Home > Store

Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)

Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)

eBook (Watermarked)

  • Your Price: $44.79
  • List Price: $55.99
  • Estimated Release: Nov 30, 2017
  • Includes EPUB, MOBI, and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    MOBI MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.


  • Copyright 2018
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 450
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-467951-2
  • ISBN-13: 978-0-13-467951-8

This is the definitive guide to best practices and advanced troubleshooting techniques for the newest versions of Cisco’s flagship Firepower Threat Defense (FTD) system running on Cisco ASA, VMWare ESXi, and FXOS platforms.

The authors draw on unsurpassed personal experience supporting Cisco Firepower customers worldwide, presenting detailed knowledge for configuring Firepower features to maximize performance and avoid trouble. Writing for consultants, service providers, and enterprise or government technical and security professionals, they show how to use Firepower’s robust tools to investigate a wide variety of technical issues. Readers will also find expert guidance on other technologies that integrate Sourcefire capabilities, including ACS, ISE, and Splunk. Coverage includes:

  • Best practices for installation and hardware troubleshooting
  • Best practices and troubleshooting of deployment issues, traffic control policies, system administration, user identity, and access control
  • Best practices for generating log, report and troubleshoot data

Each consistently-organized chapter contains definitions, flowcharts or architectural diagrams, best practices, configuration steps (with detailed screenshots), troubleshooting tools and techniques, and FAQs drawn directly from issues raised by customers at Cisco Technical Assistance Centers.

The first Cisco guide to cover Firepower material that will be included in the new CCIE Security v5 exams, Cisco Firepower Threat Defense (FTD) also includes quizzes to help CCIE candidates prepare.

Sample Content

Table of Contents

Part I: Best Practices for Installation and Hardware Troubleshooting
1. Firepower Threat Defense (FTD) on ASA
2. Firepower Threat Defense (FTD) Deployment on VMWare ESXi
3. Firepower Threat Defense (FTD) on FXOS
4. Management of Firepower Threat Defense

Part II: Best Practices and Troubleshooting of Deployment Issues
5. Issues with Device Registration and Communication
6. Issues with Licensing a Firepower Device
7. Interface and Zones
8. High Availability

Part III: Best Practices and Troubleshooting of Traffic Control Policies
9. Issues with Network Discovery and Vulnerability Database (VDB)
10. IP Address and Location Based Access Control
11. Intelligence and Reputation Based Traffic Control
12. Decryption and Inspection of SSL Encrypted Traffic
13. Routing, and Network Address Translation (NAT)

Part IV: Best Practices and Troubleshooting of System Administration
14. Issues with Update
15. Process and Task Management
16. Issues with Network and System Performance
17. Issues with Time Synchronization
18. Managing the Disk Space and the Disk Health

Part V: Best Practices and Troubleshooting of User Identity and Access Control
19. Issues with User Management
20. Issues with Integration of Firepower with ISE and ACS
21. Issues with User Agent
22. Issues with Integration of Splunk or Any Event Streamer (eStreamer)

Part VI: Best Practices for Generating Log, Report and Troubleshoot Data
23. Real Time Logging, Alerting, and Correlation
24. Searching, Reporting, and Generating Troubleshooting Data


Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership