About Threat Defense Management by CDO
About Threat Defense Management by CDO
About the Cloud-delivered Firewall Management Center
The cloud-delivered Firewall Management Center offers many of the same functions as an on-premises
management center and has the same look and feel. When you use CDO as the primary manager, you can use
an on-prem management center for analytics only. The on-prem management center does not support policy
configuration or upgrading.
CDO Onboarding Methods
Use one of the following methods to onboard a device.
Low-Touch Provisioning
• Send the threat defense to the remote branch office. Do not configure anything on the device, because
Note
• At the branch office, cable and power on the threat defense.
• Finish onboarding the threat defense using CDO.
Manual Provisioning
Use the manual onboarding wizard and CLI registration if you need to perform any pre-configuration or if
you are using a manager interface that low-touch provisioning does not support.
Threat Defense Manager Access Interface
This guide covers outside interface access because it is the most likely scenario for remote branch offices.
Although manager access occurs on the outside interface, the dedicated Management interface is still relevant.
The Management interface is a special interface configured separately from the threat defense data interfaces,
and it has its own network settings.
• The Management interface network settings are still used even though you are enabling manager access
• All management traffic continues to be sourced from or destined to the Management interface.
• When you enable manager access on a data interface, the threat defense forwards incoming management
• For outgoing management traffic, the Management interface forwards the traffic over the backplane to
Manager Access Requirements
Manager access from a data interface has the following limitations:
Cisco Firepower 2100 Getting Started Guide
126
low-touch provisioning may not work with pre-configured devices.
You can preregister the threat defense on CDO using the threat defense serial
number before sending the device to the branch office.
on a data interface.
traffic over the backplane to the Management interface.
the data interface.
Threat Defense Deployment with CDO