Cisco ASA 5516-X 빠른 시작 매뉴얼 - 페이지 3

{카테고리_이름} Cisco ASA 5516-X에 대한 빠른 시작 매뉴얼을 온라인으로 검색하거나 PDF를 다운로드하세요. Cisco ASA 5516-X 9 페이지. Threat defense reimage guide
Cisco ASA 5516-X에 대해서도 마찬가지입니다: 하드웨어 설치 매뉴얼 (32 페이지), 빠른 시작 매뉴얼 (8 페이지), 간편한 설정 매뉴얼 (11 페이지), 소프트웨어 설명서 (37 페이지), 마운트 및 연결 (6 페이지), 매뉴얼 (14 페이지)

Cisco ASA 5516-X 빠른 시작 매뉴얼
Cisco Firepower Threat Defense for the ASA 5508-X and ASA 5516-X Using Firepower Management Center Quick Start Guide

4. Deploy the Firepower Threat Defense in Your Network

The following figure shows the recommended network deployment for Firepower Threat Defense on the ASA
5508-X or ASA 5516-X.
Management
Computer
192.168.45.2
Firepower
Management Center
192.168.45.44
Note:
You must use a separate inside switch in your deployment.
The example configuration enables the above network deployment with the following behavior.
inside --> outside traffic flow
outside IP address from DHCP
DHCP for clients on inside.
Management 1/1 is used to set up and register the Firepower Threat Defense device to the Firepower
Management Center.
The Management interface requires Internet access for updates. When you put Management on the same
network as an inside interface, you can deploy the Firepower Threat Defense device with only a switch on the
inside and point to the inside interface as its gateway.
The physical management interface is shared between the Management logical interface and the Diagnostic
logical interface; see the Interfaces for Firepower Threat Defense chapter of the Firepower Management
Center Configuration Guide.
Firepower Management Center access on the inside interface
Note:
If you want to deploy a separate router on the inside network, then you can route between management
and inside; see the Interfaces for Firepower Threat Defense chapter of the Firepower Management Center
Configuration Guide for examples of alternate deployment configurations.
To cable the above scenario on the ASA 5508-X or ASA 5516-X, see the following illustration.
Note:
The following illustration shows a simple topology using a Layer 2 switch. Other topologies can be used and
your deployment will vary depending on your basic logical network connectivity, ports, addressing, and
configuration requirements.
Management Gateway
Layer 2
Switch
GigabitEthernet 1/2
192.168.45.1
Management
Management 1/1
IP Address:
192.168.45.45
4. Deploy the Firepower Threat Defense in Your Network
Firepower
Threat Defense
inside
outside
GigabitEthernet 1/1
3
Internet