EasyManua.ls Logo

Cisco FPR1010-ASA-K9 - End-to-End Procedure: Low-Touch Provisioning

Cisco FPR1010-ASA-K9
192 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
You can only enable manager access on a physical, data interface. You cannot use a subinterface or
EtherChannel. You can also enable manager access on a single secondary interface in the management
center for redundancy.
This interface cannot be management-only.
Routed firewall mode only, using a routed interface.
PPPoE is not supported. If your ISP requires PPPoE, you will have to put a router with PPPoE support
between the threat defense and the WAN modem.
The interface must be in the global VRF only.
SSH is not enabled by default for data interfaces, so you will have to enable SSH later using the
management center. Because the Management interface gateway will be changed to be the data interfaces,
you also cannot SSH to the Management interface from a remote network unless you add a static route
for the Management interface using the configure network static-routes command.
End-to-End Procedure: Low-Touch Provisioning
See the following tasks to deploy the threat defense with CDO using low-touch provisioning.
Cisco Firepower 1010 Getting Started Guide
119
Threat Defense Deployment with CDO
End-to-End Procedure: Low-Touch Provisioning

Table of Contents

Related product manuals