Complete the Initial Configuration of a Secure Firewall Threat Defense Device Using the CLI
Connect to the device's CLI to perform initial setup, including setting the management IP address, gateway, and other basic networking settings using the setup wizard. Ensure all DNS and firewall ports are accessible for communication.
The dedicated management interface is a special interface with its own network settings. If you do not want to use the management interface, you can use the CLI to configure a data interface instead.
This configuration is ideal for devices that are going to be onboarded with their CLI registration key.
Note | Do not use this configuration procedure for devices that are onboarding with zero-touch provisioning. |
Procedure
Step 1 | Connect to the device's CLI, either from the console port or using SSH to the management interface. If you intend to change the network settings, we recommend using the console port so you do not get disconnected. (Firepower and Secure Firewall hardware models) The console port connects to the FXOS CLI. The SSH session connects directly to the threat defense CLI. | ||||
Step 2 | Log in with the username admin and the password Admin123. (Firepower and Secure Firewall hardware models) At the console port, you connect to the FXOS CLI. The first time you log in to FXOS, you are prompted to change the password. This password is also used for the threat defense login for SSH.
Example:
| ||||
Step 3 | (Firepower and Secure Firewall hardware models) If you connected to FXOS on the console port, connect to the threat defense CLI. connect ftd Example:
| ||||
Step 4 | The first time you log in to the device, you are prompted to accept the End User License Agreement (EULA) and, if using an SSH connection, to change the admin password. You are then presented with the CLI setup script.
Defaults or previously entered values appear in brackets. To accept previously entered values, press Enter.
See the following guidelines:
| ||||
Step 5 | (Optional) Configure a data interface for management center access. configure network management-data-interface You are then prompted to configure basic network settings for the data interface.
See the following details for using this command. See About Data Interfaces for more informatio.
Example:
Example:
| ||||
Step 6 | (Optional) Limit data interface access to Security Cloud Control on a specific network. configure network management-data-interface client ip_address netmask By default, all networks are allowed. |