0% found this document useful (0 votes)
31 views14 pages

FMC

The Cisco Secure Firewall Management Center (FMC) provides centralized management for Cisco network security solutions, enabling comprehensive visibility, automated security responses, and streamlined operations. It integrates with various Cisco and third-party technologies, offering features like unified policy management, real-time monitoring, and threat intelligence. Deployment options include physical, virtual, and cloud-based solutions, catering to diverse enterprise needs.

Uploaded by

Bogdan Margescu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views14 pages

FMC

The Cisco Secure Firewall Management Center (FMC) provides centralized management for Cisco network security solutions, enabling comprehensive visibility, automated security responses, and streamlined operations. It integrates with various Cisco and third-party technologies, offering features like unified policy management, real-time monitoring, and threat intelligence. Deployment options include physical, virtual, and cloud-based solutions, catering to diverse enterprise needs.

Uploaded by

Bogdan Margescu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Data sheet

Cisco confidential

Cisco Secure Firewall


Management Center
(formerly Firepower
Management Center)

© 2023 Cisco and/or its affiliates. All rights reserved. Page 1 of 14


Contents
Security that works together 3
Comprehensive visibility and policy control 3
Automated security for dynamic defense 3
Centralized Event and Policy Manager 4
Features and benefits 5
Open APIs for easy integration 7
Cisco SecureX 8
How does it work? 9
Deployment options 9
Hypervisor compatibility and cloud support 9
Platform specifications 10
Ordering information 13
Warranty information 13
For more information 13

© 2023 Cisco and/or its affiliates. All rights reserved. Page 2 of 14


Security that works together
The Cisco Secure Firewall Management Center (FMC) is your administrative nerve center for managing critical
Cisco network security solutions. It provides complete and unified management over firewalls, application
control, intrusion prevention, URL filtering, and advanced malware protection. Quickly and easily go from
managing a firewall to controlling applications to investigating threats and remediating malware outbreaks. It is
a key part of the broad and integrated Cisco Secure portfolio, delivering in-depth analysis, streamlined security
management across the network and cloud, and accelerated incident investigation and response, working
across your Cisco and third-party technologies.

Comprehensive visibility and policy control


● Provides exceptional visibility into what is running in your network and cloud so you can see what needs
to be protected.
● Rapidly detects suspicious/malicious traffic and quickly creates custom rules to prevent the attack from
advancing.
● Built in forensics give a detailed analysis of malware to safely remediate with a graphical representation
of all the devices the attack has infected.
● Creates firewall rules and controls thousands of commercial and custom applications used in your
environment.
● Shares context with Cisco Secure Workload, allowing firewalls in the network to be “workload aware” for
better protection of dynamic applications everywhere in your environment.
● Defines the intrusion prevention levels, URL reputation rules, and malware threat defense policies. It
solves problems such as: “When network traffic is coming from a specific country using this particular
application with a file attached, I can apply this level of intrusion inspection, analyze the file for malware,
and send it to the integrated sandbox, if necessary.”

Automated security for dynamic defense


The Firewall Management Center continually monitors how your network is changing. It streamlines operations
and improves your security by:

● Automatically correlating and prioritizing new attack events with your network’s vulnerabilities to alert you
to attacks that may have been successful. Your security team can focus on those events that matter the
most.
● Analyzing your network’s vulnerabilities and automatically recommending the appropriate security policies
to put in place. You can adapt your defenses to changing conditions and implement security measures
tailored specifically to your network.
● Correlating specific events from network, endpoint, intrusion, and security intelligence sources. You are
alerted if individual hosts show signs of compromise from unknown attacks.
● Applying file policy criteria. If those are met, it automatically analyzes the file to identify known malware
and/or sends the file to an integrated sandbox to identify unknown malware.

© 2023 Cisco and/or its affiliates. All rights reserved. Page 3 of 14


Centralized Event and Policy Manager
The Firewall Management Center is the centralized event and policy manager for:

● Cisco Secure Firewall Threat Defense (FTD), both on-premises and virtual
● Cisco Secure IPS (formerly Firepower NGIPS)
● Cisco Firepower Threat Defense for ISR
● Cisco Malware Defense (formerly Advanced Malware Protection, or AMP)

Enterprise-Class Management
The Firewall Management Center (FMC) discovers real-time information about changing network resources and
operations. You get a full contextual basis for making informed decisions (Figure 1). In addition to providing a
wide breadth of intelligence, FMC delivers a fine level of detail, including:

● Trends and high-level statistics. This information helps you understand your security posture at a given
moment in time as well as how it’s changing, for better or worse.
● Event detail, compliance, and forensics. These provide an understanding of what happened during a
security event. They help improve defenses, support breach containment efforts, and aid in legal
enforcement actions.
● Workflow data. You can easily export this data to other solutions to improve incident response
management.
● Real-time device health monitoring. Quickly see the status of your devices either from a consolidated,
high-level view or via detailed, customizable status pages (Figure 2).

Figure 1.
Contextual network and security information

© 2023 Cisco and/or its affiliates. All rights reserved. Page 4 of 14


Figure 2.
Real-time Device Health Monitor

Centralized Policy and Operations


● Maintain consistent policies: Write a policy once and scale enforcement consistently across multiple
security controls throughout your network.
● Reduce complexity: Get unified management and automated threat correlation across tightly integrated
security functions, including application firewalling, next-generation Intrusion Prevention, and file and
malware protection.
● Accelerate key security operations functions: Increase efficiency by removing manual processes.
Access security patches and new features faster by completing software upgrades in just a few clicks.

© 2023 Cisco and/or its affiliates. All rights reserved. Page 5 of 14


Features and benefits
Feature Benefit

Unified management of multiple Facilitates the centralized management of the Cisco security environment, including:
security functions across multiple
● Cisco Secure Firewall Threat Defense
solutions
● Cisco Secure IPS

● Cisco Firepower Threat Defense for ISR

● Cisco Malware Defense

Integrated policy management ● Configures firewall access, application control, threat prevention, URL filtering, and
over multiple security functions advanced malware protection settings in a single policy
● Eases policy administration, reduces errors, and promotes consistency

● Enables a single policy to be deployed to multiple security solutions

Network Discovery ● Discovers users, applications, and a multitude of devices through passive analysis of
network traffic
● Provides context and helps to determine the impact of attacks against your specific
environment
● Allows you to tune Intrusion Prevention signature sets to the systems discovered on your
network
● Supports third-party vulnerability management integration

Separation of duties and role- ● Create administrative user personas such as NetOps or SecOps to clearly define
based access control responsibilities
● Granular role-based access control allows users to be given specific access rights to
perform only the actions they are responsible for

Integrated Azure AD Identity based ● Newly supported Azure AD based User/Group based access control.
access policy control with Cisco ● Integrates with ISE for Azure AD based User Identity integration.
Identify Services Engine (ISE)
● Controls access based on Cisco ISE security group tag, device type and location IP, and
rapid threat containment
● Helps enforce compliance, enhance infrastructure security, and streamline service operation

Automatic Security Response ● Correlate security events to identify stealthy attacks

● Trigger automated responses via:

◦ Email
◦ Syslog
◦ SNMP
◦ Remediation modules

Cisco Secure Dynamic Attribute ● CSDAC Natively running inside from FMC 7.4 onwards
Connector ● Provides an automated and programmatic way to manage policies when IP addresses and
workloads are constantly changing without having to redeploy changes
● Dramatically reduces the admin overhead required to keep security policies up to date
● Integrates with AWS, Azure, GCP, VMware to source workload tags and to create Dynamic
Objects for Policy
● Integrated with SaaS services like Office365, GitHub, Azure Service Tags, Zoom, WebEx for
Dynamic Objects based Access enforcement
● Supports Generic text file driven IP Prefixes for open integration. They can contain for
example "known IP List”, or "Vulnerable IP list” etc

Threat intelligence ● Integrates with Cisco Talos® Group’s security, threat, and vulnerability intelligence for up-
to-minute threat protection
● Addresses new attack methods with both IP-based and URL-based security intelligence

© 2023 Cisco and/or its affiliates. All rights reserved. Page 6 of 14


Feature Benefit
● Enables ingestion and correlation of threat intelligence from third-party threat feeds and
threat intelligence platforms in STIX/TAXII or flat file formats

Application visibility and control ● Further reduces threats to your network with precise control of thousands of commercial
applications
● Uses the open-source standard Open App ID for detailed identification and control over
custom applications

Multitenancy management and ● Creates up to 100 management domains with separate event data, reporting, and network
policy inheritance mapping, enforced through role-based access control
● Implements consistent and efficient management through its policy hierarchy structure, with
each level inheriting policies above it

Cisco Security Analytics and ● Highly scalable, intuitive single view of firewall log management
Logging (SAL) integration ● Behavioral analysis provides real-time threat detection and faster response times

● Continuous analysis further refines your security posture to better defend against future
attempts

SecureX integration ● Leverage the SecureX™ platform to accelerate threat detection, orchestration, and
remediation
● Every Secure Firewall includes entitlement for Cisco SecureX

● The new SecureX ribbon in Firewall Management Center enables SecOps to instantly pivot
to SecureX’s open platform, speeding incident response

Cisco Secure Workload integration ● Integration with Cisco Secure Workload (formerly Tetration) enables comprehensive
visibility and policy enforcement for modern distributed and dynamic applications across the
network and workload for consistent enforcement in a scalable manner

Reporting and dashboards ● Provides the visibility you need through customizable dashboards with custom and
template-based reports
● Delivers comprehensive alerts and reports for both general and focused information

● Displays event and contextual information in hyperlinked tables, graphs, and charts for
easy-to-use analysis
● Monitors network behavior and performance to identify anomalies and maintain system
health

Secure boot ● Secure boot is a mechanism to validate the integrity of Cisco software running on the FMC
hardware as your system boots
● If a signature is missing or software is invalid, it will not load and boot will fail
(Hardware FMC appliances only)

© 2023 Cisco and/or its affiliates. All rights reserved. Page 7 of 14


Open APIs for easy integration
FMC makes integration with third-party technologies possible through powerful, feature-rich application
programming interfaces. The APIs provide connection points for:

● Moving event data from FMC to another platform, such as a Security Information and Event Management
(SIEM) solution.
● Enhancing the information contained in the Cisco IPS database with third-party data. Such data might
include vulnerability management.
● Kicking off workflows and remediation steps that are activated by user-defined correlation rules. You
could, for example, integrate your workflow with a Network Access Control (NAC) solution to quarantine
an infected endpoint or initiate a digital forensic process.
● Supporting third-party reporting and analytics by enabling those solutions to query the FMC database.

These APIs are also used to integrate with several Cisco security products and workflows. These include Cisco
Secure Malware Analytics (formerly Cisco AMP Threat Grid) for sandboxing; the Cisco Identity Services Engine
(ISE) for identity data and network segmentation; and Cisco Umbrella® for internet-wide domain visibility.

The Cisco Secure Technology Alliance is a security ecosystem that facilitates open, multivendor product
integrations to improve security effectiveness through automation and operational simplicity. Cisco is actively
partnering with 100s of key security vendors and integration with over ten Cisco security products. To see the
latest list, visit Cisco Secure Technical Alliance Partners.

Cisco SecureX
Cisco SecureX connects the breadth of Cisco’s integrated security portfolio and your entire security
infrastructure for a consistent experience that unifies visibility, enables automation, and strengthens your
security across the network, endpoint, cloud, and applications. The result is simplified security, built into the
solutions that you already have.

SecureX’s threat response feature (formerly CTR) integrates threat intelligence from Cisco Talos and third-party
sources to automatically research Indicators of Compromise (IOCs), also known as observables, and confirm
threats quickly.

For Secure Firewall customers, the SecureX ribbon in the Firewall Management Center (FMC) allows an
administrator to instantly pivot back and forth for deeper threat investigation, sharing and maintaining context
around incidents.

© 2023 Cisco and/or its affiliates. All rights reserved. Page 8 of 14


Figure 3.
SecureX in the FMC

Find here the prebuilt workflow playbooks that address common use cases for observable actions,
remediations, and incident endpoint enrichment.

How does it work?


Cisco firewalls send data to SecureX with a secure intermediary cloud service. SecureX threat response queries
for sightings related to the IP address being investigated and provides an analyst with the additional context.
Intrusion events are promoted to investigation-worthy incidents in the Incident Manager, based on Cisco Talos
reputation or user-defined filters. This allows your team to quickly investigate and triage to see analytics on
intrusion events.

SecureX Orchestrator can invoke FMC API calls, which allows administrators to automate routine FMC tasks,
improving efficiency. SecureX is available as a standard for customers with Cisco Secure Firewall and/or any
Cisco Secure product.

Deployment options
FMC can be deployed as a physical or virtual appliance, or from the cloud. It can also be consumed as a
service. The cloud-delivered FMC, through CDO, has all the benefits of FMC without the need to manage FMC
software update itself. You can choose which option works best for your environment. Please visit the current
Release Notes for more detailed information.

© 2023 Cisco and/or its affiliates. All rights reserved. Page 9 of 14


Hypervisor compatibility and cloud support
Firewall Management Center Virtual supports the following hypervisor types shown below. All models of the
FMC Virtual platform will operate with the same RAM requirements: 32 GB recommended**; 28 GB** required.
For current versions supported and compatibility with FMC versions, visit current Release Notes.
** Recommended to provision vFMC with additional 2 vCPU and 2GB RAM to run CSDAC

Table 1. Virtual appliance hypervisor and cloud support

Hypervisor Version and details

VMware vSphere ● ESXi Server 5.1, 5.5, 6.0, 6.5, 6.7, 7.0

● vCenter Server (optional)

● vSphere Web Client, vSphere Client, or OVF Tool for Windows or LinuxC

KVM ● Ubuntu 18.04 LTS

● Red Hat Enterprise Linux (RHEL) Version 7.1

Amazon Web Services ● c3.4xlarge: 16 vCPUs, 30 GB

● c4.4xlarge: 16 vCPUs, 30 GB
● c5.4xlarge: 16 vCPUs, 32 GB

Microsoft Azure Standard_D4_v2: 8 vCPUs, 28 GB

GCP c2-standard-8: 8 vCPUs, 32 GB


c2-standard-16: 16 vCPU, 64 GB

OCI VM.Standard 2.4, 60 GB

Nutanix Nutanix AHV (20201105.12 and later)

Hyperflex Release 4.5(1a)


4-8 vCPUs, 28-32 GB for FMCv-2,10,25
32 vCPU, 64 GB for FMCv-300

Note: Refer to the Cisco Secure Firewall Management Center Virtual Getting Started Guide for more
information.

© 2023 Cisco and/or its affiliates. All rights reserved. Page 10 of 14


Platform specifications
There are several Firewall Management Center models. Choose based on the number of sensor appliances to
be monitored (both physical and virtual), the number of hosts in your environment, and the anticipated security
events rate (see Table 3). All models provide the same management capabilities.

Table 2 compares the capacities of available Cisco Firewall Management Center physical appliances.

Table 2. Cisco Secure Firewall Management Center hardware models

Performance and FMC 1600 FMC 2600 FMC 4600 FMC 1700 FMC 2700 FMC 4700
functionality

Maximum number 50 300 750 50 300 1,000


of sensors
managed

Maximum IPS 30 million 60 million 300 million 30 million 60 million 400 million
events

Management Two built-in RJ-45 SFP+ ports; support for 100 Mbps, Two built-in 10GbE RJ45 OCP3.0 NIC;
interface 1 Gbps, and 10 Gbps; the primary management port is support for 100 Mbps, 1 Gbps, and 10 Gbps;
eth0. You can use eth1, eth2, and eth3 as secondary the primary management port is eth0. You
management or event ports. can use eth1, eth2, and eth3 as secondary
management or event ports.

USB ports Two USB 3.0 Type A Two USB 3.0 Type A

VGA ports One 3-row 15-pin DB-15 connector; enabled by One 3-row 15-pin DB-15 connector; enabled
default by default

SFP ports Two fixed SFP+ ports Two fixed SFP+ ports

Supported SFP+ SFP-10G-SR SFP-10G-SR SFP-10G-SR SFP-10G-SR SFP-10G-SR SFP-10G-SR


(10 GB) (10 GB) (10 GB) (10 GB) (10 GB) (10 GB)
SFP-10G-LR SFP-10G-LR SFP-10G-LR SFP-10G-LR SFP-10G-LR
(10 GB) (10 GB) (10 GB) (10 GB) (10 GB)
SFP-25G-SR-
S (25 GB)
SFP-10/25G-
LR-S (25GB)
SFP-10/25G-
CSR-S (25
GB)

Memory 32 GB 64 GB 128 GB 32 GB 64 GB 128 GB

RDIMMs (internal Two 16-GB Four 16-GB DDR4- Eight 16-GB Two 16-GB Four16-GB Eight 16-GB
component only; DDR4-2400- 2400-MHz DIMMs DDR4-2400- DDR4-3200- DDR4-3200- DDR4-3200-
not field MHz DIMMs MHz DIMMs MHz DIMMs MHz DIMMs MHz DIMMs
replaceable)

CPU One Intel Xeon Two Intel Xeon Two Intel Xeon AMD 1P Rome AMD 1P AMD 1P Rome
4215 4215 processors 4214 7232P Rome 7282 7352
processor processors

© 2023 Cisco and/or its affiliates. All rights reserved. Page 11 of 14


Performance and FMC 1600 FMC 2600 FMC 4600 FMC 1700 FMC 2700 FMC 4700
functionality

Event storage 900 GB 1.8 TB 3.2 TB 900 GB 1.8 TB 3.2 TB


space

Maximum 550,000/ 150,000/ 600,000/ 550,000/ 150,000/ 600,000/


network map size 50,000 150,000 600,000 50,000 150,000 600,000
(hosts/users)

Maximum event 5000 eps 12,000 eps 20,000 eps 5000 eps 12,000 eps 30,000 eps
rate (events per
second)

Network 2 x 1 Gbps 2 x 1 Gbps RJ45 2 x 1 Gbps RJ45 2 x 1 Gbps 2 x 1 Gbps 2 x 1 Gbps


interfaces onboard onboard RJ45 onboard RJ45 RJ45 onboard
onboard
2 x 10 Gbps SFP+ 2 x 10 Gbps 2 x 10 Gbps 2 x 10/25
(order SFPs via SFP+ (order SFP+ 2 x 10 Gbps Gbps SFP+
Cisco Commerce SFPs via Cisco (order SFPs SFP+ (order SFPs
Workplace) Commerce via Cisco (order SFPs via Cisco
Workplace) Commerce via Cisco Commerce
Workplace) Commerce Workplace)
Workplace)

Secure boot Yes Yes Yes Yes Yes Yes

Redundancy features

Supports high Yes Yes Yes Yes Yes Yes


availability

System power Two 770-W AC power supplies; hot swappable and Two 1050-W AC power supplies; hot
redundant as 1+1 swappable and redundant as 1+1

Power 2626 BTU/hr 2626 BTU/hr


consumption

Storage Two 1.2-TB Four 600-GB Ten 1.2-TB Two 1.2-TB Four 600-GB Ten 1.2-TB
10-K SAS 10-K SAS HDDs 10-K SAS HDDs 10-K SAS 10-K SAS 10-K SAS
HDDs HDDs HDDs HDDs
RAID 5, hot- RAID-6, hot
RAID-1, hot swappable swappable RAID-1, hot RAID 5, hot- RAID-6, hot
swappable swappable swappable swappable

RAID controller One - the chassis has a dedicated internal riser for a One - the chassis has a dedicated internal
PCIe-style Cisco modular RAID controller card. Internal riser for a PCIe-style Cisco modular RAID
component only; not field replaceable. controller card. Internal component only; not
field replaceable.

Physical and environmental

Form factor 1RU 1RU 1RU 1RU 1RU 1RU

Dimensions 29.8 x 16.9 x 1.7 in (75.7 x 43 x 4.3 cm) 30 x 16.9 x 1.7 in (76.2 x 42.9 x 4.3 cm)
(D x W x H)

Shipping weight 32.2 lb. (16.6 34.1 lb. (16.8 kg) 36 lb. (17.0 kg) 32.2 lb. 34.1 lb. 36 lb.
kg) (16.6 kg) (16.8 kg) (17.0 kg)

Watts (max) 770W 770W 770W 1,050W 1,050W 1,050W

© 2023 Cisco and/or its affiliates. All rights reserved. Page 12 of 14


Performance and FMC 1600 FMC 2600 FMC 4600 FMC 1700 FMC 2700 FMC 4700
functionality

Power supply 100-240 VAC 100-240 VAC 100-240 VAC 100-240 VAC 100-240 100-240 VAC
(nominal) (nominal) (nominal) (nominal) VAC (nominal)
(nominal)
90-264 VAC 90-264 VAC 90-264 VAC 90-264 VAC 90-264 VAC
(min/max) (min/max) (min/max) (min/max 90-264 VAC (min/max
(min/max
9.5-amp max 9.5-amp max at 9.5-amp max at 9.2-amp max 9.2-amp max
at 100 VAC 100 VAC 100 VAC at 100 VAC 9.2-amp max at 100 VAC
at 100 VAC
4.5-amp max 4.5-amp max at 4.5-amp max at 5.2-amp max 5.2-amp max
at 208 VAC 208 VAC 208 VAC at 230 VAC 5.2-amp max at 230 VAC
at 230 VAC

Airflow Front to back Front to back Front to back Front to back Front to back Front to back

Operating 50°F to 95°F (10°C to 35°C) 50°F to 95°F (10°C to 35°C)


temperature

Table 3 compares the capacities of available Cisco Secure Firewall Management Center virtual appliances.

Table 3. Cisco Firewall Management Center Virtual (FMCv) models

Performance and functionality FMCv(2/10/25) FMCv300

Maximum number of sensors 2 300


managed
10
25

Maximum IPS events 10 million 60 million

Memory 32 GB 64 GB

CPU 8/4 vCPUs 32 vCPUs

Event storage space 250 GB 2.2 TB

Maximum network map size 50,000/50,000 150,000/150,000


(hosts/users)

Maximum event rate (events per Varies 12,000 eps


second)

Hypervisor and cloud support VMware, KVM, AWS, Azure, GCP, OCI, VMware, AWS, OCI
Nutanix, Hyperflex, OpenStack

Supports high availability VMware, AWS, OCI (Not supported on VMware, AWS, OCI
FMCv2)

Cloud-delivered FMC can be scaled for your needs. Please refer to our Release Notes for more detailed
information on compatibility, supported versions, deployments, and browser requirements.

© 2023 Cisco and/or its affiliates. All rights reserved. Page 13 of 14


Ordering information
For ordering and licensing information on virtual and physical appliances as well as cloud-delivered service,
please consult the Cisco Network Security Ordering Guide. To place an order, visit the Cisco Ordering Home
Page, contact your Cisco sales representative, or call us at 1 800 553 6387.

Warranty information
Find warranty information at the Cisco.com Product Warranties page.

For more information


● Cisco Security Management Portfolio
● Cisco Secure Firewall
● Cisco Secure Firewall Management Center Release Notes
● Secure IPS (NGIPS)
● Malware Defense
● Cisco Security Analytics and Logging
● Network Security and Trust for Service Providers
● Services for Security
● Cisco Firepower Management Center (Previous Models) Data Sheet

Printed in USA C78-736775-16 12/23

© 2023 Cisco and/or its affiliates. All rights reserved. Page 14 of 14

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy