Cisco Firepower 2100 Getting Started Manual page 81

Hide thumbs Also See for Firepower 2100:
Table of Contents

Advertisement

Firepower Threat Defense Deployment with FMC
• NAT—Use interface PAT on the outside interface.
• Access control—Allow traffic from inside to outside.
To configure a basic security policy, complete the following tasks.
Configure Interfaces
Enable FTD interfaces, assign them to security zones, and set the IP addresses. Typically, you must configure
at least a minimum of two interfaces to have a system that passes meaningful traffic. Normally, you would
have an outside interface that faces the upstream router or internet, and one or more inside interfaces for your
organization's networks. Some of these interfaces might be "demilitarized zones" (DMZs), where you place
publically-accessible assets such as your web server.
A typical edge-routing situation is to obtain the outside interface address through DHCP from your ISP, while
you define static addresses on the inside interfaces.
The following example configures a routed mode inside interface with a static address and a routed mode
outside interface using DHCP.
Procedure
Step 1
Choose Devices > Device Management, and click the Edit ( ) for the device.
Step 2
Click Interfaces.
Configure Interfaces, on page
Configure the DHCP Server, on page
Add the Default Route, on page
Configure NAT, on page
84.
Allow Traffic from Inside to Outside, on page
Deploy the Configuration, on page
79.
82.
83.
87.
88.
Cisco Firepower 2100 Getting Started Guide
Configure Interfaces
79

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents