Complete the Threat Defense Initial Configuration Using the CLI
Connect to the threat defense CLI to perform initial setup, including setting the Management IP address, gateway, and other basic networking settings using the setup wizard. The dedicated Management interface is a special interface with its own network settings. If you do not want to use the Management interface for manager access, you can use the CLI to configure a data interface instead. You will also configure management center communication settings. When you perform initial setup using the device manager, all interface configuration completed in the device manager is retained when you switch to the management center for management, in addition to the Management interface and manager access interface settings. Note that other default configuration settings, such as the access control policy, are not retained.
This procedure applies to all models except for the Firepower 4100/9300.
Procedure
Step 1 | Connect to the threat defense CLI, either from the console port or using SSH to the Management interface, which obtains an IP address from a DHCP server by default. If you intend to change the network settings, we recommend using the console port so you do not get disconnected. (Firepower and Secure Firewall hardware models) The console port connects to the FXOS CLI. The SSH session connects directly to the threat defense CLI. | ||||
Step 2 | Log in with the username admin and the password Admin123. (Firepower and Secure Firewall hardware models) At the console port, you connect to the FXOS CLI. The first time you log in to FXOS, you are prompted to change the password. This password is also used for the threat defense login for SSH.
Example:
| ||||
Step 3 | (Firepower and Secure Firewall hardware models) If you connected to FXOS on the console port, connect to the threat defense CLI. connect ftd Example:
| ||||
Step 4 | The first time you log in to the threat defense, you are prompted to accept the End User License Agreement (EULA) and, if using an SSH connection, to change the admin password. You are then presented with the CLI setup script.
Defaults or previously entered values appear in brackets. To accept previously entered values, press Enter.
See the following guidelines:
Example:
| ||||
Step 5 | Identify the management center that will manage this threat defense. configure manager add {hostname | IPv4_address | IPv6_address | DONTRESOLVE} reg_key [nat_id]
Example:
Example:If the management center is behind a NAT device, enter a unique NAT ID along with the registration key, and specify DONTRESOLVE instead of the hostname, for example:
Example:If the threat defense is behind a NAT device, enter a unique NAT ID along with the management center IP address or hostname, for example:
| ||||
Step 6 | (Optional) Configure a data interface for manager access. configure network management-data-interface You are then prompted to configure basic network settings for the data interface.
See the following details for using this command. See also Using the Threat Defense Data Interface for Management.
Example:
Example:
| ||||
Step 7 | (Optional) Limit data interface access to a manager on a specific network. configure network management-data-interface client ip_address netmask By default, all networks are allowed. |
What to do next
Register your device to a management center.