#3,454 in Computers & technology books
Use arrows to jump to the previous/next product

Reddit mentions of Cisco Firepower 6.x with Firepower Threat Defense (FTD): Next Generation Firewall (NGFW)

Sentiment score: 1
Reddit mentions: 1

We found 1 Reddit mentions of Cisco Firepower 6.x with Firepower Threat Defense (FTD): Next Generation Firewall (NGFW). Here are the top ones.

Cisco Firepower 6.x with Firepower Threat Defense (FTD): Next Generation Firewall (NGFW)
Buying options
View on Amazon.com
or
    Features:
  • Peanuts are roasted in their natural brown skins before being ground to a crunchy texture
  • Contains naturally occurring sugars
  • A crunchy texture with nothing added
  • Suitable for vegans
Specs:
Release dateMarch 2017

idea-bulb Interested in what Redditors like? Check out our Shuffle feature

Shuffle: random products popular on Reddit

Found 1 comment on Cisco Firepower 6.x with Firepower Threat Defense (FTD): Next Generation Firewall (NGFW):

u/Rex9 ยท 3 pointsr/Cisco

1 - DHCP - IMO a really bad idea. The appliance's interfaces should be static IP's. You have to be able to manage it and it needs the same IP. You could do a DHCP reservation, but at that point, why not go ahead and leave it static? It has to be reachable to be managed, and if it's a gateway device, those interfaces have to be reachable.

2 - Not at work right now, but I seem to remember the Device > Interfaces page has a field to set the MAC. Never done the virtual though so YMMV.

3 - In the FMC ACP page there's a search box in the upper right. It searches for whatever you type in any field in the ACP. Up and down arrows to scroll through all the matches. Same in the Objects pages.

4 - I haven't really looked, but it would be nece to get more than 25 at a time.

5 - Todd Lammle writes a really good book that you can get on Amazon.

https://www.amazon.com/Cisco-Firepower-6-x-Threat-Defense-ebook/dp/B06XYXCVQ8/ref=sr_1_8?ie=UTF8&qid=1497956555&sr=8-8&keywords=todd+lammle

His class is also excellent. Better than Cisco's by a mile. Did both last summer. Cisco's spends more time on the non-ASA devices, but that's probably not an issue for 90% of people. The concepts are the same across the ASA and Sourcefire devices. The execution is a little different. If I had 5X the budget, I'd love to have one of the Sourcefire-designed devices.