Professional Documents
Culture Documents
POV Workshop
Training
Training &
& Incentives
Incentives &
& Partner
Partner
POV
POV Delivery
Delivery
Enablement
Enablement Promotions
Promotions Profitability
Profitability
4
POV Methodology
Find
Find
Opportunity
Opportunity
Find
Find Presentation
Presentation
Opportunity
Opportunity &
& Demo
Demo
Find
Find Presentation
Presentation Proof
Proof of
of Value
Value
Opportunity
Opportunity &
& Demo
Demo
• Software Download
• Software Installation
• Licensing
• Initial Configuration
• Customer Report Generation
• Device Sanitization
9
On-Site Sensor with On-Site
• Build VMware ESXi server
FMC Internet • Download and install FMC VM
• Add Licenses to FMC
• Update FTD Software
Firewall • Place FTD on span or tap port
• Link FTD with FMC
• Configure Policies:
span / tap • System
Switch FTD • Health
• Intrusion
• File
• Access Control
• Perform POV
• Generate Risk Reports
Users Active VMware Risk
Directory ESXi FMC Reports • Sanitize (FTD, FMC)
LAN
On-Site Sensor with On-Site
FMC Internet
• For FTD setup via FMC, the
configuration guide can be found
here:
Firewall https://www.cisco.com/c/en/us/s
upport/security/firepower-ngfw/p
roducts-installation-and-configura
tion-guides-list.html
span / tap
Switch FTD
• FMC can be setup in a virtual
environment (shown here) or as a
physical appliance
• Perform POV
• Generate Risk Reports
Users Active
Directory • Sanitize (FTD, FMC)
LAN
On-Site Sensor with dCloud FMC
(recommended)
Internet dCloud
FMC
• Pre-configured & pre-licensed
Manager
Firewall • Reduced on-site deployment
TCP 8443
• Ensures consistency and saves
Risk time
Switch Reports
span / tap • Eligible for active Cisco incentives
FTD
Users Active
Directory
LAN
On-Site Virtual Sensor with FMC or FDM
Internet
• For FTDv setup, the FMC and FDM
configuration guides can be found
here:
Firewall https://www.cisco.com/c/en/us/s
upport/security/firepower-ngfw-vi
rtual/products-installation-guides-
list.html
Switch
span / tap • Options for on-site or dCloud
management still apply
FTDv
Users Active VMware
Directory ESXi
LAN
On-Site Sensor with dCloud FMC
(recommended)
Internet dCloud
• The remainder of this guide will use
FMC the on-site sensor with dCloud FMC
option and Firepower 2K Appliance
Firewall
for the POV workshop
TCP 8443
Users Active
Directory
LAN
Deployment Options Summary
• There are many different options for a POV deployment
• Browse to https://dcloud.cisco.com
• Select Login
dCloud Features / Access
Setting up a dCloud POV Sessions
• Browse to https://dcloud.cisco.com
• Select Login
• Login in with CCO ID
dCloud Features / Access
Setting up a dCloud POV Sessions
• Browse to https://dcloud.cisco.com
• Select Login
• Login in with CCO ID
• Select Catalog from the toolbar
• Search for Firepower POV
dCloud Features / Access
Setting up a dCloud POV Sessions
• Browse to https://dcloud.cisco.com
• Select Login
• Login in with CCO ID
• Select Catalog from the toolbar
• Search for Firepower POV
• Select Schedule for desired POV demo
dCloud Features / Access
Setting up a dCloud POV Sessions
• Browse to https://dcloud.cisco.com
• Select Login
• Login in with CCO ID
• Select Catalog from the toolbar
• Search for Firepower POV
• Select Schedule for desired POV demo
• Enter POV timeframe and click Next
dCloud Features / Access
Setting up a dCloud POV Sessions
• Browse to https://dcloud.cisco.com
• Select Login
• Login in with CCO ID
• Select Catalog from the toolbar
• Search for Firepower POV
• Select Schedule for desired POV demo
• Enter POV timeframe and click Next
• Enter relevant information and click Schedule
dCloud POV Duration
25
Data Collection Worksheet
• Select Details
• Note the Owner and Session ID
Capture Relevant FMC Information
• Select Details
• Note the Owner and Session ID
• If connecting via SSH to the Management 1/1 interface, use the connect fxos command to
access the FXOS CLI
• Use the download image command with the protocol of your choice to transfer the FTD
package file previously downloaded onto the Firepower 2110 appliance
• Supported methods include FTP, TFTP, SFTP, SCP and USB
Install & Configure FTD
• Check the status of the download using the show download status command
• Use the auto install and install security-pack commands with the exact version of the
package file that was download to install
Install & Configure FTD
• A warning that the system will be re-imaged will be prompted for confirmation
• After confirmation, the status can be monitored using the show command before the system
automatically reboots
Install & Configure FTD
• Within 15-30 minutes, FXOS and FTD will be accessible
• In FXOS, use the connect ftd command, which will launch the EULA and initial configuration for FTD
• Note that you may have to wait a few additional minutes for FTD to finish starting up to use this command
• Enter no for the device to be managed locally as for this scenario FMC in dCloud will be utilized
instead of the local FDM
• It is possible to change this setting after the initial configuration is complete
• If local management is chosen, the device will be configured in routed mode
Install FTD Summary
• Change the management port to 8443 via configure network command (only for dCloud FMC)
• Verify the port has successfully changed to 8443 using the show network command
Install & Configure FTD
• Use the configure manager add command to have FTD connect to FMC
• FMC IP is the Public Address provided from the dCloud session details
• The registration key and nat-id used in this example is C1sco12345 and 12345
• Any registration key and unique nat-id may be used so long as it is noted since it will also be
needed when configuring the FMC
• The nat-id is used for scenarios in which one of either the FMC or FTD is behind a PAT network
device and therefore cannot be reached via a 1:1 or static IP assignment
Access the FMC
• Browse to the FMC using https to the Public Address from dCloud session details
• Login using Owner for the FMC username and Session ID for the password
Smart Licenses
• Navigate to System > Licenses > Smart Licenses
• Click Register
Connect FTD to FMC
• The FMC will look for the FTD device
• Click Save
Object Management: HOME_NET Variable
• Include the new network object in the HOME_NET variable
• Click Save, then Save, then Yes
Object Management: Network Discovery Policy
• Select to edit device and then select to edit interface connect to the network
Configure Passive Interface
• Provide a Name
• Ensure the interface is Enabled
• Set Mode to Passive
• Define a new Security Zone
• Click OK
Configure Passive Interface
• When configuration changes are made, a reminder to save them appears at the top right
• Click Save before proceeding with deploying the changes to the FTD device
FMC Configuration Summary
• Edit a system-provided variable (HOME_NET)
• When the deployment is completed, the status of the passive interface should turn green
Confirm Traffic Flow to FTD
• Browse to Analysis > Connections > Events
• If events are not populating, verify that interfaces are connected, enabled, and the
SPAN port or tap is functional
Risk Reports
Proof of Value
• Focus on Win Criteria from the FTD POV Best Practices guide
• End dCloud session which will automatically delete the FMC VM and any customer information