Note that only Management Centers require rule updates.
The restore utility can only use one system software update and one rule update. However, system updates are cumulative back to the last major version; rule updates are also cumulative. Cisco recommends that you obtain the latest updates available for your appliance; see Obtaining the Restore ISO and Update Files.
If you choose not to update the appliance during the restore process, you can update later using the system’s web interface. For more information, see the release notes for the update you want to install, as well as the Updating System Software chapter in the Firepower Management Center Configuration Guide.
To install updates as part of the restore process:
1. From the restore utility main menu, select 3 Select Patches/Rule Updates.
The restore utility uses the protocol and location you specified in the previous procedure (see Specifying ISO Image Location and Transport Method) to retrieve and display a list of any system software update files in that location. If you are using SCP, enter your password when prompted to display the list of update files.
2. Select the system software update, if any, you want to use.
You do not have to select an update; press Enter without selecting an update to continue. If there are no system software updates in the appropriate location, the system prompts you to press Enter to continue.
The restore utility retrieves and displays a list of rule update files. If you are using SCP, enter your password when prompted to display the list.
3. Select the rule update, if any, you want to use.
You do not have to select an update; press Enter without selecting an update to continue. If there are no rule updates in the appropriate location, the system prompts you to press Enter to continue.
The final step before you invoke the restore process is to download the necessary files and mount the ISO image.
To download and mount the ISO image:
1. From the restore utility main menu, select 4 Download and Mount ISO.
2. When prompted, confirm your choice. If you are downloading from an SCP server, enter your password when prompted.
The appropriate files are downloaded and mounted.
After you download and mount the ISO image, you are ready to invoke the restore process. If you are restoring an appliance to a different major version from the version currently installed on the appliance, a two-pass restore process is required. The first pass updates the operating system, and the second pass installs the new version of the system software.
First Pass of Two (Changing Major Versions Only)
When restoring an appliance to a different major version, a first pass by the restore utility updates the appliance’s operating system, and, if necessary, the restore utility itself.
Note: If you are restoring an appliance to the same major version, or if this is your second pass through the process, skip to the next procedure: Second or Only Pass.
To perform the first pass of a two-pass restore process:
1. From the restore utility main menu, select 5 Run the Install.
2. When prompted (twice), confirm that you want to reboot the appliance.
3. Monitor the reboot and invoke the restore process again:
If the system is performing a database check, you may see the following message:
The system is not operational yet. Checking and repairing database are in progress. This may take a long time to finish.
For a keyboard and monitor connection, quickly press one of the arrow keys to prevent the appliance from booting the currently installed version of the system.
For a serial or SOL/LOM connection, when you see the BIOS boot options, press Tab slowly and repeatedly until the LILO boot prompt appears. For example:
4. Indicate that you want to restore the system:
–For a keyboard and monitor connection, use the arrow keys to select System_Restore and press Enter.
–For a serial or SOL/LOM connection, type Restore_Serial at the prompt and press Enter.
In either case, the boot prompt appears after the following choices:
5. Select a display mode for the restore utility’s interactive menu:
–For a keyboard and monitor connection, type 0
and press Enter.
–For a serial or SOL/LOM connection, type 1
and press Enter.
If you do not select a display mode, the restore utility defaults to the standard console after 30 seconds.
Unless this is the first time you have restored the appliance to this major version, the utility automatically loads the last restore configuration you used. To continue, confirm the settings in a series of pages.
6. Press Enter to confirm the copyright notice.
Use the following procedure to perform the second or only pass through the restore process.
To perform the second or only pass through the restore process:
1. If you are performing the second pass of a two-pass restore process, download and mount the ISO image again, as described in Downloading the ISO and Update Files and Mounting the Image.
2. From the restore utility main menu, select 5 Run the Install.
3. Confirm that you want to restore the appliance and continue with the next step.
4. Choose whether you want to delete the appliance’s license and network settings.
In most cases, you do not want to delete these settings, because it can make the initial setup process shorter. Changing settings after the restore and subsequent initial setup is often less time consuming than trying to reset them now. For more information, see Next Steps.
5. Type your final confirmation that you want to restore the appliance.
The final stage of the restore process begins. When it completes, if prompted, confirm that you want to reboot the appliance.
Note: Reimaging resets appliances in bypass mode to a non-bypass configuration and disrupts traffic on your network until you reconfigure bypass mode. For more information, see Traffic Flow During the Restore Process.
You can use the restore utility to save a restore configuration to use if you need to restore a Firepower device again. Although the restore utility automatically saves the last configuration used, you can save multiple configurations, which include:
SCP passwords are not saved. If the configuration specifies that the utility must use SCP to transfer ISO and other files to the appliance, you will have to re-authenticate to the server to complete the restore process.
The best time to save a restore configuration is after you provide the information listed above, but before you download and mount the ISO image.
To save a restore configuration:
1. From the restore utility main menu, select 6 Save Configuration.
The utility displays the settings in the configuration you are saving.
2. When prompted, confirm that you want to save the configuration.
3. When prompted, enter a name for the configuration.
To load a saved restore configuration:
1. From the restore utility main menu, select 7 Load Configuration.
The utility presents a list of saved restore configurations. The first option, default_config, is the configuration you last used to restore the appliance. The other options are restore configurations that you have saved.
2. Select the configuration you want to use.
The utility displays the settings in the configuration you are loading.
3. When prompted, confirm that you want to load the configuration.
The configuration is loaded. If prompted, confirm the IP address assigned to the appliance’s management interface.
Restoring your appliance to factory default settings results in the loss of almost all configuration and event data on the appliance. Note that deleting license and network settings also resets LOM settings in some cases.
Retention of LOM settings after the restore process varies by model and Firepower version:
–If you restore the appliance to Version 6.2.3 or earlier, the system does not reset LOM settings regardless of whether you choose to delete the license and network settings.
–If you restore the appliance to Version 6.3+, the system resets LOM settings regardless of whether you choose to delete the license and network settings.
After you restore an appliance, you must complete an initial setup process:
–For Versions 5.4.x - 6.4.x, see Initial Setup Page: Management Centers.
–For Versions 6.5+, see Firepower Management Center Initial Configuration Wizard.
–For Versions 5.4.x - 6.4.x, see Installation and Initial Setup for Versions 5.4 - 6.4.x.
–For Versions 6.5+, see Installation and Initial Setup for Versions 6.5+.
After you complete the initial setup process:
If you need to restore a Firepower device to factory defaults and do not have physical access to the appliance, you can use Lights-Out Management (LOM) to perform the restore process. Note that you can use Lights-Out Management on the default ( eth0
) management interface only.
The LOM feature allows you to perform a limited set of actions on a Firepower device, using a Serial over LAN (SOL) connection. With LOM, you use a command line interface on an out-of-band management connection to perform tasks such as viewing the chassis serial number, or monitoring conditions such as fan speed and temperature.
The syntax of LOM commands depends on the utility you are using, but LOM commands generally contain the elements listed in the following table.
Note that the chassis power off
and chassis power cycle
commands are not valid on 70xx Family appliances. For a full list of LOM commands supported by the Firepower System, see the Configuring Appliance Settings chapter in the Firepower Management Center Configuration Guide.
Note: In some power cycle scenarios, the baseboard management controller (BMC) of a Firepower 7050 connected to the network via the management interface could lose the IP address assigned to it by the DHCP server. Because of this, Cisco recommends you configure the Firepower 7050 BMC with a static IP address. Alternately, you can disconnect the network cable and reconnect it, or remove and restore power to the device to force renegotiation of the link.
Before you can restore an appliance using LOM, you must enable LOM for both the appliance and the user who will perform the restore. Then, use a third-party Intelligent Platform Management Interface (IPMI) utility to access the appliance. You must also make sure you redirect the appliance’s console output to the serial port.
Before you can use LOM to restore an appliance, you must enable and configure the feature. You must also explicitly grant LOM permissions to users who will use the feature.
You configure LOM and LOM users on a per-appliance basis using each appliance’s local web interface. That is, you cannot use the Management Center to configure LOM on a Firepower device. Similarly, because users are managed independently per appliance, enabling or creating a LOM-enabled user on the Management Center does not transfer that capability to users on Firepower devices.
LOM users also have the following restrictions:
Note: For detailed instructions on the following tasks, see the Configuring Appliance Settings chapter in the Firepower Management Center Configuration Guide.
1. Select System > Configuration, then click Console Configuration.
2. Enable remote access using the Physical Serial Port before you specify the LOM IP address, netmask, and default gateway (or use DHCP to have these values automatically assigned).
Note: The LOM IP address must be different from the management interface IP address of the appliance.
To enable LOM capabilities for a Firepower System user:
1. Select System > User Management, then either edit an existing user to add LOM permissions, or create a new user that you will use for LOM access to the appliance.
2. On the User Configuration page, enable the Administrator role if it is not already enabled.
3. Enable the Allow Lights-Out Management Access check box and save your changes.
You use a third-party IPMI utility on your computer to create an SOL connection to the appliance.
If your computer is running Linux or Mac OS, use IPMItool. Although IPMItool is standard with many Linux distributions, you must install IPMItool on a Mac. First, confirm that your Mac has Apple's xCode developer tools package installed. Also, make sure the optional components for command line development are installed ("UNIX Development” and "System Tools" in newer versions, or "Command Line Support" in older versions). Finally, install MacPorts and IPMItool. For more information, use your favorite search engine or see these sites:
For Windows environments, use ipmiutil, which you must compile yourself. If you do not have access to a compiler, you can use ipmiutil itself to compile. For more information, use your favorite search engine or see this site:
You can preconfigure your Management Center at a staging location (a central location to preconfigure or stage multiple appliances) to be deployed at a target location (any location other than the staging location).
To preconfigure and deploy an appliance to a target location, perform the following steps:
Note: Save all packing materials and include all reference material and power cords when repackaging the appliance.
Before preconfiguring the appliance, collect the network settings, licenses, and other pertinent information for the staging location and the target location.
Note: It can be helpful to create a spreadsheet to manage this information at the staging location and the target location.
During the initial setup, you configure your appliance with enough information to connect the appliance to the network and install the system.
At a minimum, you need the following information to preconfigure your appliance:
You can change some default configurations, such as:
Note: In some power cycle scenarios, the baseboard management controller (BMC) of a 3D7050 connected to the network via the management interface could lose the IP address assigned to it by the DHCP server. Because of this, Cisco recommends you configure the 3D7050 BMC with a static IP address. Alternately, you can disconnect the network cable and reconnect it, or remove and restore power to the device to force renegotiation of the link.
Keep in mind the following considerations:
Use the installation procedures described in Installation and Initial Setup for Versions 5.4 - 6.4.x and Install the Appliance. For additional information, see the Cisco Firepower Management Center 750, 1500, 2000, 3500, and 4000 Hardware Installation Guide.
When preconfiguring the system, keep the following in mind:
To prepare the appliance for shipment, you must safely power down and repackage the appliance:
Use the following procedure if you need to delete a license for any reason. Keep in mind that, because Cisco generates licenses based on each Management Center’s unique license key, you cannot delete a license from one Management Center and reuse it on a different Management Center. For more information, see See Licensing the Firepower System in the Firepower Management Center Configuration Guide.
2. Next to the license you want to delete, click the delete icon ().
Deleting a license removes the licensed capability from all devices using that license. For example, if your Protection license is valid and enabled for 100 managed devices, deleting the license removes protection capabilities from all 100 devices.
To prepare the appliance for shipment to the target location, you must safely power down and repackage the appliance. Keep in mind the following considerations:
If your appliance is correctly preconfigured for target deployment, you can install and deploy the appliance without further configuration.
If you have difficulty logging into the appliance, the preconfiguration may have an error. Try the following troubleshooting procedures:
If you continue to experience difficulty, contact your IT department.
You can securely scrub the hard drive on Management Centers and Firepower devices to ensure that its contents can no longer be accessed. For example, if you need to return a defective appliance that contains sensitive data, you can use this feature to overwrite the data.
This mode of scrubbing the disk meets the following military standard:
The DoD scrub sequence is compliant with the DoD 5220.22-M procedure for sanitizing removable and non-removable rigid disks which requires overwriting all addressable locations with a character, its complement, then a random character, and verify. Please refer to the DoD document for additional constraints.
You scrub the hard drive using an option in the interactive menu described in Using the Interactive Menu to Restore an Appliance.
1. Follow the instructions in one of the following sections to display the restore utility’s interactive menu, depending on how you are accessing the appliance:
–Starting the Restore Utility Using KVM or Physical Serial Port
–Starting the Restore Utility Using Lights-Out Management
2. From the restore utility main menu, select 8 Wipe Contents of Disk.
3. When prompted, confirm that you want to scrub the hard drive.
The hard drive is scrubbed. The scrub process may take several hours to complete; larger drives take longer.
For a complete list of the Cisco Firepower Management Center series documentation and where to find it, see the documentation roadmap at the following URL:
https://www.cisco.com/c/en/us/support/security/defense-center/tsd-products-support-series-home.html