EasyManuals Logo
Home>Cisco>Server>Secure Firewall 3100

Cisco Secure Firewall 3100 User Manual

Cisco Secure Firewall 3100
66 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #20 background imageLoading...
Page #20 background image
configure multi-instance network ipv4 ip_address network_mask gateway_ip_address manager
manager_name {hostname | ipv4_address | DONTRESOLVE} registration_key nat_id
IPv6:
configure multi-instance network ipv6 ipv6_address prefix_length gateway_ip_address manager
manager_name {hostname | ipv6_address | DONTRESOLVE} registration_key nat_id
See the following manager components:
{hostname | ipv4_address | DONTRESOLVE}—Specifies either the FQDN or IP address of the
management center. At least one of the devices, either the management center or the chassis, must have
a reachable IP address to establish the two-way, SSL-encrypted communication channel between the
two devices. If you don't specify a manager hostname or IP address in this command, then enter
DONTRESOLVE; in this case, the chassis must have a reachable IP address or hostname, and you must
specify the nat_id.
registration_key—Enter a one-time registration key of your choice that you will also specify on the
management center when you register the chassis. The registration key must not exceed 37 characters.
Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-).
nat_id—Specifies a unique, one-time string of your choice that you will also specify on the management
center when you register the chassis when one side does not specify a reachable IP address or hostname.
It is required if you do not specify a manager address or hostname, however, we recommend that you
always set the NAT ID even when you specify a hostname or IP address. The NAT ID must not exceed
37 characters. Valid characters include alphanumerical characters (A–Z, a–z, 0–9) and the hyphen (-).
This ID cannot be used for any other devices registering to the management center.
To change the mode back to appliance mode, you must use the FXOS CLI and enter scope system and then
set deploymode native. See Change Chassis Management Settings at the FXOS CLI, on page 59.
Example:
> configure multi-instance network ipv4 172.16.0.104 255.255.255.0 172.16.0.1 manager
fmc1 172.16.0.103 impala67 winchester1
WARNING: This command will discard any FTD configuration (except admin’s credentials).
Make sure you backup your content. All previous content will be lost. System is going to
be re-initialized.
Type ERASE to confirm:ERASE
Exit...
>
Add a Multi-Instance Chassis to the Management Center
Add the multi-instance chassis to the management center. The management center and the chassis share a
separate management connection using the chassis MGMT interface.
You can use the management center to configure all chassis settings as well as instances. The Secure Firewall
chassis manager or configuration at the FXOS CLI is not supported.
Before you begin
Convert the chassis to multi-instance mode. See Enable Multi-Instance Mode, on page 18.
Multi-Instance Mode for the Secure Firewall 3100
20
Multi-Instance Mode for the Secure Firewall 3100
Add a Multi-Instance Chassis to the Management Center

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Secure Firewall 3100 and is the answer not in the manual?

Cisco Secure Firewall 3100 Specifications

General IconGeneral
BrandCisco
ModelSecure Firewall 3100
CategoryServer
LanguageEnglish

Related product manuals