EasyManua.ls Logo

Cisco FPR1010-ASA-K9 - Page 95

Cisco FPR1010-ASA-K9
192 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
insideoutside traffic flow
management—Management 1/1 (management)
(6.6 and later) IP address from DHCP
(6.5 and earlier) IP address 192.168.45.45
The Management 1/1 interface is a special interface separate from data
interfaces that is used for management, Smart Licensing, and database
updates. The physical interface is shared with a second logical interface,
the Diagnostic interface. Diagnostic is a data interface, but is limited to
other types of management traffic (to-the-device and from-the-device), such
as syslog or SNMP. The Diagnostic interface is not typically used. See the
Cisco Secure Firewall Device Manager Configuration Guide for more
information.
Note
DNS server for management—OpenDNS: (IPv4) 208.67.222.222, 208.67.220.220; (IPv6)
2620:119:35::35, or servers you specify during setup. DNS servers obtained from DHCP are never used.
NTP—Cisco NTP servers: 0.sourcefire.pool.ntp.org, 1.sourcefire.pool.ntp.org, 2.sourcefire.pool.ntp.org,
or servers you specify during setup
Default routes
Data interfaces—Obtained from outside DHCP, or a gateway IP address you specify during setup
Management interface—(6.6 and later) Obtained from management DHCP. If you do not receive
a gateway, then the default route is over the backplane and through the data interfaces. (6.5 and
earlier) Over the backplane and through the data interfaces
Note that the Management interface requires internet access for licensing and updates, either over
the backplane or using a separate internet gateway. Note that only traffic originating on the
Management interface can go over the backplane; otherwise, Management does not allow through
traffic for traffic entering Management from the network.
DHCP server—Enabled on the inside interface and (6.5 and earlier only) management interface
Device Manager access—All hosts allowed on Management and the inside interface.
NAT—Interface PAT for all traffic from inside to outside
Cisco Firepower 1010 Getting Started Guide
93
Threat Defense Deployment with the Device Manager
Default Configuration

Table of Contents

Related product manuals