Cisco Secure Firewall Playbook
This playbook is designed to provide you with use case education, customer requirements, and actions you'll need to take to help your customers navigate their Cisco product adoption.


How to coach for success with Cisco Secure Firewall
Help your customers get started with initial Cisco Secure Firewall onboarding steps then learn how to tap into advanced features to further centralize, automate, and assure their network.
Customer creates a Cisco Smart Account, starts planning for deployment for essential tasks, configures Access Control Policies, leverages key features, and assesses their health environment
Help your customer unlock the full potential of Secure Firewall while ensuring a smooth implementation of Internet Edge Protection. Support their creation of a Cisco Smart Account to activate and manage licenses via the Cisco Smart Software Manager. Aid with configuration of Access Control Policies with Cisco’s Security Intelligence, leveraging intrusion detection and prevention, and exploring advanced features like AMP and URL filtering. Help them develop robust policies, monitor health, automate updates, and utilize Firepower dashboards for enhanced visibility. Support with deploying best practices, tuning intrusion policies, and managing configurations to optimize their security posture. Provide key resources to help them complete essential tasks like racking, cabling, bootstrapping, understanding migration requirements, and designing robust security policies.
Customer creates a Cisco Smart Account, starts planning for deployment for essential tasks, begins planning, creating, and deploying robust policies while preparing for health checks and upgrades
Help your customer unlock the full potential of Cisco Secure Firewall while ensuring a smooth implementation of Data Center Firewall Operations. Support their creation of a Cisco Smart Account to activate and manage licenses via the Cisco Smart Software Manager. Key implementation tasks, including racking, cabling, and bootstrapping components, set the foundation for your customers. Guide customers in deploying initial configurations, policies, and high-availability clustering to optimize performance and reliability. Support customers with fine-tuning configurations to reduce inefficiencies, enhance health monitoring, and leverage key features, such as malware analysis and automation via APIs.
Customers enter the Internet Edge Protection journey when they meet the following corresponding entry criteria:
FMC Virtual (Firepower Management Center Virtual): SF-FMC-KVM, SF-FMC-VMW
Customers are eligible for the Internet Edge Protection journey when they have purchased:
Eligibility Rule | Hierarchy Component | Rule Description |
---|---|---|
Rule 1 | Version | Minimum version must be 6.6.1 |
Rule 2 | Licenses | Must have any Firepower Threat Defense or FTD license with 'Threat', T (TM, TMC OR TC licenses) |
Eligibility Scenarios |
---|
If Rule 1 and Rule 2 are TRUE, then your customer is ELIGIBLE |
Customers enter the Data Center Firewall Operations journey when they meet the following corresponding entry criteria:
Customers are eligible for the Data Center Firewall Operations journey when they have purchased:
Eligibility Rule | Hierarchy Component | Rule Description |
---|---|---|
Rule 1 | Version | Minimum version must be 7.0 |
Rule 2 | Licences | Any Firepower Threat Defense or FTD license with “Threat” or “T” (T,TM, TMC, TC licenses) or 4100 Clustering >=2 Chassis, 9300 Intra Chassis Clustering have >=2 |
Rule 3 | Appliances | 4100 Clustering>= 2 Chassis 9300 Intra Chassis Clustering have >=2 |
Eligibility Scenarios |
---|
If Rule 1 is TRUE and (Rule 2 or Rule 3), then your customer is ELIGIBLE |