EasyManuals Logo

Cisco Firepower 2100 User Manual

Cisco Firepower 2100
232 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #64 background imageLoading...
Page #64 background image
Step 5 The first time you log in to the threat defense, you are prompted to accept the End User License Agreement
(EULA) and, if using an SSH connection, to change the admin password. You are then presented with the
CLI setup script for the Management interface settings.
The Management interface settings are used even though you are enabling manager access on a data interface.
You cannot repeat the CLI setup wizard unless you clear the configuration; for example, by
reimaging. However, all of these settings can be changed later at the CLI using configur e network
commands. See Cisco Secure Firewall Threat Defense Command Reference.
Note
Defaults or previously entered values appear in brackets. To accept previously entered values, press Enter.
See the following guidelines:
Do you want to configure IPv4? and/or Do you want to configure IPv6?—Enter y for at least one of
these types of addresses. Although you do not plan to use the Management interface, you must set an IP
address, for example, a private address.
Configure IPv4 via DHCP or manually? and/or Configure IPv6 via DHCP, router, or
manually?—Choose manual. You cannot configure a data interface for management if the management
interface is set to DHCP, because the default route, which must be data-interfaces (see the next bullet),
might be overwritten with one received from the DHCP server.
Enter the IPv4 default gateway for the management interface and/or Enter the IPv6 gateway for
the management interface—Set the gateway to be data-interfaces. This setting forwards management
traffic over the backplane so it can be routed through the manager access data interface.
Manage the device locally?—Enter no to use the management center. A yes answer means you will
use the device manager instead.
Configure firewall mode?—Enter routed. Outside manager access is only supported in routed firewall
mode.
Example:
You must accept the EULA to continue.
Press <ENTER> to display the EULA:
End User License Agreement
[...]
Please enter 'YES' or press <ENTER> to AGREE to the EULA:
System initialization in progress. Please stand by.
You must configure the network to continue.
Configure at least one of IPv4 or IPv6 unless managing via data interfaces.
Do you want to configure IPv4? (y/n) [y]:
Do you want to configure IPv6? (y/n) [y]: n
Configure IPv4 via DHCP or manually? (dhcp/manual) [manual]:
Enter an IPv4 address for the management interface [192.168.45.61]: 10.89.5.17
Enter an IPv4 netmask for the management interface [255.255.255.0]: 255.255.255.192
Enter the IPv4 default gateway for the management interface [data-interfaces]:
Enter a fully qualified hostname for this system [firepower]: 1010-3
Enter a comma-separated list of DNS servers or 'none'
[208.67.222.222,208.67.220.220,2620:119:35::35]:
Enter a comma-separated list of search domains or 'none' []: cisco.com
If your networking information has changed, you will need to reconnect.
Disabling IPv6 configuration: management0
Setting DNS servers: 208.67.222.222,208.67.220.220,2620:119:35::35
Setting DNS domains:cisco.com
Setting hostname as 1010-3
Cisco Firepower 2100 Getting Started Guide
62
Threat Defense Deployment with a Remote Management Center
Pre-Configuration Using the CLI

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 2100 and is the answer not in the manual?

Cisco Firepower 2100 Specifications

General IconGeneral
BrandCisco
ModelFirepower 2100
CategoryGateway
LanguageEnglish

Related product manuals