Configure SSH on the FMC Access Data Interface
• Name—Name this rule, for example, inside_to_outside.
• Source Zones—Select the inside zone from Available Zones, and click Add to Source.
• Destination Zones—Select the outside zone from Available Zones, and click Add to Destination.
Leave the other settings as is.
Step 3
Click Add.
The rule is added to the Rules table.
Step 4
Click Save.
Configure SSH on the FMC Access Data Interface
If you enabled FMC access on a data interface, such as outside, you should enable SSH on that interface using
this procedure. This section describes how to enable SSH connections to one or more data interfaces on the
FTD. SSH is not supported to the Diagnostic logical interface.
Note
SSH is enabled by default on the Management interface; however, this screen does not affect Management
SSH access.
The Management interface is separate from the other interfaces on the device. It is used to set up and register
the device to the Firepower Management Center. SSH for data interfaces shares the internal and external user
list with SSH for the Management interface. Other settings are configured separately: for data interfaces,
enable SSH and access lists using this screen; SSH traffic for data interfaces uses the regular routing
configuration, and not any static routes configured at setup or at the CLI.
For the Management interface, to configure an SSH access list, see the configure ssh-access-list command
in the
static-routes command. By default, you configure the default route through the Management interface at
initial setup.
To use SSH, you do not also need an access rule allowing the host IP address. You only need to configure
SSH access according to this section.
You can only SSH to a reachable interface; if your SSH host is located on the outside interface, you can only
initiate a management connection directly to the outside interface.
Cisco Firepower 1010 Getting Started Guide
126
Firepower Threat Defense Command
Firepower Threat Defense Deployment with FMC
Reference. To configure a static route, see the configure network