EasyManuals Logo

Cisco Secure Firewall 3100 User Manual

Cisco Secure Firewall 3100
66 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #2 background imageLoading...
Page #2 background image
Interface configuration and assignment.
Deployment and monitoring of instances.
For a multi-instance device, you add the chassis to the management center and configure chassis-level settings
on the Chassis Manager page.
Chassis Management Interface
Chassis Management
The chassis uses the dedicated Management interface on the device. Multi-instance mode does not support
using a data interface for chassis management or DHCP addressing for the Management interface.
You can only configure the chassis Management interface at the threat defense CLI (at initial setup) or FXOS
CLI (after you convert to multi-instance mode). See Enable Multi-Instance Mode, on page 18 for initial setup.
See Change Chassis Management Settings at the FXOS CLI, on page 59 to change Management interface
settings in multi-instance mode.
By default, SSH is not allowed to this interface in multi-instance mode unless you enable the SSH server and
an SSH access list. This difference means that you can connect to the application-mode threat defense
Management interface using SSH, but after you convert to multi-instance mode, you can no longer connect
using SSH by default. See Configure SSH and SSH Access List, on page 44.
Note
Instance Management
All instances share the chassis management interface, and each instance has its own IP address on the
Management network. After you add the instance and specify the IP address, you can make changes to the
network settings at the threat defense CLI.
The instance Management IP address allows SSH by default.
Instance Interfaces
To provide flexible physical interface use for instances, you can create VLAN subinterfaces on the chassis
and also share interfaces (VLAN or physical) between multiple instances. See Shared Interface Scalability,
on page 5 and Configure a Subinterface, on page 30.
This chapter discusses chassis VLAN subinterfaces only. You can separately create subinterfaces within the
threat defense instance. See Chassis Interfaces vs. Instance Interfaces, on page 3 for more information.
Note
Interface Types
Physical interfaces, VLAN subinterfaces, and EtherChannel interfaces can be one of the following types:
Data—Use for regular data or the failover link. Data interfaces cannot be shared between instances, and
instances cannot communicate over the backplane to other instances. For traffic on Data interfaces, all
Multi-Instance Mode for the Secure Firewall 3100
2
Multi-Instance Mode for the Secure Firewall 3100
Chassis Management Interface

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Secure Firewall 3100 and is the answer not in the manual?

Cisco Secure Firewall 3100 Specifications

General IconGeneral
BrandCisco
ModelSecure Firewall 3100
CategoryServer
LanguageEnglish

Related product manuals