Cisco Firepower 2100 Getting Started Manual page 189

Hide thumbs Also See for Firepower 2100:
Table of Contents

Advertisement

ASA Deployment with ASDM
Note
This interface is called Management 1/1 in the ASA; in FXOS, you might see it displayed as MGMT,
management0, or other similar names. This guide refers to this interface as Management 1/1 for consistency
and simplicity.
Some functions must be monitored on FXOS and others on the ASA, so you need to make use of both operating
systems for ongoing maintenance. For initial configuration on FXOS, you can connect to the default
192.168.45.45 IP address using SSH or your browser (https://192.168.45.45).
For initial configuration of the ASA, you can connect using ASDM to https://192.168.45.1/admin. In ASDM,
you can later configure SSH access from any interface.
Both operating systems are available from the console port. Initial connection accesses the FXOS CLI. You
can access the ASA CLI using the connect asa command.
You can also allow FXOS management from ASA data interfaces; configure SSH, HTTPS, and SNMP access.
This feature is useful for remote management.
Unsupported Features
Unsupported ASA Features
The following ASA features are not supported on the Firepower 2100:
• Integrated Routing and Bridging
• Redundant interfaces
• Clustering
• Clientless SSL VPN with KCD
• ASA REST API
• ASA FirePOWER module
• Botnet Traffic Filter
• The following inspections:
Unsupported FXOS Features
The following FXOS features are not supported on the Firepower 2100:
• Backup and restore FXOS configuration
• SCTP inspection maps (SCTP stateful inspection using ACLs is supported)
• Diameter
• GTP/GPRS
You can instead show all or parts of the configuration by using the show configuration command.
Cisco Firepower 2100 Getting Started Guide
Unsupported Features
187

Advertisement

Table of Contents
loading

Table of Contents