Firepower Threat Defense Deployment with FDM
• NTP—Cisco NTP servers: 0.sourcefire.pool.ntp.org, 1.sourcefire.pool.ntp.org, 2.sourcefire.pool.ntp.org,
• Default routes
• DHCP server—Enabled on the inside interface and management interface
• FDM access—Management and inside hosts allowed
• NAT—Interface PAT for all traffic from inside to outside
Cable the Device
Manage the Firepower 2100 on either Management 1/1 or Ethernet 1/2. The default configuration also
configures Ethernet1/1 as outside.
Procedure
Step 1
Connect your management computer to either of the following interfaces:
• Management 1/1 (labeled MGMT)—Connect your management computer directly to Management 1/1
or servers you specify during setup
• Data interfaces—Obtained from outside DHCP, or a gateway IP address you specify during setup
• Management interface—Over the backplane and through the data interfaces
Note that the FTD requires internet access for licensing and updates.
for initial configuration, or connect Management 1/1 to your management network. Management 1/1 has
a default IP address (192.168.45.45) and also runs a DHCP server to provide IP addresses to clients
(including the management computer), so make sure these settings do not conflict with any existing
inside network settings (see
Default Configuration, on page
Cisco Firepower 2100 Getting Started Guide
Cable the Device
4).
5