FMC
FMC
Cisco confidential
● Automatically correlating and prioritizing new attack events with your network’s vulnerabilities to alert you
to attacks that may have been successful. Your security team can focus on those events that matter the
most.
● Analyzing your network’s vulnerabilities and automatically recommending the appropriate security policies
to put in place. You can adapt your defenses to changing conditions and implement security measures
tailored specifically to your network.
● Correlating specific events from network, endpoint, intrusion, and security intelligence sources. You are
alerted if individual hosts show signs of compromise from unknown attacks.
● Applying file policy criteria. If those are met, it automatically analyzes the file to identify known malware
and/or sends the file to an integrated sandbox to identify unknown malware.
● Cisco Secure Firewall Threat Defense (FTD), both on-premises and virtual
● Cisco Secure IPS (formerly Firepower NGIPS)
● Cisco Firepower Threat Defense for ISR
● Cisco Malware Defense (formerly Advanced Malware Protection, or AMP)
Enterprise-Class Management
The Firewall Management Center (FMC) discovers real-time information about changing network resources and
operations. You get a full contextual basis for making informed decisions (Figure 1). In addition to providing a
wide breadth of intelligence, FMC delivers a fine level of detail, including:
● Trends and high-level statistics. This information helps you understand your security posture at a given
moment in time as well as how it’s changing, for better or worse.
● Event detail, compliance, and forensics. These provide an understanding of what happened during a
security event. They help improve defenses, support breach containment efforts, and aid in legal
enforcement actions.
● Workflow data. You can easily export this data to other solutions to improve incident response
management.
● Real-time device health monitoring. Quickly see the status of your devices either from a consolidated,
high-level view or via detailed, customizable status pages (Figure 2).
Figure 1.
Contextual network and security information
Unified management of multiple Facilitates the centralized management of the Cisco security environment, including:
security functions across multiple
● Cisco Secure Firewall Threat Defense
solutions
● Cisco Secure IPS
Integrated policy management ● Configures firewall access, application control, threat prevention, URL filtering, and
over multiple security functions advanced malware protection settings in a single policy
● Eases policy administration, reduces errors, and promotes consistency
Network Discovery ● Discovers users, applications, and a multitude of devices through passive analysis of
network traffic
● Provides context and helps to determine the impact of attacks against your specific
environment
● Allows you to tune Intrusion Prevention signature sets to the systems discovered on your
network
● Supports third-party vulnerability management integration
Separation of duties and role- ● Create administrative user personas such as NetOps or SecOps to clearly define
based access control responsibilities
● Granular role-based access control allows users to be given specific access rights to
perform only the actions they are responsible for
Integrated Azure AD Identity based ● Newly supported Azure AD based User/Group based access control.
access policy control with Cisco ● Integrates with ISE for Azure AD based User Identity integration.
Identify Services Engine (ISE)
● Controls access based on Cisco ISE security group tag, device type and location IP, and
rapid threat containment
● Helps enforce compliance, enhance infrastructure security, and streamline service operation
◦ Email
◦ Syslog
◦ SNMP
◦ Remediation modules
Cisco Secure Dynamic Attribute ● CSDAC Natively running inside from FMC 7.4 onwards
Connector ● Provides an automated and programmatic way to manage policies when IP addresses and
workloads are constantly changing without having to redeploy changes
● Dramatically reduces the admin overhead required to keep security policies up to date
● Integrates with AWS, Azure, GCP, VMware to source workload tags and to create Dynamic
Objects for Policy
● Integrated with SaaS services like Office365, GitHub, Azure Service Tags, Zoom, WebEx for
Dynamic Objects based Access enforcement
● Supports Generic text file driven IP Prefixes for open integration. They can contain for
example "known IP List”, or "Vulnerable IP list” etc
Threat intelligence ● Integrates with Cisco Talos® Group’s security, threat, and vulnerability intelligence for up-
to-minute threat protection
● Addresses new attack methods with both IP-based and URL-based security intelligence
Application visibility and control ● Further reduces threats to your network with precise control of thousands of commercial
applications
● Uses the open-source standard Open App ID for detailed identification and control over
custom applications
Multitenancy management and ● Creates up to 100 management domains with separate event data, reporting, and network
policy inheritance mapping, enforced through role-based access control
● Implements consistent and efficient management through its policy hierarchy structure, with
each level inheriting policies above it
Cisco Security Analytics and ● Highly scalable, intuitive single view of firewall log management
Logging (SAL) integration ● Behavioral analysis provides real-time threat detection and faster response times
● Continuous analysis further refines your security posture to better defend against future
attempts
SecureX integration ● Leverage the SecureX™ platform to accelerate threat detection, orchestration, and
remediation
● Every Secure Firewall includes entitlement for Cisco SecureX
● The new SecureX ribbon in Firewall Management Center enables SecOps to instantly pivot
to SecureX’s open platform, speeding incident response
Cisco Secure Workload integration ● Integration with Cisco Secure Workload (formerly Tetration) enables comprehensive
visibility and policy enforcement for modern distributed and dynamic applications across the
network and workload for consistent enforcement in a scalable manner
Reporting and dashboards ● Provides the visibility you need through customizable dashboards with custom and
template-based reports
● Delivers comprehensive alerts and reports for both general and focused information
● Displays event and contextual information in hyperlinked tables, graphs, and charts for
easy-to-use analysis
● Monitors network behavior and performance to identify anomalies and maintain system
health
Secure boot ● Secure boot is a mechanism to validate the integrity of Cisco software running on the FMC
hardware as your system boots
● If a signature is missing or software is invalid, it will not load and boot will fail
(Hardware FMC appliances only)
● Moving event data from FMC to another platform, such as a Security Information and Event Management
(SIEM) solution.
● Enhancing the information contained in the Cisco IPS database with third-party data. Such data might
include vulnerability management.
● Kicking off workflows and remediation steps that are activated by user-defined correlation rules. You
could, for example, integrate your workflow with a Network Access Control (NAC) solution to quarantine
an infected endpoint or initiate a digital forensic process.
● Supporting third-party reporting and analytics by enabling those solutions to query the FMC database.
These APIs are also used to integrate with several Cisco security products and workflows. These include Cisco
Secure Malware Analytics (formerly Cisco AMP Threat Grid) for sandboxing; the Cisco Identity Services Engine
(ISE) for identity data and network segmentation; and Cisco Umbrella® for internet-wide domain visibility.
The Cisco Secure Technology Alliance is a security ecosystem that facilitates open, multivendor product
integrations to improve security effectiveness through automation and operational simplicity. Cisco is actively
partnering with 100s of key security vendors and integration with over ten Cisco security products. To see the
latest list, visit Cisco Secure Technical Alliance Partners.
Cisco SecureX
Cisco SecureX connects the breadth of Cisco’s integrated security portfolio and your entire security
infrastructure for a consistent experience that unifies visibility, enables automation, and strengthens your
security across the network, endpoint, cloud, and applications. The result is simplified security, built into the
solutions that you already have.
SecureX’s threat response feature (formerly CTR) integrates threat intelligence from Cisco Talos and third-party
sources to automatically research Indicators of Compromise (IOCs), also known as observables, and confirm
threats quickly.
For Secure Firewall customers, the SecureX ribbon in the Firewall Management Center (FMC) allows an
administrator to instantly pivot back and forth for deeper threat investigation, sharing and maintaining context
around incidents.
Find here the prebuilt workflow playbooks that address common use cases for observable actions,
remediations, and incident endpoint enrichment.
SecureX Orchestrator can invoke FMC API calls, which allows administrators to automate routine FMC tasks,
improving efficiency. SecureX is available as a standard for customers with Cisco Secure Firewall and/or any
Cisco Secure product.
Deployment options
FMC can be deployed as a physical or virtual appliance, or from the cloud. It can also be consumed as a
service. The cloud-delivered FMC, through CDO, has all the benefits of FMC without the need to manage FMC
software update itself. You can choose which option works best for your environment. Please visit the current
Release Notes for more detailed information.
VMware vSphere ● ESXi Server 5.1, 5.5, 6.0, 6.5, 6.7, 7.0
● vSphere Web Client, vSphere Client, or OVF Tool for Windows or LinuxC
● c4.4xlarge: 16 vCPUs, 30 GB
● c5.4xlarge: 16 vCPUs, 32 GB
Note: Refer to the Cisco Secure Firewall Management Center Virtual Getting Started Guide for more
information.
Table 2 compares the capacities of available Cisco Firewall Management Center physical appliances.
Performance and FMC 1600 FMC 2600 FMC 4600 FMC 1700 FMC 2700 FMC 4700
functionality
Maximum IPS 30 million 60 million 300 million 30 million 60 million 400 million
events
Management Two built-in RJ-45 SFP+ ports; support for 100 Mbps, Two built-in 10GbE RJ45 OCP3.0 NIC;
interface 1 Gbps, and 10 Gbps; the primary management port is support for 100 Mbps, 1 Gbps, and 10 Gbps;
eth0. You can use eth1, eth2, and eth3 as secondary the primary management port is eth0. You
management or event ports. can use eth1, eth2, and eth3 as secondary
management or event ports.
USB ports Two USB 3.0 Type A Two USB 3.0 Type A
VGA ports One 3-row 15-pin DB-15 connector; enabled by One 3-row 15-pin DB-15 connector; enabled
default by default
SFP ports Two fixed SFP+ ports Two fixed SFP+ ports
RDIMMs (internal Two 16-GB Four 16-GB DDR4- Eight 16-GB Two 16-GB Four16-GB Eight 16-GB
component only; DDR4-2400- 2400-MHz DIMMs DDR4-2400- DDR4-3200- DDR4-3200- DDR4-3200-
not field MHz DIMMs MHz DIMMs MHz DIMMs MHz DIMMs MHz DIMMs
replaceable)
CPU One Intel Xeon Two Intel Xeon Two Intel Xeon AMD 1P Rome AMD 1P AMD 1P Rome
4215 4215 processors 4214 7232P Rome 7282 7352
processor processors
Maximum event 5000 eps 12,000 eps 20,000 eps 5000 eps 12,000 eps 30,000 eps
rate (events per
second)
Redundancy features
System power Two 770-W AC power supplies; hot swappable and Two 1050-W AC power supplies; hot
redundant as 1+1 swappable and redundant as 1+1
Storage Two 1.2-TB Four 600-GB Ten 1.2-TB Two 1.2-TB Four 600-GB Ten 1.2-TB
10-K SAS 10-K SAS HDDs 10-K SAS HDDs 10-K SAS 10-K SAS 10-K SAS
HDDs HDDs HDDs HDDs
RAID 5, hot- RAID-6, hot
RAID-1, hot swappable swappable RAID-1, hot RAID 5, hot- RAID-6, hot
swappable swappable swappable swappable
RAID controller One - the chassis has a dedicated internal riser for a One - the chassis has a dedicated internal
PCIe-style Cisco modular RAID controller card. Internal riser for a PCIe-style Cisco modular RAID
component only; not field replaceable. controller card. Internal component only; not
field replaceable.
Dimensions 29.8 x 16.9 x 1.7 in (75.7 x 43 x 4.3 cm) 30 x 16.9 x 1.7 in (76.2 x 42.9 x 4.3 cm)
(D x W x H)
Shipping weight 32.2 lb. (16.6 34.1 lb. (16.8 kg) 36 lb. (17.0 kg) 32.2 lb. 34.1 lb. 36 lb.
kg) (16.6 kg) (16.8 kg) (17.0 kg)
Power supply 100-240 VAC 100-240 VAC 100-240 VAC 100-240 VAC 100-240 100-240 VAC
(nominal) (nominal) (nominal) (nominal) VAC (nominal)
(nominal)
90-264 VAC 90-264 VAC 90-264 VAC 90-264 VAC 90-264 VAC
(min/max) (min/max) (min/max) (min/max 90-264 VAC (min/max
(min/max
9.5-amp max 9.5-amp max at 9.5-amp max at 9.2-amp max 9.2-amp max
at 100 VAC 100 VAC 100 VAC at 100 VAC 9.2-amp max at 100 VAC
at 100 VAC
4.5-amp max 4.5-amp max at 4.5-amp max at 5.2-amp max 5.2-amp max
at 208 VAC 208 VAC 208 VAC at 230 VAC 5.2-amp max at 230 VAC
at 230 VAC
Airflow Front to back Front to back Front to back Front to back Front to back Front to back
Table 3 compares the capacities of available Cisco Secure Firewall Management Center virtual appliances.
Memory 32 GB 64 GB
Hypervisor and cloud support VMware, KVM, AWS, Azure, GCP, OCI, VMware, AWS, OCI
Nutanix, Hyperflex, OpenStack
Supports high availability VMware, AWS, OCI (Not supported on VMware, AWS, OCI
FMCv2)
Cloud-delivered FMC can be scaled for your needs. Please refer to our Release Notes for more detailed
information on compatibility, supported versions, deployments, and browser requirements.
Warranty information
Find warranty information at the Cisco.com Product Warranties page.