
7-10
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 7 ASA FirePOWER Module
Configure the ASA FirePOWER Module
•
{
hostname
|
IPv4_address
|
IPv6_address
|
DONTRESOLVE
} specifies either the fully qualified
host name or IP address of the FireSIGHT Management Center. If the FireSIGHT Management
Center is not directly addressable, use DONTRESOLVE.
•
reg_key
is the unique alphanumeric registration key required to register a ASA FirePOWER module
to the FireSIGHT Management Center.
•
nat_id
is an optional alphanumeric string used during the registration process between the
FireSIGHT Management Center and the ASA FirePOWER module. It is required if the hostname is
set to DONTRESOLVE.
Step 4
Close the console connection. For the software module, enter:
>
exit
Configure the ASA FirePOWER Module
Configure the security policy in the ASA FirePOWER OS, and then configure the ASA to send traffic to
the module.
•
Configure the Security Policy on the ASA FirePOWER Module, page 7-10
•
Redirect Traffic to the ASA FirePOWER Module, page 7-10
Configure the Security Policy on the ASA FirePOWER Module
The security policy controls the services provided by the module, such as Next Generation IPS filtering
and application filtering. You configure the security policy on the ASA FirePOWER module using one
of the following methods.
For more information about ASA FirePOWER configuration, see the online help or the
or
.
FireSIGHT Management Center (All Models)
Use a web browser to open
https://
DC_address
, where
DC_address
is the DNS name or IP address of
the manager you defined in
Configure ASA FirePOWER Basic Settings, page 7-9
. For example,
https://dc.example.com.
Alternatively, in ASDM, choose
Home > ASA FirePOWER Status
and click the link at the bottom of
the dashboard.
ASDM (ASA 5506-X, 5508-X, and 5516-X)
In ASDM, choose
Configuration > ASA FirePOWER Configuration
.
Redirect Traffic to the ASA FirePOWER Module
For inline and inline tap (monitor-only) modes, you configure a service policy to redirect traffic to the
module. If you want passive monitor-only mode, you configure a traffic redirection interface, which
bypasses ASA policies.
The following topics explain how to configure these modes.
Содержание ASA 5508-X
Страница 11: ...P A R T 1 Access Control ...
Страница 12: ......
Страница 60: ...4 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 4 Access Rules History for Access Rules ...
Страница 157: ...P A R T 2 Network Address Translation ...
Страница 158: ......
Страница 204: ...9 46 Cisco ASA Series Firewall CLI Configuration Guide Chapter 9 Network Address Translation NAT History for NAT ...
Страница 232: ...10 28 Cisco ASA Series Firewall CLI Configuration Guide Chapter 10 NAT Examples and Reference DNS and NAT ...
Страница 233: ...P A R T 3 Service Policies and Application Inspection ...
Страница 234: ......
Страница 379: ...P A R T 4 Connection Management and Threat Detection ...
Страница 380: ......
Страница 400: ...16 20 Cisco ASA Series Firewall CLI Configuration Guide Chapter 16 Connection Settings History for Connection Settings ...
Страница 414: ...17 14 Cisco ASA Series Firewall CLI Configuration Guide Chapter 17 Quality of Service History for QoS ...