Cisco Firepower 1100 Started Manual page 143

Hide thumbs Also See for Firepower 1100:
Table of Contents

Advertisement

Firepower Threat Defense Deployment with a Remote FMC
• Name—Name this rule, for example, inside_to_outside.
• Source Zones—Select the inside zone from Available Zones, and click Add to Source.
• Destination Zones—Select the outside zone from Available Zones, and click Add to Destination.
Leave the other settings as is.
Step 3
Click Add.
The rule is added to the Rules table.
Step 4
Click Save.
Configure SSH on the FMC Access Data Interface
If you enabled FMC access on a data interface, such as outside, you should enable SSH on that interface using
this procedure. This section describes how to enable SSH connections to one or more data interfaces on the
FTD. SSH is not supported to the Diagnostic logical interface.
Note
SSH is enabled by default on the Management interface; however, this screen does not affect Management
SSH access.
The Management interface is separate from the other interfaces on the device. It is used to set up and register
the device to the Firepower Management Center. SSH for data interfaces shares the internal and external user
list with SSH for the Management interface. Other settings are configured separately: for data interfaces,
Configure SSH on the FMC Access Data Interface
Cisco Firepower 1100 Getting Started Guide
141

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents