Connect Security Cloud Control to your Managed Devices
Security Cloud Control connects to the devices that it manages through the cloud connector or through a Secure Device Connector (SDC).
If your device can be accessed directly from the internet, you should be using the cloud connector to connect to your device. If you can, configure the device to allow inbound access on port 443 from the Security Cloud Control IP addresses in your cloud region.
If your device is not accessible from the internet, you can deploy an on-premises SDC in your network to allow Security Cloud Control to communicate with your devices.
Configure the device to allow full inbound access from your device subnets/IPs on port 443 (or whichever port you have configured for your device management).
An FDM-managed device can be onboarded to Security Cloud Control using its device credentials, a registration key, or its serial number whether it is directly accessible from the internet. If the FDM-managed device does not have direct access to the internet, but it resides on a network that does; the Security Services Exchange connector delivered as part of the device can reach the Security Services Exchange cloud allowing the FDM-managed device to be onboarded.
You need an on-premises SDC in your network to onboard:
-
An ASA device that is not accessible from the cloud.
-
An FDM-managed device that is not accessible from the cloud and the credentials onboarding method is used.
-
A Cisco IOS device.
-
A device with SSH access.
All other devices and services do not require an on-premise SDC as Security Cloud Control will connect using its cloud connector. See the next section to know the IP addresses that must be allowed for inbound access.
Connecting Devices to Security Cloud Control Through the Cloud Connector
When connecting Security Cloud Control directly to your device through the cloud connector, you should allow inbound access on port 443 (or whichever port you have configured for your device management) for the various IP addresses in the EMEA, United States, or APJ region.
If you are a customer in the Asia-Pacific-Japan (APJ) region, and you connect to Security Cloud Control at https://apj.manage.security.cisco.com, allow inbound access from the following IP addresses:
-
54.199.195.111
-
52.199.243.0
If you are a customer in the Australia (AUS) region, and you connect to Security Cloud Control at https://aus.manage.security.cisco.com, allow inbound access from the following IP addresses:
-
13.55.73.159
-
13.238.226.118
If you are a customer in Europe, the Middle East, or Africa (EMEA) region, and you connect to Security Cloud Control at https://eu.manage.security.cisco.com, allow inbound access from the following IP addresses:
-
35.157.12.126
-
35.157.12.15
If you are a customer in the India (IN) region, and you connect to Security Cloud Control at https://in.manage.security.cisco.com, allow inbound access from the following IP addresses:
-
35.154.115.175
-
13.201.213.99
If you are a customer in the United States (US) region, and you connect to Security Cloud Control at https://us.manage.security.cisco.com, allow inbound access from the following IP addresses:
-
52.34.234.2
-
52.36.70.147
Connecting Security Cloud Control to SDC
When connecting Security Cloud Control to your device through an SDC, the devices you want Security Cloud Control to manage must allow full inbound access from your SDC host on port 443 (or whichever port you have configured for your device management). This is configured using a management access control rule.
You must also ensure that the virtual machine on which the SDC is deployed has network connectivity to the management interface of the managed device.
Special Consideration for Connecting an ASA to an SDC
Specifically, for ASA the SDC uses the same secure communications channel used by ASDM.
If the ASA under management is also configured to accept AnyConnect VPN Client connections, the ASDM HTTP server port must be changed to a value of 1024 or higher. Note that this port number will be the same port number used when onboarding the ASA device into Security Cloud Control.
Example ASA Commands
The following examples assume that the ASA outside interface is named 'outside' and an AnyConnect client is configured on the ASA so the ASDM HTTP server is listening on port 8443.
To enable the outside interface, enter these commands:
Asia-Pacific-Japan Region:
-
http 54.199.195.111 255.255.255.255 outside
-
http 52.199.243.0 255.255.255.255 outside
Australia Region
-
http 13.55.73.159 255.255.255.255 outside
-
http 13.238.226.118 255.255.255.255 outside
EMEA Region
-
http 35.157.12.126 255.255.255.255 outside
-
http 35.157.12.15 255.255.255.255 outside
India Region
-
http 35.154.115.175 255.255.255.255 outside
-
http 13.201.213.99 255.255.255.255 outside
United States Region
-
http 52.34.234.2 255.255.255.255 outside
-
http 52.36.70.147 255.255.255.255 outside
To enable the ASDM HTTP server port, in the case where AnyConnect VPN Client is in use, enter this command:
http server enable 8443