Easy Deployment Guide for Secure Firewall Threat Defense 1000, 2100, and 3100 Series

This document provides information on easy deployment of threat defense devices using zero-touch provisioning for customers using the cloud-delivered Firewall Management Center.

This document is targeted for the following device models:

  • Firepower 1000 series devices with software version 7.2 or later

  • Firepower 2100 series devices with software version 7.2 or later

  • Secure Firewall 3100 series devices with software version 7.2 or later


    Note


    Secure Firewall 3105 is supported on software version 7.3 or later.


Branch Manager: Prepare and Connect a New Threat Defense Device to Your Network

Zero-Touch Provisioning allows anybody to connect a new threat defense device to their network so that their IT department can onboard the device to the cloud-delivered Firewall Management Center and configure it remotely.

Make sure the device is unconfigured or set up as new. Zero-Touch Provisioning is intended for new devices only. Pre-configuration can prevent zero-touch provisioning, based on your settings.

Do you need to reimage your device?

If your device is not already running version 7.2, you can reimage the device to support zero-touch provisioning. See the appropriate guide for your device model:

Connect a New Threat Defense to Your Network

If you received a device at your branch office and your job is to plug it in to your network, watch this video.

The video describes your device and the LED sequences on the device that indicate the device's status. You can confirm the device's status with your IT department by looking at the LEDs. These are the steps described in the video:

  1. Look at the shipping carton the device came in. It should have a plain white sticker on it identifying the software installed on the device. The software package number should look similar to one in the following table:

    Model Numbers that Support Zero-Touch Provisioning Supported Software Version Software Package
    Firepower 1000 series device models: 1010, 1120, 1140, 1150 7.2 or later SF-F1K-TDx.x-K9
    Firepower 2100 series device models: 2110, 2120, 2130, 2140 7.2 or later SF-F2K-TDx.x-K9
    Secure Firewall 3100 series device models: 3110, 3120, 3130, 3140 7.2 or later SF-F3K-TDx.x-K9
    Secure Firewall 3100 series device model: 3105 7.3 or later SF-F3K-TDx.x-K9
  2. Before you rack the device or throw away the shipping carton, record your device's serial number and send it to your IT department. They need it to manage the device. The serial number of the device is located on the shipping carton the device came in, and on a label affixed to the device itself. See Find Your Device's Serial Number for more information.

  3. Unpack the box and take inventory of the contents. Keep the shipping carton until you have plugged in the device, you have connected it to your network, and the device has successfully contacted the Cisco cloud.

  4. Connect the device to power.

  5. Connect the network cable from the Ethernet 1/1 interface to your WAN modem. Your WAN modem is your branch's connection to the internet and your device's route to the internet as well.


    Note


    Do not connect the network cable from the device's Management interface to your WAN.


    Figure 1. Firepower 1010 Cabling
    Figure 2. Firepower 1100 Cabling
    Figure 3. Firepower 2100 Cabling
    Figure 4. Secure Firewall 3100 Cabling
  6. Observe the Status, SYS, or M (Managed) LED on the device to determine if the device has reached the Cisco cloud. The table below provides the LED statuses and the approximate time they occur after the you connect the ethernet cables. It may take a little more time or a little less time for the firewall to reach the Cisco cloud based on network conditions and the firewall model you are working with.

    LED Status Description Time After Device Powered On (minutes:seconds)

    Fast flashing green

    Seen on Status or SYS LED on all models.

    The device is booting up correctly. 01:00

    Fast flashing amber

    Seen on Status or SYS LED on all models.

    The device failed to boot correctly. 01:00

    Solid green

    Seen on Status or SYS LED on all models.

    The application is loaded on the device. 10:00

    Solid amber

    Seen on Status or SYS LED on all models.

    The application failed to load correctly on the device. 10:00
    Slow flashing green

    Seen on Status or SYS LED on Firepower 1000 and Firepower 2100 series devices.

    Seen on M LED of Secure Firewall 3100 series devices.

    The device is connected to the Cisco cloud. 15:00
    Alternating green and amber

    Seen on Status or SYS LED on Firepower 1000 and Firepower 2100 series devices.

    Seen on M LED of Secure Firewall 3100 series devices.

    The device failed to connect to the Cisco cloud. 15:00

After you complete this task, locate and supply the device's serial number to your IT administrator. The IT admin will configure the firewall remotely.

Find Your Device's Serial Number

Your IT department needs your device's serial number to connect to the device and manage it remotely. You can find the serial number in two different places.

The Label on the Shipping Carton

The serial number is printed on the label on the shipping carton the device came in. Here is an example:

serial number on carton

The Label on the Chassis

Firepower 1010: The serial number is on a label on the bottom of the device.

Back of Firepower 1010 with serial number

Firepower 1100: The serial number is on a label on the back of the device or on the bottom of the device.

Firpower 1100 back

Firepower 2100: The serial number is on a label on a pull-out tab on the front of the device.

Firepower 2100 serial number tab

Secure Firewall 3100:The serial number is on a label on a pull-out tab on the front of the device.

Secure Firewall 3100 serial number tab

(Optional) Connect to the Device Using a Console Cable

You can connect a console cable from a device such as a laptop to your firewall, open up a terminal window, and enter a few commands to display the device's serial number.


Note


This procedure connects a computer to the firewall using a console cable in order to retrieve the device's serial number, it is for advanced users who are comfortable working with a command line interface and, possibly, installing software drivers on their laptops.


  1. See Connect to the Console Port for instructions on how to connect a laptop to your device using a console cable.

    For more information, please refer to the Getting Started Guide for your specific model.

  2. Log in to the device as the admin user. You need to enter the default password if this is your first login attempt: Admin123. You will then be prompted to change the password.

  3. At the firepower# prompt, enter show chassis detail. Here is an example of the output from a 1010 series device. Your device's model number will be listed in the Product Name field:

    firepower# show chassis detail 
    
    Chassis:
        Chassis: 1
        Overall Status: Operable
        Oper qualifier: N/A
        Operability: Operable
        Product Name: Cisco Firepower 1010 Security Appliance
        PID: FPR-1010
        VID: V01
        Vendor: Cisco Systems, Inc
        Serial (SN): JMX2405X0R9
        HW Revision: 0.6
        PCB Serial Number: JAD24040S6L
        Power State: Ok
        Thermal Status: Ok
        Boot Status: OK
        Current Task:
    firepower# 

    The output shows two serial numbers. You must report the value of the Serial (SN) field to your IT department to complete the onboarding process.

    When you onboard the device, for the Password Reset area, be sure to choose No because you already set the password.

Onboard a Device to Cloud-delivered Firewall Management Center Using Zero-Touch Provisioning

If you are a cloud-delivered Firewall Management Center administrator and someone at a branch office has connected a device to their network, and your job is to onboard it to cloud-delivered Firewall Management Center using its serial number, follow the zero-touch provisioning method described in this section.


Note


If you are a cloud-delivered Firewall Management Center administrator and your task is to onboard a fully configured new device, use the CLI registration key method to onboard the device. See Onboard an FTD to the Cloud-delivered Firewall Management Cloud-delivered Firewall Management Center Using Serial Number. guide for more information.


Ensure the device has the following environment:

  • The device has at least Version 7.2 installed.

  • The device must be new and unconfigured or freshly installed.

Procedure


Step 1

Log in to CDO.

Step 2

In the left pane, click Inventory.

Step 3

Click the FTD tile.

Step 4

Under Management Mode, ensure you select FTD. By selecting FTD under Management Mode, you will not be able to manage the device using the previous management platform. All existing policy configurations except for interface configurations will be reset. You must re-configure policies after you onboard the device.

Note

 

If you are using the 90-day Evaluation License, the number of days left is listed under the FTD and FDM toggle options. Click the Manage Subscription License link to opt into a full subscription license. See Managed Device Licensing Types for more information.

Step 5

Click the Use Serial Number tile.

Step 6

From the Select FMC drop-down list, select Cloud-Delivered FMC and click Next.

Step 7

In the Connection area, enter the Device Serial Number and the Device Name. Select Next.

Step 8

In the Password Reset area, choose an option depending on whether the device is logged into and configured for a manager:

  • If your device is brand new and has never been configured for a manager, click Yes, this new device has never been logged into or configured for a manager.

  • If your device has been previously registered for a manager or is still registered to a manager, click No, this device has been logged into and configured for a manager.

Step 9

Click Next.

Step 10

In the Policy Assignment step, use the drop-down menu to select an access control policy to deploy once the device is onboarded. If you have no policies configured, select the Default Access Control Policy.

Step 11

Select the subscription licenses you want to apply to the device. Click Next.

Step 12

In the Done area, click Go to Inventory.


What to do next

Once the device is synchronized, select the device you just onboarded from the Inventory page and select any of the options listed under the Device Management pane located to the right. We strongly recommend the following actions:
  • If you did not already, create a custom access control policy to customize the security for your environment. See Access Control Overview in Managing Firewall Threat Defense with Cloud-Delivered Firewall Management Center in Cisco Defense Orchestrator for more information.

  • Enable Cisco Security Analytics and Logging (SAL) to view events in the CDO dashboard or register the device to an Secure Firewall Management Center for security analytics. See Cisco Security Analytics and Logging in Managing Firewall Threat Defense with Cloud-Delivered Firewall Management Center in Cisco Defense Orchestrator for more information.