For more troubleshooting information, see https://cisco.com/go/fmc-reg-error.
Configure a Basic Security Policy
This section describes how to configure a basic security policy with the following settings:
• Inside and outside interfaces—Assign a static IP address to the inside interface, and use DHCP for the
outside interface.
• DHCP server—Use a DHCP server on the inside interface for clients.
• Default route—Add a default route through the outside interface.
• NAT—Use interface PAT on the outside interface.
• Access control—Allow traffic from inside to outside.
• SSH—Enable SSH on the FMC access interface.
To configure a basic security policy, complete the following tasks.
Configure Interfaces (6.5 and Later), on page 103.
Configure Interfaces (6.4), on page 107.
Configure the DHCP Server, on page 110.
Add the Default Route, on page 111.
Configure NAT, on page 113.
Allow Traffic from Inside to Outside, on page 115.
Configure SSH on the FMC Access Data Interface, on page 116.
Deploy the Configuration, on page 118.
Configure Interfaces (6.5 and Later)
Add the VLAN1 interface for the switch ports or convert switch ports to firewall interfaces, assign interfaces
to security zones, and set the IP addresses. Typically, you must configure at least a minimum of two interfaces
to have a system that passes meaningful traffic. Normally, you would have an outside interface that faces the
upstream router or internet, and one or more inside interfaces for your organization’s networks. By default,
Ethernet1/1 is a regular firewall interface that you can use for outside, and the remaining interfaces are switch
ports on VLAN 1; after you add the VLAN1 interface, you can make it your inside interface. You can
alternatively assign switch ports to other VLANs, or convert switch ports to firewall interfaces.
Cisco Firepower 1010 Getting Started Guide
138
Firepower Threat Defense Deployment with a Remote FMC
Configure a Basic Security Policy