Cisco Firepower Threat Defense for the ASA 5506-X Series Using Firepower Device Manager Quick Start Guide
4. Deploy the Firepower Threat Defense in Your Network
6
Procedure
1. Connect the GigabitEthernet 1/1 (outside) interface to your ISP/WAN modem or other outside device. By
default, the IP address is obtained using DHCP, but you can set a static address during initial configuration.
2. Connect a local management workstation to GigabitEthernet 1/2 (or another of the inside bridge group
member interfaces).
3. Configure the workstation to obtain an IP address using DHCP. The workstation gets an address on the
192.168.1.0/24 network.
Note: You have a couple of other options for connecting the management workstation. You can also directly
connect it to the Management port. The workstation gets an address through DHCP on the 192.168.45.0/24
network. Another option is to leave your workstation attached to a switch, and attach that switch to one of the
inside ports such as GigabitEthernet1/2. However, you must ensure that no other device on the switch's
network is running a DHCP server, because it will conflict with the one running on the inside bridge group,
192.168.1.1.
Version 6.1
Figure 7 ASA 5506W-X (with Wi-Fi), 5506-X (without Wi-Fi) for Version 6.1.
USB
RESET
GE MGMT
LS
SLS LS LS LS LS LS LS L
Status
Power Active
Powe r
12VDC, 5A
12345678
wLAN
CONSOLE
GigabitEthernet 1/1
outside, DHCP from Modem
Management 1/1
192.168.45.45
Layer 2 Switch
Wireless Clients
(from DHCP)
192.168.10.x
WAN Modem
Management Computer
DHCP from inside:192.168.45.x
GigabitEthernet 1/2
inside, 192.168.45.1
(Gateway)
GigabitEthernet 1/9 (internal)
wifi, Access Point (from DHCP)
192.168.10.2
Internet