EasyManuals Logo

Cisco ASA 5516-X Quick Start Guide

Cisco ASA 5516-X
8 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #3 background imageLoading...
Page #3 background image
Cisco Firepower Threat Defense for the ASA 5508-X and ASA 5516-X Using Firepower Management Center Quick Start Guide
4. Deploy the Firepower Threat Defense in Your Network
3
4. Deploy the Firepower Threat Defense in Your Network
The following figure shows the recommended network deployment for Firepower Threat Defense on the ASA
5508-X or ASA 5516-X.
Note: You must use a separate inside switch in your deployment.
The example configuration enables the above network deployment with the following behavior.
inside --> outside traffic flow
outside IP address from DHCP
DHCP for clients on inside.
Management 1/1 is used to set up and register the Firepower Threat Defense device to the Firepower
Management Center.
The Management interface requires Internet access for updates. When you put Management on the same
network as an inside interface, you can deploy the Firepower Threat Defense device with only a switch on the
inside and point to the inside interface as its gateway.
The physical management interface is shared between the Management logical interface and the Diagnostic
logical interface; see the Interfaces for Firepower Threat Defense chapter of the Firepower Management
Center Configuration Guide.
Firepower Management Center access on the inside interface
Note: If you want to deploy a separate router on the inside network, then you can route between management
and inside; see the Interfaces for Firepower Threat Defense chapter of the Firepower Management Center
Configuration Guide for examples of alternate deployment configurations.
To cable the above scenario on the ASA 5508-X or ASA 5516-X, see the following illustration.
Note: The following illustration shows a simple topology using a Layer 2 switch. Other topologies can be used and
your deployment will vary depending on your basic logical network connectivity, ports, addressing, and
configuration requirements.
Management
Computer
192.168.45.2
Layer 2
Switch
Firepower
Threat Defense
inside
Management 1/1
IP Address:
192.168.45.45
outside
Management Gateway
GigabitEthernet 1/2
192.168.45.1
GigabitEthernet 1/1
Management
Internet
Firepower
Management Center
192.168.45.44

Other manuals for Cisco ASA 5516-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco ASA 5516-X and is the answer not in the manual?

Cisco ASA 5516-X Specifications

General IconGeneral
Firewall Throughput1.8 Gbps
Concurrent Sessions500, 000
Form Factor1RU
Memory8 GB
Flash Memory8 GB
AC Input100-240V AC
Maximum VLANs1024
RAM8 GB
Operating Temperature32 to 104°F (0 to 40°C)
Storage Temperature-13 to 158°F (-25 to 70°C)
Humidity10 to 90% non-condensing
Power SupplyAC
Frequency50 to 60 Hz
Interfaces8 x 1Gbps (RJ-45), 8 x 1Gbps (SFP)

Related product manuals