Introduction
Get Started
Manage Security Devices
Configure Devices And Services
Configure Cloud-delivered Firewall Management Center-Managed Secure Firewall Threat Defense
Configure Secure Firewall ASA Devices
Configure On-Premises Firewall Management Center-Managed Secure Firewall Threat Defense Devices
Configure Cisco Umbrella Tunnel Configuration
Configure Amazon Web Services Virtual Private Cloud
Configure Cisco Meraki
Configure Cisco IOS
Configure SSH Devices
Configure FDM-Managed Devices
Managing FDM-Managed Devices with Firewall in Cisco Security Cloud Control
Interfaces
Synchronizing Interfaces Added to a Firepower Device using FXOS
Routing
Manage Objects
Manage Security Policies in Security Cloud Control
FDM Policy Configuration
FDM-Managed Access Control Policy
Intrusion Prevention System
Security Intelligence Policy
FDM-Managed Device Identity Policy
SSL Decryption Policy
Rulesets
Configure Rulesets for a Device
Rulesets with FDM-Managed Templates
Create Rulesets from Existing Device Rules
Impact of Out-of-Band Changes on Rulesets
Impact of Discarding Staged Ruleset Changes
View Rules and Rulesets
Change Log Entries after Creating Rulesets
Detach FDM-Managed Devices from a Selected Ruleset
Delete Rules and Rulesets
Delete Rules from a Ruleset
Delete a Ruleset
Remove a Ruleset From a Selected FDM-Managed Device
Adding Comments to Rules in Policies and Rulesets
Network Address Translation
Order of Processing NAT Rules
Network Address Translation Wizard
Common Use Cases for NAT
Templates
Backing Up FDM-Managed Devices
FDM-Managed High Availability
FDM-Managed Device Settings
Create a REST API Macro
Update FDM-Managed Device Security Databases
Cisco Secure Dynamic Attributes Connector
Migrate Devices
Establish Secure Connections
Manage Device Configuration
Monitor and Analyze
Optimize Network Security and Efficiency with AI
Troubleshoot
Appendix
Delete Rules and Rulesets
Delete Rules from a Ruleset
Delete a Ruleset