
You cannot use the system-defined
any-ipv4
object, because Auto NAT rules add NAT as part
of the object definition, and you cannot edit system-defined objects.
Note
•
Translated Source
—Choose
Destination Interface IP
.
Step 7
Click
Save
to add the rule.
The rule is saved to the
Rules
table.
Step 8
Click
Save
on the
NAT
page to save your changes.
Allow Traffic from Inside to Outside
If you created a basic
Block all traffic
access control policy when you registered the FTD with the FMC,
then you need to add rules to the policy to allow traffic through the device. The following procedure adds a
rule to allow traffic from the inside zone to the outside zone. If you have other zones, be sure to add rules
allowing traffic to the appropriate networks.
See the
to configure more advanced security settings and rules.
Procedure
Step 1
Choose
Policy
>
Access Policy
>
Access Policy
, and click the
Edit
(
) for the access control policy assigned
to the FTD.
Step 2
Click
Add Rule
, and set the following parameters:
Cisco Firepower 2100 Getting Started Guide
94
Firepower Threat Defense Deployment with a Remote FMC
Allow Traffic from Inside to Outside
Summary of Contents for Firepower 2100
Page 2: ......
Page 166: ......
Page 191: ...Cisco Firepower 2100 Getting Started Guide 189 ASA Deployment with ASDM End to End Procedure ...
Page 221: ... 2021 Cisco Systems Inc All rights reserved ...
Page 222: ......