Troubleshoot Management Connectivity on a Data Interface
> show nat
Auto NAT Policies (Section 2)
1 (nlp_int_tap) to (outside) source static nlp_server_0_sftunnel_intf3 interface service
tcp 8305 8305
2 (nlp_int_tap) to (outside) source static nlp_server_0_ssh_intf3 interface
tcp ssh ssh
3 (nlp_int_tap) to (outside) source static nlp_server_0_sftunnel_ipv6_intf3 interface
ipv6
4 (nlp_int_tap) to (outside) source dynamic nlp_client_0_intf3 interface
5 (nlp_int_tap) to (outside) source dynamic nlp_client_0_ipv6_intf3 interface ipv6
>
Check other settings
See the following commands to check that all other settings are present. You can also see many of these
commands on CDO's Devices > Device Management > Device > Management > Manager Access -
Configuration Details > CLI Output page.
show running-config sftunnel
> show running-config sftunnel
sftunnel interface outside
sftunnel port 8305
show running-config ip-client
> show running-config ip-client
ip-client outside
show conn address fmc_ip
> show conn address 10.89.5.35
5 in use, 16 most used
Inspect Snort:
TCP nlp_int_tap
bytes 86684, flags UxIO
TCP nlp_int_tap
bytes 1630834, flags UIO
>
Check for a successful DDNS update
At the threat defense CLI, check for a successful DDNS update:
debug ddns
> debug ddns
DDNS update request = /v3/update?hostname=domain.example.org&myip=209.165.200.225
Successfuly updated the DDNS sever with current IP addresses
DDNS: Another update completed, outstanding = 0
DDNS: IDB SB total = 0
Cisco Firepower 2100 Getting Started Guide
170
translate_hits = 0, untranslate_hits = 6
translate_hits = 0, untranslate_hits = 73
service tcp 8305 8305
translate_hits = 0, untranslate_hits = 0
translate_hits = 174, untranslate_hits = 0
translate_hits = 0, untranslate_hits = 0
preserve-connection: 0 enabled, 0 in effect, 0 most enabled, 0 most in effect
10.89.5.29(169.254.1.2):51231 outside
10.89.5.29(169.254.1.2):8305 outside
Threat Defense Deployment with CDO
service
10.89.5.35:8305, idle 0:00:04,
10.89.5.35:52019, idle 0:00:02,