hit counter script

Cisco Firepower 2100 Getting Started Manual page 163

Hide thumbs Also See for Firepower 2100:
Table of Contents

Advertisement

Threat Defense Deployment with CDO
• Translated Source—Choose Destination Interface IP.
Step 7
Click Save to add the rule.
The rule is saved to the Rules table.
Step 8
Click Save on the NAT page to save your changes.
Allow Traffic from Inside to Outside
If you created a basic Block all traffic access control policy when you registered the threat defense, then you
need to add rules to the policy to allow traffic through the device. The following procedure adds a rule to
allow traffic from the inside zone to the outside zone. If you have other zones, be sure to add rules allowing
traffic to the appropriate networks.
Procedure
Step 1
Choose Policy > Access Policy > Access Policy, and click Edit ( ) for the access control policy assigned
to the threat defense.
Step 2
Click Add Rule, and set the following parameters:
Figure 114: New Network Object
Note
You cannot use the system-defined any-ipv4 object, because Auto NAT rules add NAT as
part of the object definition, and you cannot edit system-defined objects.
Allow Traffic from Inside to Outside
Cisco Firepower 2100 Getting Started Guide
161

Advertisement

Table of Contents
loading

Table of Contents