Cisco FPR1010-ASA-K9 Getting Started Manual page 163

Table of Contents

Advertisement

Threat Defense Deployment with CDO
Input flow control is unsupported, output flow control is unsupported
MAC address 0000.0100.0001, MTU 1500
IP address 169.254.1.1, subnet mask 255.255.255.248
37 packets input, 2822 bytes, 0 no buffer
Received 0 broadcasts, 0 runts, 0 giants
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
0 pause input, 0 resume input
0 L2 decode drops
5 packets output, 370 bytes, 0 underruns
0 pause output, 0 resume output
0 output errors, 0 collisions, 0 interface resets
0 late collisions, 0 deferred
0 input reset drops, 0 output reset drops
input queue (blocks free curr/low): hardware (0/0)
output queue (blocks free curr/low): hardware (0/0)
37 packets input, 2304 bytes
5 packets output, 300 bytes
37 packets dropped
Interface number is 14
Interface config status is active
Interface state is active
Check routing and NAT
At the threat defense CLI, check that the default route (S*) was added and that internal NAT rules exist
for the Management interface (nlp_int_tap).
show route
> show route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
Gateway of last resort is 10.89.5.1 to network 0.0.0.0
S*
C
L
>
show nat
> show nat
Auto NAT Policies (Section 2)
Traffic Statistics for "nlp_int_tap":
1 minute input rate 0 pkts/sec,
1 minute output rate 0 pkts/sec,
1 minute drop rate, 0 pkts/sec
5 minute input rate 0 pkts/sec,
5 minute output rate 0 pkts/sec,
5 minute drop rate, 0 pkts/sec
Control Point Interface States:
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, + - replicated route
SI - Static InterVRF
0.0.0.0 0.0.0.0 [1/0] via 10.89.5.1, outside
10.89.5.0 255.255.255.192 is directly connected, outside
10.89.5.29 255.255.255.255 is directly connected, outside
Troubleshoot Management Connectivity on a Data Interface
0 bytes/sec
0 bytes/sec
0 bytes/sec
0 bytes/sec
Cisco Firepower 1010 Getting Started Guide
161

Advertisement

Table of Contents
loading

This manual is also suitable for:

Firepower 1010

Table of Contents