Download Print this page

Cisco ASA 5506-X Configuration Manual page 354

Cli
Hide thumbs Also See for ASA 5506-X:

Advertisement

Configure the ASA FirePOWER Module
to a Defense Center, you must provide the hostname or the IP address along
with the registration key.
'configure manager add [hostname | ip address ] [registration key ]'
However, if the sensor and the Defense Center are separated by a NAT device,
you must enter a unique NAT ID, along with the unique registration key.
'configure manager add DONTRESOLVE [registration key ] [ NAT ID ]'
Later, using the web interface on the Defense Center, you must use the same
registration key and, if necessary, the same NAT ID when you add this
sensor to the Defense Center.
(Optional for 5506-X.)
Step 11
device using the configure manager add command.
You come up with a registration key, which you will then use in FireSIGHT Management Center when
you add the device to its inventory. The following example shows the simple case. When there is a NAT
boundary, the command is different; see
page
> configure manager add 10.89.133.202 123456
Manager successfully configured.
For the 5506-X, you can instead use ASDM to configure the policy on the ASA FirePOWER module.
When using ASDM, you can configure one module at a time, which is a good solution when you have a
single device or very few devices. If you have a large number of devices, FireSIGHT Management Center
is a better solution.
(Skip for 5506-X when using ASDM.)
Step 12
connection in a browser, using the hostname or address entered above. For example,
https://DC.example.com.
Use the Device Management (Devices > Device Management) page to add the device. For more
information, see the online help or the Managing Devices chapter in the FireSIGHT System User Guide.
Tip
Change the ASA FirePOWER Management IP Address
If you cannot use the default management IP address, then you can set the management IP address from
the ASA. After you set the management IP address, you can access the ASA FirePOWER module using
SSH to perform additional setup.
If you already configured the management address during initial system setup through the ASA
FirePOWER CLI, as described in
CLI, page
For a software module, you can access the ASA FirePOWER CLI to perform setup by sessioning from
Note
the ASA CLI; you can then set the ASA FirePOWER management IP address as part of setup. For a
hardware module, you can complete the initial setup through the Console port.
Cisco ASA Series Firewall CLI Configuration Guide
16-14
Identify the FireSIGHT Management Center appliance that will manage this
16-16.
You also configure NTP and time settings through FireSIGHT Management Center. Use the
Time Synchronization settings when editing the local policy from the System > Local > System
Policy page.
16-15, then it is not necessary to configure it through the ASA CLI or ASDM.
Add ASA FirePOWER to the FireSIGHT Management Center,
Log into the FireSIGHT Management Center using an HTTPS
Configure Basic ASA FirePOWER Settings at the ASA FirePOWER
Chapter 16
ASA FirePOWER (SFR) Module

Hide quick links:

Advertisement

loading