Review The Network Deployment And Default Configuration - Cisco Firepower 2100 Getting Started Manual

Hide thumbs Also See for Firepower 2100:
Table of Contents

Advertisement

Firepower Threat Defense Deployment with FDM

Review the Network Deployment and Default Configuration

You can manage the FTD using FDM from either the Management 1/1 interface or the inside interface. The
dedicated Management interface is a special interface with its own network settings.
The following figure shows the recommended network deployment for the Firepower 2100. If you connect
the outside interface directly to a cable modem or DSL modem, we recommend that you put the modem into
bridge mode so the FTD performs all routing and NAT for your inside networks. If you need to configure
PPPoE for the outside interface to connect to your ISP, you can do so after you complete initial setup in FDM.
Pre-Configuration
Cable the Device, on page
Pre-Configuration
Power on the Device, on page
FTD CLI
(Optional) Change Management Network Settings at the CLI, on page
Firepower Device
Log Into FDM, on page
Manager
Firepower Device
Complete the Initial Configuration, on page
Manager
Cisco Commerce
(Optional)
Workspace
Smart Software
Configure Licensing, on page
Manager
Firepower Device
Configure Licensing, on page
Manager
Server.
Firepower Device
Configure the Device in Firepower Device Manager, on page
Manager
Review the Network Deployment and Default Configuration
44.
45.
47.
Configure Licensing, on page
50: Generate a license token.
50: Register the device with the Smart Licensing
Cisco Firepower 2100 Getting Started Guide
48.
50: Obtain feature licenses.
56.
46.
41

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents