
•
Name
—Name this rule, for example,
inside_to_outside
.
•
Source Zones
—Select the inside zone from
Available Zones
, and click
Add to Source
.
•
Destination Zones
—Select the outside zone from
Available Zones
, and click
Add to Destination
.
Leave the other settings as is.
Step 3
Click
Add
.
The rule is added to the
Rules
table.
Step 4
Click
Save
.
Configure SSH on the FMC Access Data Interface
If you enabled FMC access on a data interface, such as outside, you should enable SSH on that interface using
this procedure. This section describes how to enable SSH connections to one or more
data
interfaces on the
FTD. SSH is not supported to the Diagnostic logical interface.
SSH is enabled by default on the Management interface; however, this screen does not affect Management
SSH access.
Note
The Management interface is separate from the other interfaces on the device. It is used to set up and register
the device to the Firepower Management Center. SSH for data interfaces shares the internal and external user
list with SSH for the Management interface. Other settings are configured separately: for data interfaces,
enable SSH and access lists using this screen; SSH traffic for data interfaces uses the regular routing
configuration, and not any static routes configured at setup or at the CLI.
For the Management interface, to configure an SSH access list, see the
configure ssh-access-list
command
in the
Firepower Threat Defense Command Reference
. To configure a static route, see the
configure network
static-routes
command. By default, you configure the default route through the Management interface at
initial setup.
To use SSH, you do not also need an access rule allowing the host IP address. You only need to configure
SSH access according to this section.
You can only SSH to a reachable interface; if your SSH host is located on the outside interface, you can only
initiate a management connection directly to the outside interface.
The device allows a maximum of 5 concurrent SSH connections.
Cisco Firepower 2100 Getting Started Guide
95
Firepower Threat Defense Deployment with a Remote FMC
Configure SSH on the FMC Access Data Interface
Содержание Firepower 2100
Страница 2: ......
Страница 30: ...Cisco Firepower 2100 Getting Started Guide 28 Firepower Threat Defense Deployment with FDM What s Next ...
Страница 64: ...Cisco Firepower 2100 Getting Started Guide 62 Firepower Threat Defense Deployment with FMC What s Next ...
Страница 108: ...Cisco Firepower 2100 Getting Started Guide 106 Firepower Threat Defense Deployment with a Remote FMC What s Next ...
Страница 164: ...Cisco Firepower 2100 Getting Started Guide 162 Firepower Threat Defense Deployment with CDO What s Next ...
Страница 166: ......
Страница 191: ...Cisco Firepower 2100 Getting Started Guide 189 ASA Deployment with ASDM End to End Procedure ...
Страница 220: ...Cisco Firepower 2100 Getting Started Guide 218 ASA Deployment with ASDM History for the Firepower 2100 in Platform Mode ...
Страница 221: ... 2021 Cisco Systems Inc All rights reserved ...
Страница 222: ......