About the ASA
Privacy Collection Statement-The Firepower 2100 does not require or actively collect personally-identifiable
information. However, you can use personally-identifiable information in the configuration, for example for
usernames. In this case, an administrator might be able to see this information when working with the
configuration or when using SNMP.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
About the ASA
The ASA provides advanced stateful firewall and VPN concentrator functionality in one device.
The Firepower 2100 is a single-application appliance for the ASA. You can run the ASA in either Platform
mode or Appliance mode (the default). The Firepower 2100 runs an underlying operating system called the
Firepower eXtensible Operating System (FXOS). When in Platform mode, you must configure basic operating
parameters and hardware interface settings in FXOS. These settings include enabling interfaces, establishing
EtherChannels, NTP, image management, and more. You can use the Firepower Chassis Manager web interface
or FXOS CLI. You can then configure your security policy in the ASA operating system using one of the
following managers:
• ASDM-A single device manager included on the device. This guide describes how to manage the ASA
• CLI
• Cisco Security Manager-A multi-device manager on a separate server.
Appliance mode lets you configure all settings in the ASA. Only advanced troubleshooting commands are
available from the FXOS CLI.
ASA and FXOS Management
The ASA and FXOS operating systems share the Management 1/1 interface. This interface has separate IP
addresses for connecting to ASA and to FXOS.
Cisco Firepower 2100 Getting Started Guide
186
using ASDM.
ASA Deployment with ASDM