Authentication : Disabled
======[ System Information - Data Interfaces ]======
DNS Servers :
Interfaces : GigabitEthernet1/1
===============[ GigabitEthernet1/1 ]===============
State : Enabled
Link : Up
Name : outside
MTU : 1500
MAC Address : 28:6F:7F:D3:CB:8F
----------------------[ IPv4 ]----------------------
Configuration : Manual
Address : 10.89.5.29
Netmask : 255.255.255.192
Gateway : 10.89.5.1
----------------------[ IPv6 ]----------------------
Configuration : Disabled
Check that the Threat Defense registered with the Management Center
At the threat defense CLI, check that the management center registration was completed. Note that this
command will not show the current status of the management connection.
show managers
> show managers
Type : Manager
Host : 10.89.5.35
Registration : Completed
>
Ping the Management Center
At the threat defense CLI, use the following command to ping the management center from the data
interfaces:
ping fmc_ip
At the threat defense CLI, use the following command to ping the management center from the
Management interface, which should route over the backplane to the data interfaces:
ping system fmc_ip
Capture packets on the Threat Defense internal interface
At the threat defense CLI, capture packets on the internal backplane interface (nlp_int_tap) to see if
management packets are being sent:
capture name interface nlp_int_tap trace detail match ip any any
show capturename trace detail
Check the internal interface status, statistics, and packet count
At the threat defense CLI, see information about the internal backplane interface, nlp_int_tap:
show interace detail
> show interface detail
Cisco Firepower 2100 Getting Started Guide
94
Threat Defense Deployment with a Remote Management Center
Troubleshoot Management Connectivity on a Data Interface