Cisco FTD & Firepower Management Center | 3 Hours Exclusive Workshop.

Cisco FTD & Firepower Management Center | 3 Hours Exclusive Workshop.

The video is about initializing and configuring the Firepower Management Center (FMC) for centralized management of Firepower Threat Defense (FTD) firewalls. Here are the key points discussed:

  1. Initialization of FMC: The first step is to initialize the FMC and configure its IP address. This is done through the FMC Command Line Interface (CLI) and the Linux shell.
  2. Setting up Smart Licensing: The video explains how to configure smart licensing for FTD firewalls. This involves generating a license token and enabling evaluation licenses.
  3. Updates and Patch Management: The FMC needs to be regularly updated with the latest software patches, vulnerability databases, rule updates, and URL filter databases. These updates ensure that the FMC and FTD firewalls have the latest threat intelligence and security policies.
  4. Geolocation and URL Filtering: The FMC allows you to configure geolocation-based policies and URL filtering to block or allow traffic based on countries, states, cities, or specific URLs.
  5. Integration with Other Services: The FMC can be integrated with other services such as Active Directory, Cisco ISE (Identity Services Engine), Ice, and external SIEM solutions like Splunk.
  6. Global Configuration: The video highlights important global configuration settings, including access control lists, access to FMC through SSH and HTTPS, email notifications for device reconciliation, and SMTP relay configuration for sending emails from the FMC.

Overall, the video provides a step-by-step guide on how to initialize, configure, and manage the FMC for centralized management of FTD firewalls.


Part 2 Video

The video discusses the configuration of a firewall device using the Firepower Device Manager (FDM). Here are the key points:

  1. Device Management: The video shows how to access the device management section where you can configure various settings for the firewall.
  2. Interfaces: You can configure the interfaces of the firewall, including IP addresses, security zones, and routing settings.
  3. Device Details: The video explains the various details you can view about the firewall device, such as name, mode, configuration, and health status.
  4. Policies: The video discusses the concept of policies in FDM and how they define what the firewall does. It covers access control policies, next-generation firewall analysis, and other policy settings.
  5. Objects: The video explains how to create and use objects in FDM, such as network objects, DNS objects, and port objects.
  6. Platform Settings: The video covers platform settings for the firewall, including time synchronization, DNS configuration, banner settings, and SSH access.
  7. Deployment: The video shows how to deploy the changes made in the configuration to the firewall device.
  8. Verification: The video demonstrates how to verify the configuration by checking the IP addresses, DHCP settings, and interface mappings.
  9. Logging and Analysis: The video briefly mentions that you can view logs and connection events to monitor the firewall’s activity.
  10. Future Topics: The video mentions that future topics will cover packet flow, access control policies, VPN, ICE, and other advanced features.

Overall, the video provides a step-by-step guide to configuring a firewall device using FDM, covering important settings and concepts along the way.

Join Live Trainings with Lab Access - https://www.nwkings.com


要查看或添加评论,请登录

Atul Sharma ?????的更多文章

社区洞察

其他会员也浏览了