Firepower Threat Defense Deployment with FMC
policies only support security zones; you can use zones or interface groups in NAT policies, prefilter
policies, and QoS policies.
e) Click the IPv4 and/or IPv6 tab.
f) Click OK.
Step 4
Click the Edit ( ) for the interface that you want to use for outside.
The General tab appears.
Note
• IPv4—Choose Use Static IP from the drop-down list, and enter an IP address and subnet mask in
slash notation.
For example, enter 192.168.1.1/24
• IPv6—Check the Autoconfiguration check box for stateless autoconfiguration.
If you pre-configured this interface for FMC access management, then the interface will already be
named, enabled, and addressed. You should not alter any of these basic settings because doing so
will disrupt the FMC management connection. You can still configure the Security Zone on this
screen for through traffic policies.
Cisco Firepower 1100 Getting Started Guide
Configure Interfaces
103