Manage the FDM-Managed Device's Outside Interface
This configuration method:
-
Assumes that the FDM-managed device has not been on-boarded to CDO.
-
Configures a data interface as the outside interface.
-
Configures management access on the outside interface.
-
Allows the public IP address of the cloud connector (after it has been NAT'd through the firewall) to reach the outside interface.
Before you begin
Procedure
Step 1 | Log in to the Secure Firewall device manager. |
Step 2 | In the System Settings menu, click Management Access. |
Step 3 | Click the Data Interfaces tab and click Create Data Interface.
|
Step 4 | Create an Access Control policy in Secure Firewall device manager that allows management traffic (HTTPS) from the public IP address of the SDC or cloud connector, to the outside interface of your FDM-managed device. In this scenario, the source address would be 203.0.113.2 and the source protocol would be HTTPS; the destination address would be 209.165.202.129 and the protocol would be HTTPS. |
Step 5 | Deploy the change. You can now manage the device using the outside interface. |
What to do next
What if you are using a cloud connector?
The process is very similar, except for two things:
-
In step 3c of the procedure above, your "Allowed Network" is a network group object containing the public IP addresses of the cloud connector. See Connecting Devices to CDO Through the Cloud Connector for a list of Cloud Connector IP addresses for the various CDO regions.
-
In step 4 of the procedure above, you create an Access Control rule that allows access to the outside interface from the public IP addresses of the cloud connector.
The registration token onboarding approach is the recommended way of onboarding the FDM-managed device to CDO. After you configure the outside interface to allow management access from the cloud connector, onboard the FDM-managed device. You will connect using the IP address of the outside interface. In our scenario, that address is 209.165.202.129.