Firepower Basic Setup

This guide shows how to provide a basic configuration to the Cisco Firepower via the Firepower Device Manager. This setup can be used at home or in small business environments.

Introduction

The Firepower firewall provides security by inspecting incoming and outgoing traffic and blocking unauthorized access. It is a stateful firewall that monitors incoming and outgoing network traffic and enforces security policies.

Description
Firewall security: The ASA provides a stateful firewall that monitors incoming and outgoing network traffic and enforces security policies
VPN: The ASA supports a variety of VPN protocols, including PPTP, L2TP, and IPsec, and allows remote users to securely connect to a private network over the internet
Intrusion prevention: The ASA's IPS capabilities can inspect network traffic for threats and block them in real-time
URL filtering: The ASA can block access to certain websites based on their URL or category, providing an additional layer of security
High availability: The Cisco ASA supports high availability through the use of multiple devices in a failover configuration, ensuring that network traffic continues to be protected even in the event of a device failure.

Topology

In this topology connectivity to the internet is possible via a home-router provided by an internet service provider. The ISP-router in this design offers a private network (192.168.1.0 /24). Most users at home connect their clients (notebooks, TVs, smartphones, etc.) directly to the home-router and receive an IP address from the built in DHCP server. The clients communicate to the internet via the gateway (192.168.1.254 for example). To add more security, the firewall will<br /> enable the use of more subnets, inspect the incoming communication and translate the IP addresses of all clients to an IP address used by the firewall (port address translation). The CLI output below shows the device inventory, software version and shows that the device is running in router mode.

Description
The "outside interface" refers to the interface facing the public network or the Internet
The "inside interface" refers to the interface facing the internal network or the private network
The ASA firewall acts as a gatekeeper between the public network and the internal network, inspecting and filtering incoming and outgoing traffic
It allows internal users to access the Internet or external networks through the outside interface while enforcing security policies to protect the internal network
The inside interface is considered as a trusted network and is typically not subjected to the same level of security restrictions as the outside interface
Make sure to activate the "Security Plus" license to unlock more functionalities for the device
show inventory

Name: "module 0", DESCR: "Firepower 1010 Appliance, Desktop, 8 GE, 1 MGMT"
PID: FPR-1010          , VID: V01     , SN: ############
show version

LABFW01# show version
Boot Loader version: 1.0.05
System version: 2.6(1.133)
Service Manager version: 2.6(1.133)
LABFW01#

Premium Access

Log in or register - Premium members can access all content without restrictions.

Get Premium

0 Comments

Submit a Comment