Review the Network Deployment and Default Configuration
Review the Network Deployment and Default Configuration
You can manage the FTD using FDM from either the Management 1/1 interface or the inside interface. The
dedicated Management interface is a special interface with its own network settings.
The following figure shows the recommended network deployment for the Firepower 2100. If you connect
the outside interface directly to a cable modem or DSL modem, we recommend that you put the modem into
bridge mode so the FTD performs all routing and NAT for your inside networks. If you need to configure
PPPoE for the outside interface to connect to your ISP, you can do so after you complete initial setup in FDM.
Cisco Firepower 2100 Getting Started Guide
8
Pre-Configuration
Power on the Device, on page
FTD CLI
(Optional) Change Management Network Settings at the CLI, on page
Firepower Device
Log Into FDM, on page
Manager
Firepower Device
Complete the Initial Configuration, on page
Manager
Cisco Defense
Log Into CDO with Cisco Secure Sign-On , on page
Orchestrator
Cisco Defense
Onboard the Device to CDO, on page
Orchestrator
Cisco Defense
Configure the Device in CDO, on page
Orchestrator
Cisco Commerce
(Optional)
Workspace
Smart Software
Configure Licensing, on page
Manager
Cisco Defense
Configure Licensing, on page
Orchestrator
Server.
Cisco Defense
Manage the Device with CDO, on page
Orchestrator
Firepower Threat Defense Deployment with CDO
12.
14.
21.
Configure Licensing, on page
29: Generate a license token.
29: Register the device with the Smart Licensing
15.
19.
24.
29: Obtain feature licenses.
34.
13.