Secure Firewall Threat Defense Onboarding Methods
Follow these links to procedures that describe ways to onboard a Secure Firewall Threat Defense to Security Cloud Control for management by Cloud-Delivered Firewall Management Center or an On-Premises Firewall Management Center.
-
Using a CLI Registration Key. Onboard a threat defense device using a registration key generated from Security Cloud Control and applied to the device using the command line interface. Available for threat defense versions 7.0.3 and 7.2+. These devices will be managed by Cloud-Delivered Firewall Management Center.
-
Onboard several threat defense devices using Zero Touch Provisioning. These devics must be freshly installed and have never been logged into using either the device CLI, a management center, or the device manager. This onboarding method is available for threat defense versions 7.4+. These devices will be managed by Cloud-Delivered Firewall Management Center.
-
Onboard the threat defense device using its serial number. Onboard a newly fatory-shipped threat defense version 7.2+ device to a cloud-delivered Firewall Management Center or to a version 7.4+ On-Premises Firewall Management Center using zero-touch provisioning.
-
Deploy a virtual threat defense device to a cloud environment to one of these supported cloud platforms: Amazon Web Services (AWS), Google Cloud Platform (GCP), or Microsoft Azure.