Deploy a Threat Defense Virtual in Azure
Onboard a threat defense virtual for Azure that is managed by cloud-delivered Firewall Management Center.
The Azure environment can only support one threat defense virtual. To onboard multiple devices, you must have a separate Azure instance for each of those devices.
Before you begin
Ensure that you have an active Azure subscription.
Procedure
Step 1 | Log into Security Cloud Control. | ||
Step 2 | In the left pane, click Inventory and click the plus icon. | ||
Step 3 | Under Select a Device or Service Type, click the FTD tile. | ||
Step 4 | Under Management Mode, ensure that FTD is selected.
| ||
Step 5 | Click Deploy an FTD to a cloud environment as the onboarding method. | ||
Step 6 | Choose Azure as your cloud provider from the drop-down list. | ||
Step 7 | (Optional) If you have not registered your Security Cloud Control account to an Azure subscription, you can do so now. Click Azure Cloud Shell to launch the Azure cloud shell and paste the script that is provided. If you have registered your account or if you have completed executing the script, click Next. | ||
Step 8 | Choose a Region to deploy the Azure subscription from the drop-down list. | ||
Step 9 | Enter the FTD Password that you wish to use for SSH console access. | ||
Step 10 | Enter a Device Name. This name is applied to the threat defense virtual in the Inventory page and Azure resource group. | ||
Step 11 | In the Policy Assignment step, use the drop-down menu to select an access control policy to deploy once the device is onboarded. If you have no policies configured, select the Default Access Control Policy. | ||
Step 12 | Select the licenses you want to apply to the device. You must select at least the essential license as the base license for this device. Click Next. | ||
Step 13 | Click Complete onboarding. This completes the onboarding wizard. It may take up to 20 minutes for the device to fully onboard and synchronize. To monitor the creation process, expand the Workflows option of the Azure subscription that is hosting the device. |
What to do next
-
If you did not already, create a custom access control policy to customize the security for your environment. See Access Control Overview in Managing Firewall Threat Defense with Cloud-Delivered Firewall Management Center in Cisco Security Cloud Control for more information.
-
Enable Cisco Security Analytics and Logging (SAL) to view events in the Security Cloud Control dashboard or register the device to an Secure Firewall Management Center for security analytics. See Cisco Security Analytics and Logging in Managing Firewall Threat Defense with Cloud-Delivered Firewall Management Center in Cisco Security Cloud Control for more information.