<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5555-X Management Interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5555-x-management-interface/m-p/3379712#M959217</link>
    <description>&lt;P&gt;would it possible to configure the management interface on the 5555-x with an IP address and also set the interface IP as the default gateway of the Firepower?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am out of available interface on the 5555-x, some cisco doc says its possible, but I want to ask if anyone have actually configured something like this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:44:30 GMT</pubDate>
    <dc:creator>Ciscouser20188</dc:creator>
    <dc:date>2020-02-21T15:44:30Z</dc:date>
    <item>
      <title>ASA 5555-X Management Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5555-x-management-interface/m-p/3379712#M959217</link>
      <description>&lt;P&gt;would it possible to configure the management interface on the 5555-x with an IP address and also set the interface IP as the default gateway of the Firepower?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am out of available interface on the 5555-x, some cisco doc says its possible, but I want to ask if anyone have actually configured something like this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:44:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5555-x-management-interface/m-p/3379712#M959217</guid>
      <dc:creator>Ciscouser20188</dc:creator>
      <dc:date>2020-02-21T15:44:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5555-X Management Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5555-x-management-interface/m-p/3379758#M959219</link>
      <description>Yes its possible. I am assuming you are referring to FP module which uses&lt;BR /&gt;the MGMT interface along with ASA to use the same interface.&lt;BR /&gt;</description>
      <pubDate>Tue, 08 May 2018 04:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5555-x-management-interface/m-p/3379758#M959219</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-05-08T04:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5555-X Management Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5555-x-management-interface/m-p/3380019#M959327</link>
      <description>Thank you very much Mohammed for the email&lt;BR /&gt;&lt;BR /&gt;here is more detail&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I have a 5550 and want to migrate to 5555-x&lt;BR /&gt;5550 has 8 interfaces configured with IP address, and 5555-x also has 8&lt;BR /&gt;interfaces.&lt;BR /&gt;&lt;BR /&gt;the MGMT on the 5550 is currently not in use&lt;BR /&gt;&lt;BR /&gt;I'm in the process of migrating the config, and at this time I'm managing&lt;BR /&gt;the 5555-x using 172.16.109.202.&lt;BR /&gt;&lt;BR /&gt;if I migrate the config from 5550 to 5555-x, I wont be able to manage&lt;BR /&gt;5555-x using 172.16.109.202&lt;BR /&gt;&lt;BR /&gt;my question is this&lt;BR /&gt;&lt;BR /&gt;is it possible to configure the MGMT interface on 5555-x with&lt;BR /&gt;172.16.109.202 and Firepower with 172.16.109.203 and configure Firewpower&lt;BR /&gt;default gateway to use 172.16.109.202 which is the IP of the MGMT interface?&lt;BR /&gt;&lt;BR /&gt;I did some research, some say it should work, other says it wont, that the&lt;BR /&gt;MGMT is reserved for the Firepower and should not be configured with an IP&lt;BR /&gt;address on the ASA&lt;BR /&gt;&lt;BR /&gt;Thank you very much&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Current Firewall 5550&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Interface                  IP-Address      OK? Method Status&lt;BR /&gt;Protocol&lt;BR /&gt;GigabitEthernet0/0         106.20.10.24 YES CONFIG up&lt;BR /&gt;up&lt;BR /&gt;GigabitEthernet0/1         139.79.24.10   YES CONFIG up&lt;BR /&gt;up&lt;BR /&gt;GigabitEthernet0/2         10.50.19.2     YES CONFIG up&lt;BR /&gt;up&lt;BR /&gt;GigabitEthernet0/3         10.1.2.100        YES CONFIG&lt;BR /&gt;up                    up&lt;BR /&gt;Internal-Data0/0           unassigned      YES unset  up&lt;BR /&gt;up&lt;BR /&gt;Management0/0              unassigned      YES unset  administratively down&lt;BR /&gt;up&lt;BR /&gt;GigabitEthernet1/0         10.250.216.21    YES unset&lt;BR /&gt;up                    up&lt;BR /&gt;GigabitEthernet1/1         162.50.117.26  YES CONFIG up&lt;BR /&gt;up&lt;BR /&gt;GigabitEthernet1/2         10.202.116.40   YES CONFIG up&lt;BR /&gt;up&lt;BR /&gt;GigabitEthernet1/3         10.205.118.90   YES CONFIG up&lt;BR /&gt;up&lt;BR /&gt;Internal-Data1/0           unassigned      YES unset  up&lt;BR /&gt;up&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;New Firewall 5555-x&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Interface                  IP-Address      OK? Method Status&lt;BR /&gt;Protocol&lt;BR /&gt;GigabitEthernet0/0         unassigned      YES unset  administratively down&lt;BR /&gt;down&lt;BR /&gt;GigabitEthernet0/1         unassigned      YES unset  administratively down&lt;BR /&gt;down&lt;BR /&gt;GigabitEthernet0/2         unassigned      YES unset  administratively down&lt;BR /&gt;down&lt;BR /&gt;GigabitEthernet0/3         unassigned      YES unset  administratively down&lt;BR /&gt;down&lt;BR /&gt;GigabitEthernet0/4         unassigned      YES unset  administratively down&lt;BR /&gt;down&lt;BR /&gt;GigabitEthernet0/5         unassigned      YES unset  administratively down&lt;BR /&gt;down&lt;BR /&gt;GigabitEthernet0/6         172.16.109.202  YES manual up&lt;BR /&gt;up&lt;BR /&gt;GigabitEthernet0/7         10.250.2.1    YES unset  up                    up&lt;BR /&gt;Internal-Control0/0        127.0.1.1       YES unset  up&lt;BR /&gt;up&lt;BR /&gt;Internal-Data0/0           unassigned      YES unset  up&lt;BR /&gt;down&lt;BR /&gt;Internal-Data0/1           unassigned      YES unset  up&lt;BR /&gt;up&lt;BR /&gt;Internal-Data0/2           unassigned      YES unset  up&lt;BR /&gt;up&lt;BR /&gt;Internal-Data0/3           169.254.1.1     YES unset  up&lt;BR /&gt;up&lt;BR /&gt;Management0/0              unassigned    YES unset down&lt;BR /&gt;down&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 08 May 2018 12:45:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5555-x-management-interface/m-p/3380019#M959327</guid>
      <dc:creator>Ciscouser20188</dc:creator>
      <dc:date>2018-05-08T12:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5555-X Management Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5555-x-management-interface/m-p/3380453#M959328</link>
      <description>Ok now I understand. No you can't assign IP on 5555-X MGMT interface is you&lt;BR /&gt;are using SFR module. This is listed by Cisco. See this doc.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/sfr/firepower-qsg.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/sfr/firepower-qsg.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Quoted:&lt;BR /&gt;&lt;BR /&gt;ASA 5506-X (9.6 and Earlier) through ASA 5555-X (Software Module) in Routed&lt;BR /&gt;Mode&lt;BR /&gt;&lt;BR /&gt;These models run the ASA FirePOWER module as a software module, and the ASA&lt;BR /&gt;FirePOWER module shares the Management 0/0 or Management 1/1 interface&lt;BR /&gt;(depending on your model) with the ASA.&lt;BR /&gt;&lt;BR /&gt;All management traffic to and from the ASA FirePOWER module must enter and&lt;BR /&gt;exit the Management interface. The ASA FirePOWER module also needs Internet&lt;BR /&gt;access. Management traffic cannot pass through the ASA over the backplane;&lt;BR /&gt;therefore you need to physically cable the management interface to an ASA&lt;BR /&gt;interface to reach the Internet.&lt;BR /&gt;&lt;BR /&gt;If you do not configure a name and IP address in the ASA configuration for&lt;BR /&gt;Management, then the interface belongs exclusively to the module. In this&lt;BR /&gt;case, the Management interface is not a regular ASA interface, and you can:&lt;BR /&gt;&lt;BR /&gt;*1.* &amp;lt;&amp;gt; Configure&lt;BR /&gt;the ASA FirePOWER IP address to be on the same network as a regular ASA&lt;BR /&gt;data interface.&lt;BR /&gt;&lt;BR /&gt;*2.* &amp;lt;&amp;gt; Specify&lt;BR /&gt;the data interface as the ASA FirePOWER gateway.&lt;BR /&gt;&lt;BR /&gt;*3.* &amp;lt;&amp;gt; Directly&lt;BR /&gt;connect the Management interface to the data interface (using a Layer2&lt;BR /&gt;switch).&lt;BR /&gt;&lt;BR /&gt;See the following typical cabling setup to allow ASA FirePOWER access to&lt;BR /&gt;the Internet through the ASA inside interface:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;lt;&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;For the ASA 5506-X on 9.6 and earlier, the ASA 5508-X, and the ASA 5516-X,&lt;BR /&gt;the default configuration enables the above network deployment; the only&lt;BR /&gt;change you need to make is to set the module IP address to be on the same&lt;BR /&gt;network as the ASA inside interface and to configure the module gateway IP&lt;BR /&gt;address.&lt;BR /&gt;&lt;BR /&gt;For other models, you must remove the ASA-configured name and IP address&lt;BR /&gt;for Management 0/0 or 1/1, and then configure the other interfaces as&lt;BR /&gt;indicated above.&lt;BR /&gt;&lt;BR /&gt;*Note* &amp;lt;&amp;gt;: For&lt;BR /&gt;ASA 9.7 and later, you can avoid using an external switch if you have extra&lt;BR /&gt;interfaces that you can assign to an inside bridge group. Be sure to set&lt;BR /&gt;all bridge group interfaces to the same security level, allow same security&lt;BR /&gt;communication, and configure NAT for each bridge group member. See the ASA&lt;BR /&gt;interfaces configuration guide chapter for more information.&lt;BR /&gt;&lt;BR /&gt;*Note* &amp;lt;&amp;gt;: If you&lt;BR /&gt;want to deploy a separate router on the inside network, then you can route&lt;BR /&gt;between management and inside. In this case, you can manage both the ASA&lt;BR /&gt;and ASA FirePOWER module on the Management interface with the appropriate&lt;BR /&gt;configuration changes, including configuring the ASA name and IP address&lt;BR /&gt;for the Management interface (on the same network as the ASA FirePOWER&lt;BR /&gt;module address).&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 09 May 2018 04:42:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5555-x-management-interface/m-p/3380453#M959328</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-05-09T04:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5555-X Management Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5555-x-management-interface/m-p/3380470#M959329</link>
      <description>Thank you very much&amp;nbsp;All good</description>
      <pubDate>Wed, 09 May 2018 06:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5555-x-management-interface/m-p/3380470#M959329</guid>
      <dc:creator>Ciscouser20188</dc:creator>
      <dc:date>2018-05-09T06:07:25Z</dc:date>
    </item>
  </channel>
</rss>

