EasyManuals Logo

Cisco Firepower 1100 User Manual

Cisco Firepower 1100
176 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #150 background imageLoading...
Page #150 background image
Interface config status is active
Interface state is active
Check routing and NAT
At the FTD CLI, check that the default route (S*) was added and that internal NAT rules exist for the
Management interface (nlp_int_tap).
show route
> show route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, + - replicated route
SI - Static InterVRF
Gateway of last resort is 10.89.5.1 to network 0.0.0.0
S* 0.0.0.0 0.0.0.0 [1/0] via 10.89.5.1, outside
C 10.89.5.0 255.255.255.192 is directly connected, outside
L 10.89.5.29 255.255.255.255 is directly connected, outside
>
show nat
> show nat
Auto NAT Policies (Section 2)
1 (nlp_int_tap) to (outside) source static nlp_server_0_sftunnel_intf3 interface service
tcp 8305 8305
translate_hits = 0, untranslate_hits = 6
2 (nlp_int_tap) to (outside) source static nlp_server_0_ssh_intf3 interface service
tcp ssh ssh
translate_hits = 0, untranslate_hits = 73
3 (nlp_int_tap) to (outside) source static nlp_server_0_sftunnel_ipv6_intf3 interface
ipv6 service tcp 8305 8305
translate_hits = 0, untranslate_hits = 0
4 (nlp_int_tap) to (outside) source dynamic nlp_client_0_intf3 interface
translate_hits = 174, untranslate_hits = 0
5 (nlp_int_tap) to (outside) source dynamic nlp_client_0_ipv6_intf3 interface ipv6
translate_hits = 0, untranslate_hits = 0
>
Check other settings
See the following commands to check that all other settings are present. You can also see many of these
commands on the FMC's Devices > Device Management > Device > Management > FMC Access
Details > CLI Output page.
show running-config sftunnel
> show running-config sftunnel
sftunnel interface outside
sftunnel port 8305
Cisco Firepower 1100 Getting Started Guide
148
Firepower Threat Defense Deployment with a Remote FMC
Troubleshoot Management Connectivity on a Data Interface

Table of Contents

Other manuals for Cisco Firepower 1100

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 1100 and is the answer not in the manual?

Cisco Firepower 1100 Specifications

General IconGeneral
BrandCisco
ModelFirepower 1100
CategoryFirewall
LanguageEnglish

Related product manuals