EasyManuals Logo

Cisco Firepower 2100 User Manual

Cisco Firepower 2100
232 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #10 background imageLoading...
Page #10 background image
The management connection is a secure, TLS-1.3-encrypted communication channel between itself and the
device. You do not need to run this traffic over an additional encrypted tunnel such as Site-to-Site VPN for
security purposes. If the VPN goes down, for example, you will lose your management connection, so we
recommend a simple management path.
Note
Data Interfaces
You can configure other interfaces after you connect the threat defense to the management center.
Typical Separate Management Network Deployment
The following figure shows a typical network deployment for the firewall where:
The threat defense, management center, and management computer connect to the management network
The management network has a path to the internet for licensing and updates.
Figure 1: Separate Management Network
Typical Edge Network Deployment
The following figure shows a typical network deployment for the firewall where:
The inside interface acts as the internet gateway for Management and for the management center.
Connects Management 1/1 to an inside interface through a Layer 2 switch.
Connects the management center and management computer to the switch.
Cisco Firepower 2100 Getting Started Guide
8
Threat Defense Deployment with the Management Center
Review the Network Deployment

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 2100 and is the answer not in the manual?

Cisco Firepower 2100 Specifications

General IconGeneral
BrandCisco
ModelFirepower 2100
CategoryGateway
LanguageEnglish

Related product manuals