Home > Store

Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP), Rough Cuts

Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP), Rough Cuts

Rough Cuts

  • Available to Safari Subscribers
  • About Rough Cuts
  • Rough Cuts are manuscripts that are developed but not yet published, available through Safari. Rough Cuts provide you access to the very latest information on a given topic and offer you the opportunity to interact with the author to influence the final publication.

Also available in other formats.

Description

  • Copyright 2018
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 450
  • Edition: 1st
  • Rough Cuts
  • ISBN-10: 0-13-467955-5
  • ISBN-13: 978-0-13-467955-6

This is the Rough Cut version of the printed book.

This is the definitive guide to best practices and advanced troubleshooting techniques for the newest versions of Cisco’s flagship Firepower Threat Defense (FTD) system running on Cisco ASA, VMWare ESXi, and FXOS platforms.

The authors draw on unsurpassed personal experience supporting Cisco Firepower customers worldwide, presenting detailed knowledge for configuring Firepower features to maximize performance and avoid trouble. Writing for consultants, service providers, and enterprise or government technical and security professionals, they show how to use Firepower’s robust tools to investigate a wide variety of technical issues. Readers will also find expert guidance on other technologies that integrate Sourcefire capabilities, including ACS, ISE, and Splunk. Coverage includes:

  • Best practices for installation and hardware troubleshooting
  • Best practices and troubleshooting of deployment issues, traffic control policies, system administration, user identity, and access control
  • Best practices for generating log, report and troubleshoot data

Each consistently-organized chapter contains definitions, flowcharts or architectural diagrams, best practices, configuration steps (with detailed screenshots), troubleshooting tools and techniques, and FAQs drawn directly from issues raised by customers at Cisco Technical Assistance Centers.

The first Cisco guide to cover Firepower material that will be included in the new CCIE Security v5 exams, Cisco Firepower Threat Defense (FTD) also includes quizzes to help CCIE candidates prepare.

Sample Content

Table of Contents

Part I: Best Practices for Installation and Hardware Troubleshooting
1. Firepower Threat Defense (FTD) on ASA
2. Firepower Threat Defense (FTD) Deployment on VMWare ESXi
3. Firepower Threat Defense (FTD) on FXOS
4. Management of Firepower Threat Defense

Part II: Best Practices and Troubleshooting of Deployment Issues
5. Issues with Device Registration and Communication
6. Issues with Licensing a Firepower Device
7. Interface and Zones
8. High Availability

Part III: Best Practices and Troubleshooting of Traffic Control Policies
9. Issues with Network Discovery and Vulnerability Database (VDB)
10. IP Address and Location Based Access Control
11. Intelligence and Reputation Based Traffic Control
12. Decryption and Inspection of SSL Encrypted Traffic
13. Routing, and Network Address Translation (NAT)

Part IV: Best Practices and Troubleshooting of System Administration
14. Issues with Update
15. Process and Task Management
16. Issues with Network and System Performance
17. Issues with Time Synchronization
18. Managing the Disk Space and the Disk Health

Part V: Best Practices and Troubleshooting of User Identity and Access Control
19. Issues with User Management
20. Issues with Integration of Firepower with ISE and ACS
21. Issues with User Agent
22. Issues with Integration of Splunk or Any Event Streamer (eStreamer)

Part VI: Best Practices for Generating Log, Report and Troubleshoot Data
23. Real Time Logging, Alerting, and Correlation
24. Searching, Reporting, and Generating Troubleshooting Data

Updates

Submit Errata

More Information