Cisco Firepower 1010 Getting Started Manual page 142

Hide thumbs Also See for Firepower 1010:
Table of Contents

Advertisement

Configure Interfaces (6.5 and Later)
a) Click Add Interfaces > VLAN Interface.
The General tab appears.
b) Enter a Name up to 48 characters in length.
For example, name the interface inside.
c) Check the Enabled check box.
d) Leave the Mode set to None.
e) From the Security Zone drop-down list, choose an existing inside security zone or add a new one by
clicking New.
For example, add a zone called inside_zone. Each interface must be assigned to a security zone and/or
interface group. An interface can belong to only one security zone, but can also belong to multiple interface
groups. You apply your security policy based on zones or groups. For example, you can assign the inside
interface to the inside zone; and the outside interface to the outside zone. Then you can configure your
access control policy to enable traffic to go from inside to outside, but not from outside to inside. Most
policies only support security zones; you can use zones or interface groups in NAT policies, prefilter
policies, and QoS policies.
f) Set the VLAN ID to 1.
By default, all of the switchports are set to VLAN 1; if you choose a different VLAN ID here, you need
to also edit each switchport to be on the new VLAN ID.
You cannot change the VLAN ID after you save the interface; the VLAN ID is both the VLAN tag used,
and the interface ID in your configuration.
g) Click the IPv4 and/or IPv6 tab.
Cisco Firepower 1010 Getting Started Guide
140
Firepower Threat Defense Deployment with a Remote FMC

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents