
(Optional) Configure Management Access for FXOS on Data
Interfaces
If you want to manage FXOS on the Firepower 2100 from a data interface, then you can configure SSH,
HTTPS, and SNMP access. This feature is useful if you want to manage the device remotely, but you want
to keep Management 1/1, which is the native way to access FXOS, on an isolated network. If you enable this
feature, you can continue to use Management 1/1 for local access only. However, you cannot allow
remote
access to or from Management 1/1 for FXOS at the same time as using this feature. This feature requires
forwarding traffic to the ASA data interfaces over the backplane (the default), and you can only specify one
FXOS management gateway.
The ASA uses non-standard ports for FXOS access; the standard port is reserved for use by the ASA on the
same interface. When the ASA forwards traffic to FXOS, it translates the non-standard destination port to the
FXOS port for each protocol (do not change the HTTPS port in FXOS). The packet destination IP address
(which is the ASA interface IP address) is also translated to an internal address for use by FXOS. The source
address remains unchanged. For returning traffic, the ASA uses its data routing table to determine the correct
egress interface. When you access the ASA data IP address for the management application, you must log in
using an FXOS username; ASA usernames only apply for ASA management access.
You can also enable FXOS management traffic
initiation
on ASA data interfaces, which is required for SNMP
traps, or NTP and DNS server access, for example. By default, FXOS management traffic initiation is enabled
for the ASA outside interface for DNS and NTP server communication (required for Smart Software Licensing
communication).
Before you begin
• Single context mode only.
• Excludes ASA management-only interfaces.
• You cannot use a VPN tunnel to an ASA data interface and access FXOS directly. As a workaround for
SSH, you can VPN to the ASA, access the
ASA
CLI, and then use the
connect fxos
command to access
the FXOS CLI. Note that SSH, HTTPS, and SNMPv3 are/can be encrypted, so direct connection to the
data interface is safe.
• Ensure that the FXOS gateway is set to forward traffic to the ASA data interfaces (the default). If you
changed the gateway, then see
(Optional) Change the FXOS and ASA Management IP Addresses or
Procedure
Step 1
In ASDM, choose
Configuration
>
Device Management
>
Management Access
>
FXOS Remote
Management
.
Step 2
Enable FXOS remote management.
a) Choose
HTTPS
,
SNMP
, or
SSH
from the navigation pane.
b) Click
Add
, and set the
Interface
where you want to allow management, set the
IP Address
allowed to
connect, and then click
OK
.
Cisco Firepower 2100 Getting Started Guide
213
ASA Deployment with ASDM
(Optional) Configure Management Access for FXOS on Data Interfaces
Summary of Contents for Firepower 2100
Page 2: ......
Page 166: ......
Page 191: ...Cisco Firepower 2100 Getting Started Guide 189 ASA Deployment with ASDM End to End Procedure ...
Page 221: ... 2021 Cisco Systems Inc All rights reserved ...
Page 222: ......