Effectuer la configuration initiale à l'aide de l'interface de ligne de commande
• Enter the IPv4 default gateway for the management interface (saisissez la passerelle IPv4 par défaut
pour l'interface de gestion) : Définissez la passerelle comme interface de données (data-interfaces). Ce
paramètre fait passer le trafic de gestion sur le fond de panier afin qu'il puisse être distribué au moyen
de l'interface de données d'accès du gestionnaire.
• Gérer l'appareil localement ?— Saisissezno (non) pour utiliser CDO. Une réponse yes (oui) signifie
que vous utiliserez plutôt gestionnaire d'appareil.
• Configurer le mode pare-feu? : Entrez Routed (routage). L'accès du gestionnaire externe n'est pris en
charge qu'en mode pare-feu routé.
Exemple :
You must accept the EULA to continue.
Press <ENTER> to display the EULA:
End User License Agreement
[...]
Please enter 'YES' or press <ENTER> to AGREE to the EULA:
System initialization in progress.
You must change the password for 'admin' to continue.
Enter new password: ********
Confirm new password: ********
You must configure the network to continue.
You must configure at least one of IPv4 or IPv6.
Do you want to configure IPv4? (y/n) [y]:
Do you want to configure IPv6? (y/n) [n]:
Configure IPv4 via DHCP or manually? (dhcp/manual) [manual]:
Enter an IPv4 address for the management interface [192.168.45.45]: 10.10.10.15
Enter an IPv4 netmask for the management interface [255.255.255.0]: 255.255.255.192
Enter the IPv4 default gateway for the management interface [data-interfaces]:
Enter a fully qualified hostname for this system [firepower]: ftd-1.cisco.com
Enter a comma-separated list of DNS servers or 'none' [208.67.222.222,208.67.220.220]:
Enter a comma-separated list of search domains or 'none' []:
If your networking information has changed, you will need to reconnect.
For HTTP Proxy configuration, run 'configure network http-proxy'
Manage the device locally? (yes/no) [yes]: no
Configure firewall mode? (routed/transparent) [routed]:
Configuring firewall mode ...
Update policy deployment information
- add device configuration
- add network discovery
- add system policy
You can register the sensor to a Firepower Management Center and use the
Firepower Management Center to manage it. Note that registering the sensor
to a Firepower Management Center disables on-sensor Firepower Services
management capabilities.
When registering the sensor to a Firepower Management Center, a unique
alphanumeric registration key is always required.
a sensor to a Firepower Management Center, you must provide the hostname or
the IP address along with the registration key.
'configure manager add [hostname | ip address ] [registration key ]'
However, if the sensor and the Firepower Management Center are separated by a
NAT device, you must enter a unique NAT ID, along with the unique registration
key.
'configure manager add DONTRESOLVE [registration key ] [ NAT ID ]'
Guide de démarrage Cisco Firepower 1010
146
Défense contre les menaces Déploiement avec CDO
Please stand by.
In most cases, to register