Configuring the PIX Firewall

Size: px
Start display at page:

Download "Configuring the PIX Firewall"

Transcription

1 CHAPTER 2 Configuring the PIX Firewall You can configure the PIX Firewall by entering commands on your console computer or terminal that are similar in context to those you use with Cisco IOS technology. Note All commands described in this chapter are explained fully in Chapter 3, Command Reference. Before starting to configure the PIX Firewall, read Installing PIX Firewall and PIX10000 for important information about how to configure a terminal or workstation to act as the PIX Firewall console. You cannot configure the PIX Firewall without an external console to enter the commands. In addition, read the current PIX Firewall release notes for the latest information about new features, command changes, and usage notes. PIX Firewall Command Line The following sections provide preliminary information about use of the PIX Firewall command line interface. Access Modes The PIX Firewall contains a command set based on Cisco IOS technologies, which provides three administrative access modes: Unprivileged mode is available when you first access the PIX Firewall and displays the > prompt. This mode lets you view restricted settings. Privileged mode displays the # prompt and lets you change current settings. Any unprivileged command also works in privileged mode. Use the enable command to start privileged mode and the disable or ^z commands to exit. Configuration mode displays the (config)# prompt and lets you change system configurations. All privileged, unprivileged, and configuration commands work in this mode. Use the configure terminal command to start configuration mode and the ^z command to exit. Configuring the PIX Firewall 2-1

2 PIX Firewall Command Line Help Information Help information is available from the PIX Firewall command line by entering help or a question mark to list all commands, or after a command to list command syntax; for example, arp?. The number of commands listed when you use the question mark or help command differs by access mode so that unprivileged mode offers the least commands and configuration mode offers the greatest number of commands. In addition, you can enter the clear, no, and show commands by themselves on the command line and then press Enter to view the commands that start with these keywords. Abbreviating Commands You can abbreviate most commands down to the fewest unique characters for a command; for example, you can enter wr t to view the configuration instead of entering the full command write terminal, or you can enter en to start privileged mode and co t to start configuration mode. In addition, you can enter 0 instead of Command Line Editing You can use the following commands to edit or view previously entered commands: View the last 10 entered commands with the history command View a previously entered command with ^p or!! View a specific command with!number; for example, to view line 9, enter!9 View the next command with ^n Redisplay the line with ^r or ^l Erase the current line with ^u Erase word to left of cursor with ^w Change a word in the line with this syntax: ^old_word^new_word If you are using a VT100-compatible terminal, such as HyperTerminal with Windows 95 or Windows NT, the up and down arrow keys have the same effect as ^p and ^n. In addition, the left arrow key works as a backspace. The command line history consists of 10 lines in a circular buffer. When you enter the 11th command, it replaces the first entered and so on. When you are at the first line in the history and enter ^n, the 10th line appears. 2-2 PIX Firewall Series Configuration Guide

3 PIX Firewall Command Line Command Dependencies The following commands must be used together: If You Use this Command: aaa authentication link nat outbound radius-server or tacacs-server static syslog host You Need to Use this Command Next: aaa authorization linkpath and age global apply aaa authentication conduit syslog output Command Output Paging On commands such as help or?, show, show xlate, or other commands that provide long listings, you can determine if the information displays a screenful and pauses, or lets the command run to completion. The pager command lets you choose the number of lines to display before the More prompt appears. When paging is enabled, the following prompt appears: <--- More ---> The More prompt uses syntax similar to the UNIX more command: To view another screenful, press the Space bar. To view the next line, press the Enter key. To return to the command line, press the q key. Port Names The following literal names can be used instead of a numerical port value in command lines: dns, ftp, h323, http, ident, ipsec, nntp, ntp, pop2, pop3, pptp, rpc, smtp, snmp, snmptrap, sqlnet, telnet, tftp. You can specify literals in port ranges; for example, ftp-h323. Recommended IP Addresses When you create an internal network, we recommend that you use one of the following address groups for hosts reserved by the Network Working Group (RFC 1918) for use with private network addressing: Class A: to Class B: to Class C: to Configuring the PIX Firewall 2-3

4 Configuring the PIX Firewall Configuring the PIX Firewall Configuring the PIX Firewall consists of the following steps: Step 1 Step 2 Read Installing PIX Firewall and PIX10000 before starting to install your software and prepare a terminal for use as the console. Enter configuration mode by entering the enable command in unprivileged mode and the configure terminal command in privileged mode. The enable command does not require an initial password, so press the Enter key at the password prompt. The prompts should appear as follows: pixfirewall> enable Password: pixfirewall# configure terminal pixfirewall(config)# Step 3 Step 4 Step 5 Step 6 Initially configure the PIX Firewall using the commands described in the section that follows, Initially Configuring the PIX Firewall. Change the default privileged mode password with the enable password command. Monitor the network interface traffic with the show interface command. If both interfaces show that packets are input and output, then the firewall is functioning. If not, ensure that the interface and route commands are specified correctly. Use the ping command as described in Testing the Configuration to ensure that hosts on the inside and outside of the network are visible to the firewall. Note You cannot ping the PIX Firewall s own network interfaces. Step 7 Step 8 Configure the following tasks, which are described in greater detail later in this chapter: Establish outbound access The initial configuration described in the next section permits all inside hosts to start outbound connections. When you expand your configuration, you can tailor outbound access to fit your security policy with access control lists and by determining which IP addresses users have access to on outbound connections. Establish inbound access to servers Most networks have at least one server inside the firewall that outside users need to access including the delivery host, a web site, or for FTP, Telnet, or any of the other services that you want to make available in keeping with your security policy. Determine user authentication and authorization Without user authentication and authorization, your network can be protected but not given the measure of security possible when users must prove who they are and the system determines what they can access. Use ^z to exit configuration mode and return to privileged mode. From privileged mode, use the disable command or ^z to return to unprivileged mode. The command prompt changes for each mode. 2-4 PIX Firewall Series Configuration Guide

5 Initially Configuring the PIX Firewall Initially Configuring the PIX Firewall Access configuration mode and enter the commands that follow to initially configure the firewall. Enter the initial configuration as: 1 interface ethernet0 auto 2 interface ethernet1 auto 3 ip address inside ip_address netmask 4 ip address outside ip_address netmask 5 nat (inside) global (outside) 1 ip_address-ip_address 7 route inside 0 0 inside_default_router_ip_address 8 route outside 0 0 outside_default_router_ip_address 9 write memory Note These commands complete the initial configuration so that inside users can start connections and outside users cannot access the inside network. When you complete these commands, move to Testing the Configuration to verify network connectivity. Command Explanations Lines 1 and 2 let you specify the type of network interfaces installed on your firewall. These are either Ethernet or Token Ring. For Ethernet interfaces, replace hardware_id with ethernet0 for the outside network, ethernet1 for the inside network, and so on. For Token Ring interfaces, replace hardware_id with token0 for the outside network, token1 for the inside network, and so on. Insert one interface statement for each network interface on your PIX Firewall. The auto keyword in lines 1 and 2 can only be used with the Intel 10/100 automatic speed sensing network interface card, which shipped with the PIX Firewall in units manufactured after November If your system contains 3Com Ethernet boards, replace auto with 10baseT or any of the derivations shown on the interface command page in Chapter 3, Command Reference. If your system contains Token Ring boards, replace auto with either 4mbps or 16mbps. Lines 3 and 4 assign the IP addresses to the network interface cards. The inside address can be any unique address available on the inside network. The nat statement in line 5 lets all inside users start outbound connections and provides name address translation (described in Providing Outbound Access ). If the capability of letting all inside users start outbound connections does not agree with your security policy, you can create access control lists with the outbound command and the apply command. Refer to the outbound command page in Command Reference for more information. Line 6 creates a pool of global addresses that inbound connections can use when the internal address is translated to an external address. If the external network connects to the Internet, specify the global command with a NIC-registered address. If the external network is an intranet, use IP addresses for that network. The global statement lets nat group 1 use the pool of global addresses. Enter a class address such as this example address of to assign IP addresses through Alternatively, you can enter a single IP address for use with the Port Address Translation (PAT) feature that lets one IP address handle up to 64,000 inside hosts provided none use multimedia applications. Lines 7 and 8 let you assign default routes to the inside and outside network interfaces. If your system lets routers advertise default routes using the RIP protocol, these lines can be omitted. Line 9 writes the current configuration to flash memory. Configuring the PIX Firewall 2-5

6 Testing the Configuration Testing the Configuration Note Before starting to test your configuration, flush the ARP caches on any routers that feed traffic into or from the PIX Firewall and between the firewall and the Internet. For Cisco routers, use the clear arp command to flush the ARP cache. Ensure that the IP addresses for any network interface are not the same as those in the pool of global addresses created with the global command, those assigned as default routes, or the global addresses you specify for the static or mailhost commands. When you ping from an internal or external host during testing, use the trace debug on command to ensure that traffic is moving through the firewall correctly. For the steps that follow, you will need access to the PIX Firewall console and to at least one host on both the internal and external networks. The troubleshooting information in this section is based on Figure 2-1. Figure 2-1 Internet Example Network Setup Router 1 Host A Host B Router Outside Ethernet Port PIX Firewall Inside Ethernet Port Router Router 2 Host C Host D H7313 Use the steps that follow to determine that the firewall is functioning correctly. Step 1 Use the show ip address command to ensure that the IP address you expect is associated with each network interface. Step 2 Step 3 Use the show interface command to ensure that the interface is functioning and that the cables are connected correctly. If the display contains line protocol is up, then the cable type used is correct and connected to the firewall. If the display states that each interface is up, then the interface is ready for use. If both of these are true, check packets input and packets output. If packets are being received and transmitted, the firewall is correctly configured and a cable is attached. Use the show arp command to see if the PIX Firewall has connectivity by seeing if entries are in the ARP cache. If there are entries, clear the ARP cache with the clear arp command and check to see if new entries appear by repeating the show arp command. 2-6 PIX Firewall Series Configuration Guide

7 Configuring with the PIX Firewall Manager Step 4 Use the PIX Firewall ping command to test the firewall s ability to reach hosts on each network interface. Note that the PIX Firewall ping command cannot test the firewall s inside or outside network interfaces or any of its global addresses. When you ping from a host other than the firewall, view information about the ping with the trace debug on command. Run these tests with ping: (a) (b) (c) See if you can ping hosts on the inside network. If not, move to a host on the inside network and use that host s ping command to test the inside network interface port on the PIX Firewall from a host on the inside network. If this does not work, the problem is on your internal network. From the inside host, try pinging another host on the same segment; for example, C to D in Figure 2-1. If you cannot, the problem is on the inside network and not with the PIX Firewall. Check the routing setup on the internal network(s) and the default gateways for the problem, if RIP listening is not in effect. If a router is present on the inside network, hosts on the inside segment must have gateways pointing to the router, and the router must point to the PIX Firewall. For example, the default routes for C and D must point to Router 2, and the default route for Router 2 must point to the PIX Firewall. Ping a host on the outside interface. If this does not work, move to a host on the interface and repeat the procedure in Step (b) for the outside network. If present, ping the perimeter interface in the same manner. Configuring with the PIX Firewall Manager The Java-based PIX Firewall Manager lets you manage multiple PIX Firewall units from an inside Windows NT Server version 4.0 workstation. Remote PIX Firewall units can also be managed if Private Link is configured on each firewall. Use the commands in the Initially Configuring the PIX Firewall section to prepare the PIX Firewall prior to use. Then use the PIX Firewall telnet command to permit access to the PIX Firewall from the Windows NT server running PIX Firewall Manager. The syntax for the telnet command is: telnet local_ip mask The local_ip parameter is the IP address of the Windows NT server running PIX Firewall Manager. The mask parameter is the network mask that specifies which hosts can access the PIX Firewall console with Telnet. Use to limit Telnet console access to a single host or to permit all hosts on the local network to access the console. Refer to the PIX Firewall Manager Version 4.1 Release Notes for more information about configuring the PIX Firewall Manager. Configuring the PIX Firewall 2-7

8 Providing Outbound Access Providing Outbound Access Before providing outbound access to inside hosts, you need to consider the following security issues: Which outside IP addresses do you want outbound connections to be able to use for access to the Internet? Are there any services you want to restrict outbound users from accessing? Are there any inside hosts that need to be restricted from starting outbound connections? Are there any sites that you want to prevent users from accessing? Do you want to deny Java applet use to inside users? To configure outbound access: Step 1 To let all inside hosts start outbound connections, use the nat command. NAT stands for name address translation, which shields IP addresses on the inside network from the outside network. The nat command enables name address translation and lets all hosts (specified as ) start outbound connections. The nat command can also specify single hosts or ranges of hosts, to make access more selective. Use the nat command to specify which hosts can start outbound connections. Then use the global command to create a pool of global addresses and specify which nat statements can use the address pool. Inherent in the use of nat is the idea of address translation, which means that no matter what numbering scheme is present on the inside or perimeter networks, the only IP addresses visible on the outside of the firewall are those in the address pool created by the global command, those defined by the static command, or by the mailhost command. Address translation protects your inside and perimeter hosts from intruders on the outside network. The following commands let hosts through (because the address actually means through ) create outbound connections and then assigns the global addresses through in a pool to accommodate the outbound connections: nat (inside) global (outside) The number to the right of the (interface) specification in the global command is the nat_id_set, which lets you specify which nat statements are permitted to access the global addresses in the pool. When more than two interfaces are present, this value lets you choose which nat statements can access which external interface. Step 2 By default, whichever inside hosts you let start outbound connections can use all services during the outbound connection. You can expand this capability with access control lists that let you do the following: Deny or permit access to certain services Restrict or permit access from an inside address or access to an outside address Restrict use of Java applets on outbound web access Use the outbound and apply commands to create access control lists. The following commands deny outbound web access and permit a group of hosts access: outbound 1 deny outbound 1 permit outbound 1 deny java apply (inside) 1 outgoing_src 2-8 PIX Firewall Series Configuration Guide

9 Providing Access to Inside Servers and to a Mail Server The first outbound command denies web access to all inside hosts. The next outbound command permits hosts through access to the web. The third outbound command specifies that for host , this user is not permitted to execute Java applets on the inside network. The apply command indicates that the access control list pertains to inside hosts starting outbound connections. Step 3 Step 4 If you want a specific IP address to always be used for outbound access, you can use the static command to map a global IP address to a local IP address. Another feature for outbound connections is the ability to control which IP addresses are visible on the outside. The nat 0 command lets you disable address translation so that inside IP addresses are visible on the outside without address translation. Use of nat 0 depends on your security policy. nat The last two zero's are abbreviations for By itself, nat 0 lets all inside IP addresses start connections on the outside without address translation. If you want these same addresses to be visible on the outside, then you need to use nat 0 in conjunction with the static command described in the next section. The following commands let a group of inside NIC-registered addresses be visible on the outside without translation: static (inside, outside) conduit (inside, outside) tcp Step 5 Another aspect of address translation is the ability to have addresses on the internal network be NIC-registered addresses but not visible on the outside. In this case, users may eventually need to access an IP address on the outside that is also being used as an inside address. You can use the alias command to create an alternate address for the address on the outside so that users can access the outside address transparently by domain name or explicitly by specifying the alternate IP address instead of the outside IP address. Refer to Chapter 3, Command Reference for more information about each command and additional examples. Providing Access to Inside Servers and to a Mail Server By default, the PIX Firewall prevents all outside connections from accessing inside servers. If your security policy requires that outside users access inside servers, use the static command to specify which NIC-registered IP addresses are visible on the outside for users to access and use the conduit command to specify which services users can access on the servers. Whenever you permit outside users to access your network, you should establish a user authentication and authorization system as described in the next section. Without it, your network is only as secure as the inside server. For many networks, this risk is too great. An exception to the use of static and conduit is provided for SMTP mail hosts, which require additional security from attacks. The mailhost command takes the place of the static and conduit commands and lets you create a secure mail server on the inside network. This server is protected by the PIX Firewall s special Mail Guard feature that regulates which commands in the SMTP protocol can be used to access the server. Configuring the PIX Firewall 2-9

10 Providing User Authentication Providing User Authentication User authentication and authorization starts with your security policy and the respective inside RADIUS or TACACS+ server that you have. Authentication determines whether a user has access to the inside or outside network. Authorization determines what services a user can use to access a host. From the configuration on this server you need to determine which users can access the network, which services they can use, and what hosts they can access. Once you have this information, you can configure the PIX Firewall to either enable or disable authentication or authorization. In addition, you can also configure the firewall to permit users access to specific hosts or services. However, if you configure the firewall to this degree, you risk the information being different between the authentication server and the firewall. After you enable authentication and authorization, the PIX Firewall provides credential prompts to inbound or outbound users for FTP, Telnet, or HTTP (web) access. The actual decision about who can access the system and with what services is handled by the authentication and authorization servers. To provide user authentication and authorization: Step 1 Step 2 Step 3 Step 4 For inbound authentication, create the static and conduit statements required to permit outside hosts to access servers on the inside network. This is described in Providing Outbound Access. If the external network connects to the Internet, create a global address pool of NIC-registered IP addresses, or if the network connects to an intranet, a pool of those addresses with the global command. Then specify which inside hosts can start outbound connections with the nat command and with the access control lists features found in the outbound and apply commands. This is described in Providing Access to Inside Servers and to a Mail Server. Specify which server handles authentication or authorization with the radius-server or the tacacs-server commands. RADIUS can provide authentication but not authorization. Enable authentication with the aaa authentication command. It is best to use this command only to enable authentication with one or both of the following commands: aaa authentication any outbound 0 0 tacacs+ aaa authentication any inbound 0 0 tacacs+ In these commands, if the server is RADIUS, use radius instead of tacacs+. While the aaa authentication command lets you specify hosts that can be authenticated or specific hosts, if you implement this level of management in the firewall, you run the risk that your authentication server and the firewall can have different information. For example, if the authentication server is only accepting Telnet logins and you set the firewall for FTP, no users will be authenticated. Step 5 Enable authorization with the aaa authorization command. Even though this command lets you specify which services and inside hosts an authorized user can access, it is best to not set it here and only use this command to enable authorization. The authorization server should make the decision. Use one or both of the following commands: aaa authorization (inside) any outbound 0 0 aaa authorization (inside) any inbound PIX Firewall Series Configuration Guide

11 Sample Configuration Sample Configuration The configuration that follows provides an overview of how the various commands are used to create a configuration. This configuration shows the use of PAT (port address translation), denying Java applets, using the AAA commands, creating a mail host, permitting NFS, initializing SNMP, and setting console access with Telnet and HTTP. Figure 2-2 Configuring Multiple Features Internet Intel Internet Phone NT SNMP RIP PIX Firewall DMZ Global pool (PAT) BSDI Sun Mail host BSDI NT TACACS+ server S6247 The configuration is as follows: 1 syslog output no syslog console 3 syslog host nameif ethernet0 inside security100 5 nameif ethernet1 outside security0 6 interface ethernet0 auto 7 interface ethernet1 10baset 8 ip address inside ip address outside arp timeout 6400 Line 1 sets SYSLOG to send all possible messages to the SYSLOG host in line 3. Line 2 disables displaying messages to the console. Lines 4 and 5 specify the names and security levels for the inside and outside interfaces. This command is not necessary for firewalls with two network interfaces but is a good practice to specify in the event that another interface is added later. Lines 6 and 7 establish that the network interfaces are Ethernet and specify their line speed. Lines 8 and 9 assign IP addresses and the subnet mask to each interface. Line 10 sets an ARP timeout to 6,400 seconds (one hour and 45 minutes). This is useful when you are setting up a network and changing inside and outside host addresses often. Configuring the PIX Firewall 2-11

12 Sample Configuration 11 nat (inside) nat (inside) global (outside) global (outside) global (outside) outbound 11 deny outbound 10 deny outbound 10 permit outbound 10 deny java 20 outbound 11 permit apply (inside) 10 outgoing_src 22 apply (inside) 11 outgoing_src Lines 11 and 12 let you specify address translation for internal hosts starting outbound connections. Lines 13 to 15 create two pools of global addresses to let the nat statements use the address pools for translating internal IP addresses to external addresses. The global command in line 14 specifies an IP address for port address translation address (PAT) so that up to 64,000 hosts can share this PAT address. Lines 16 to 19 create access lists to determine which hosts can access services. Line 16, denies host from accessing H323 (port 1720) services such as MS NetMeeting or InternetPhone. Line 17 denies all hosts from accessing the web (port 80). Lines 18 and 19 let host use the web, but denies its users from downloading Java applets. Line 20 permits host access to the web (at port 80) and to download Java applets. This permit statement outweighs the previous deny regardless of the order in which the statements are entered into the configuration. Lines 21 and 22 specify that the access lists in lines 16 to 20 pertain to connections started on the inside network to access outside services. 23 no rip outside passive 24 no rip outside default 25 rip inside passive 26 rip inside default 27 route outside route outside tacacs-server host q2w3e 30 aaa authentication (inside) any outbound tacacs+ 31 aaa authorization (inside) any outbound static (inside, outside) conduit (inside, outside) h323 tcp 0 0 Lines 23 and 24 disable outside interface RIP listening and broadcasting of a default route. Lines 25 and 26 enable inside interface RIP listening and broadcasting a default route. Line 27 sets the outside default route to (0 is an abbreviation for ) Line 28 creates an additional static route for the outside interface. Lines 29 to 31 establish outbound connection authentication and authorization using TACACS+. Line 32 creates a net static. A net is a static statement static for a class IP address, in this case for IP addresses through Line 33 allows users on the Internet to send InternetPhone (port h323) requests to users on x while addressing them as x PIX Firewall Series Configuration Guide

13 Sample Configuration 34 static (inside, outside) tcp conduit (inside, outside) tcp conduit (inside, outside) rpc udp conduit (inside, outside) udp Line 34 shows the use of the connection limit and the embryonic limit arguments. The maximum number of connections limits the number of connections a host can use. This line permit access to only 10 users and up to 30 SYNs (embryonic connections). In tandem with the conduit statement in line 35, these statements establish an externally visible IP address for web access (port 80 in line 35). Note that static command s maximum connections option applies to both inbound and outbound connections so if 30 SYN flooders come in, the web server cannot go out itself. Line 36 opens the RPC portmapper on UDP port 111. Refer to the UNIX /etc/rpc file and rpc(3n) for more information. Once you create a conduit for RPC, you can use the following command from outside to track down the activity of a PCNFSD on RPC : rpcinfo -u Another use of RPC is with the following command to see the exports of if you want to allow NFS mounting from outside in. showmount -e Many protocols based on RPC, as well as NFS, are insecure and should be used with caution. Line 37 permits NFS access (port 2049) between the outside and inside, such that can mount mailhost (inside, outside) conduit (inside, outside) tcp snmp-server host snmp-server location building snmp-server contact polly hedra 43 snmp-server community ohwhatakeyisthee 44 telnet telnet Line 38 designates an SMTP mail host. The Mail Guard feature in the PIX Firewall defines that only the seven commands described in section of RFC 821 be permitted for access to the mail host. (The commands are HELO, MAIL, RCPT, DATA, RSET, NOOP, and QUIT.) The mailhost command in line 38 makes the mail server on visible on with 10 maximum connections and up to 11 embryonic connections. The Internet DNS MX record for this organization should point to Line 39 creates a conduit for port 113, the IDENT protocol. If the mail server has to talk to many mail servers on the outside which connect back with the now obsolete and highly criticized IDENT protocol, use this conduit to speed up mail transmission. Lines 40 to 43 specify the SNMP server IP address, the server s location, and the name of its administrator. Line 43 specifies the community key in place at the SNMP server. Lines 44 and 45 permit host access to the PIX Firewall console. Line 44 permits a single host, to access the PIX Firewall console with Telnet. The 255 value in the last octet of the netmask means that only the specified host can access the console. Line 45 permits PIX Firewall console access from hosts on the network. The 0 value in the last octet of the netmask permits all hosts in that network access. However, Telnet only permits 16 hosts simultaneous access to the PIX Firewall console over Telnet. Configuring the PIX Firewall 2-13

14 Configuring Failover Configuring Failover Use the failover command without an argument after you connect the optional failover cable between your primary firewall and a secondary firewall. The default is failover on. Enter no failover in the configuration file for the PIX Firewall if you will not be using the failover feature. Use the show failover command to verify the status of the connection and to determine which unit is active. Failover works by passing control to the secondary unit should the primary unit fail. For Ethernet, failover detection should occur within 15 seconds. The markings on the cable let you choose which PIX Firewall unit is primary and which is secondary. Refer to Installing the Failover Connector Assemblies and Cable on the PIX Firewall supplied with the failover cable option for more information about upgrading a PIX Firewall unit to accept the failover cable. The PIX Firewall units manufactured after November 1996 come equipped with the failover cable connectors; for these units, you need only connect the failover cable between the PIX Firewall units. Note The active PIX Firewall does not maintain a copy of the connection state in the secondary unit. If the primary fails, network traffic must re-establish previous connections. Enable the failover feature by adding the failover command (without the active parameter) to the configuration files for both the primary and secondary PIX Firewall units. When you use Telnet to access the PIX Firewall, only the active unit serves the connection. Use the hostname command on both units to identify a unique name for each unit. Using the host name, you can tell if you are communicating with the primary or secondary unit. If you are using Telnet when a failure occurs, you need to disconnect the Telnet session and restart it to the IP address. If a failure occurs, the host name in the telnet command prompt gives you positive acknowledgment that the secondary unit is active. In addition, SYSLOG messages indicate whether the primary or secondary unit failed. Use the show failover command to verify which unit is active. If you want to force a PIX Firewall to be active or go to standby you can use the failover active or no failover active command. Use this feature to force a PIX Firewall offline for maintenance or to return a failed unit to service. Use the show failover command to verify the status of the connection and to determine which unit is active. You can create your own failover cable by connecting the pin outs as shown in Table 2-1. Table 2-1 Failover Cable Pin Outs Primary End of Cable Pins Secondary End of Cable Pins , 11, and 12 connect inside Primary and 12 connect inside Secondary 6 4 and 11 connect inside Secondary PIX Firewall Series Configuration Guide

15 Configuring Failover Configuring Both Firewall Units for Failover Follow these guidelines for configuring both units the same: The unit that has the cable end labeled primary becomes the default primary unit. Give each unit a different host name. Assign both units the same IP address. Ensure that the network is set up so that both units see exactly the same traffic. No ARP entries need to change or timeout anywhere in the network to handle the failover configurations. Note When failover occurs, the secondary unit automatically takes the MAC address of the primary. Frequently Asked Failover Questions This section contains some frequently asked questions about the failover feature. How is start-up initialization accomplished between two units? There is currently no initialization shared between the two units other than the state of failover (On/Off & Active/Standby) and the MAC address of the primary unit. When a unit boots up, it defaults to Failover On and Secondary, unless no failover has been saved in the configuration. It then checks to see if the failover cable is present. If the cable is not present, the unit automatically becomes the active unit. If the cable is present, the unit that has the primary end of the failover cable plugged into it becomes the primary unit by default. The primary unit s MAC address is then given to the secondary unit. How can both units be configured the same without manually entering the configuration twice? The easiest thing to do is save the configuration on the primary unit to diskette, and copy it to the secondary unit. What constitutes a failure? Fault detection is based on the following: Received network traffic counts on incoming and outgoing NIC cards (packet counts are kept and shared between the units every 15 seconds). If the active unit stops receiving packets while the standby is still seeing them for two consecutive 15 second intervals, the standby unit will take over as active. Cable errors. The cable is wired so that each unit can distinguish between a power failure in the other unit, and an unplugged cable. If the standby unit detects that the active unit is powered off (or resets), it will take active control. If the cable is unplugged, a SYSLOG is generated but no switching occurs. An exception to this is at boot-up, at which point an unplugged cable will force the unit active. If both units are powered up without the failover cable installed, they will both become active creating a duplicate IP address conflict on your network. The failover cable must be installed for failover to work correctly. Failover communication. The two units share information every 15 seconds. If the standby unit does not hear from the active unit in two communication attempts (and the cable status is OK), the standby unit will take over as active. Configuring the PIX Firewall 2-15

16 Configuring Failover How long does it take to detect a failure? Network traffic errors are detected within 30 seconds (two consecutive 15-second intervals). Power failure (and cable failure) is detected within 15 seconds. Failover communications errors are detected within 30 seconds (two consecutive 15-second intervals). What happens when failover is triggered? A switch can be initiated by either unit. When a switch takes place each unit changes state. The newly active unit starts accepting traffic while the new standby unit stops accepting traffic. The two units do not share connection states. Any active connections will be dropped when a failover switch occurs. The clients must re-establish the connections through the newly active unit. What maintenance is required? SYSLOG messages will be generated when any errors or switches occur. Evaluate the failed unit and fix or replace it. Failover SYSLOG Messages In the messages that follow, P S can be either Primary or Secondary depending on which the PIX Firewall is sending the message. Failover messages always have a SYSLOG priority level of 2, which indicates critical condition. Refer to the syslog output command description for more information on SYSLOG messages. The SYSLOG messages sent to record failover events are: System okay messages: P S: Cable OK. P S: Disabling failover. The no failover command was entered. P S: Enabling Failover. Either a PIX Firewall is booting that has the failover command in its configuration file or the failover command was just entered in the current configuration. P S: Mate ifc number OK. The interface (ifc) is now working correctly after being brought back online after a failure. The number is either 0 for the inside network interface or 1 for the outside interface. Cabling problem messages: P S: Bad cable. The cable is connected on both units, but the failover cable has developed a wiring problem. P S: Cable not connected my side. The cable on the current PIX Firewall is not connected. P S: Cable not connected other side. The cable on the current unit is connected, but the connector on the other unit is disconnected. P S: Error reading cable status. The cable state cannot be determined. Ensure that all connectors are securely attached PIX Firewall Series Configuration Guide

17 Configuring Private Link Failure in process messages: P S: No response from mate. The other PIX Firewall has not responded in the last 30 seconds. P S: Power failure other side. The other unit has lost power. P S: Mate ifc number failed. The interface (ifc) for the other unit failed. The number is either 0 for the inside network interface or 1 for the outside interface. Status messages: P S: Switching to ACTIVE. The other unit has brought the network back online and is receiving connections. This message also occurs if you force a unit to active with the failover active command, or forced the other unit inactive with the no failover active command. P S: Switching to STANDBY. The unit is inactive as a result of entering no failover active on the unit or by entering failover active on the other unit. Configuring Private Link The link command creates an encrypted path between version 4 Private Link-equipped PIX Firewall units. You can specify up to seven encryption keys for data access between your unit and the remote unit. The key-id and key values must be the same on each side of the Private Link. Once you specify the same keys on both sides of the connection, the systems alert each other when a new key takes effect. You can use the age command to specify the number of minutes that a key is in effect. Specify the link command once for each key you want to specify; for example, if you want seven keys, enter the link command in the configuration seven times. The PIX Firewall Private Link consists of an encryption card and software that permits the PIX Firewall units to provide encrypted communications across an unsecure network such as the Internet. This optional feature is available to domestic customer sites. The PIX Firewall allows up to 256 Private Links. At least two PIX Firewall units are required along with the hardware/software option to use this feature. Private Link works by checking packets that arrive at the PIX Firewall inside interface. If a route link previously created by the linkpath command exists that matches the destination network address, the packet is encrypted and encapsulated in an AH/ESP frame. The frame has a destination address of the remote PIX Firewall and a source address of the local PIX Firewall. When the packet arrives at the remote PIX Firewall unit, the data in the packet is decrypted and then sent through the inside interface to the original IP address specified. No translation takes place on packets that traverse the PIX Firewall Private Link. The addressing and data remains completely unchanged. The PIX Firewall allows up to 512 link paths. You can manage remote PIX Firewall units through the Private Link interface. Configuring the PIX Firewall 2-17

18 Configuring Private Link Example To configure a Private Link, refer to the example setup in Figure 2-3. Figure 2-3 Example Private Link Network Diagram PIX Firewall A Global IP Address: (Outside) Router A Internet Router B Global IP Address: PIX Firewall B (Inside) (Outside) (Inside) Network A Network B S6540 Before configuring Private Link, you would initially configure the systems using the standard commands. When you configure a Private Link, follow these steps: Step 1 Step 2 Step 3 Step 4 Agree on up to seven hexadecimal encryption keys for use between the PIX Firewall Private Link local and remote units; for example, one key could be like the hexadecimal value fadebacbeebeee. Be sure to select unique keys that are difficult to guess. The key can be up to 56 bits in length (14 hexadecimal digits). Use the link command to create an encrypted link for each key you want to specify. Use linkpath to specify the IP address of the network on the inside of the remote firewall. On PIX Firewall A, in the previous illustration, enter these commands to configure the Private Link: link fadebacfadebac link bacfadefadebac link baabaaafadebac link beebeeefadebac linkpath Step 5 On PIX Firewall B, enter these commands: link fadebacfadebac link bacfadefadebac link baabaaafadebac link beebeeefadebac linkpath Step 6 Test the connection to each foreign PIX Firewall with the ping inside command. For example, to test firewall B from firewall A, use these commands to test accessibility to the outside interface ( ), inside interface ( ), and a host on the inside network ( , not shown in figure): ping inside ping inside ping inside Note Use random keys, not the ones shown in this document PIX Firewall Series Configuration Guide

19 Configuring SNMP Configuring SNMP The snmp-server command causes the PIX Firewall to send SNMP traps so that the firewall can be monitored remotely. Use snmp-server host to specify which systems receive the SNMP traps. You can specify up to five systems and all must be on the inside network of the firewall. Note The PIX Firewall does not send SNMP traps until you configure snmp-server host. The SNMP server must be on the inside network. The PIX Firewall does not support browsing of the Cisco SYSLOG MIB. The only MIBs you can browse are System and Interfaces. Use snmp-server contact and snmp-server location to specify your name and the location of the PIX Firewall so that hosts receiving SNMP traps can contact you if monitored problems occur. Using SNMP, you can monitor system events on the PIX Firewall. The PIX Firewall SNMP MIB-II groups available are System and Interfaces. The PIX Firewall SNMP traps available to an SNMP server are: Link up and link down (cable on outside interface working or not working) Warm and cold start Failover SYSLOG messages Security-related events sent via the Cisco Enterprise MIB: Global access denied SYSLOG messages Use CiscoWorks for Windows (Product Number CWPC-2.0-WIN) or any other SNMP V1, MIB-II compliant browser to receive SNMP traps and browse a MIB. SNMP traps occur at UDP port 162. Up to five hosts can receive SNMP traps. SNMP events can be read, but information on the PIX Firewall cannot be changed with SNMP. Compiling Cisco SYSLOG Enterprise MIB Files To receive security and failover SNMP traps from the PIX Firewall, compile the Cisco SYSLOG MIB into your SNMP management application. If you do not compile the Cisco SYSLOG MIB into your application, you only receive MIB-II traps for link up or down, and firewall cold and warm start. To compile Cisco SYSLOG Enterprise MIB files into your browser using CiscoWorks for Windows (SNMPc), complete the following steps: Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Get the Cisco SYSLOG Enterprise MIB files. Start SNMPc. Go to Config Compile MIB. Scroll to the bottom of the list, and select the last entry. Click the Add button. Find the file CISCO-SMI.my and click OK. Scroll to the bottom of the list, and select the last entry. Configuring the PIX Firewall 2-19

20 Configuring SYSLOG Step 8 Step 9 Step 10 Step 11 Click the Add button again. Find the file CISCO-SYSLOG-MIB.my and click OK. Click Load All. If there are no errors, restart SNMPc. Note These instructions are only for SNMPc (CiscoWorks for Windows). Configuring SYSLOG The syslog output command configures the facility and level of SYSLOG messages. Because network devices share the eight facilities, syslog output lets you set the facility marked on all messages. Messages are sent to the SYSLOG host over UDP. The syslog output command also starts sending messages onto the network. Use the syslog host command to specify which systems receive the messages. You can use show syslog to view previously sent messages. The PIX Firewall generates SYSLOG messages for system events, such as security alerts and resource depletion. SYSLOG messages may be used to create alerts and log files, or displayed on the console of a designated host using UNIX SYSLOG conventions. A PC WinSock version of syslogd also will work. Note You can specify only one syslog output command in your configuration. The PIX Firewall sends all messages to the single facility you choose. The SYSLOG server must be on the inside network. The PIX Firewall sends SYSLOG messages only to a single file on the receiving system. The PIX Firewall sends SYSLOG messages to document the following events: Security Dropped UDP packets and denied TCP connections. Resources Notification of 80% and 100% connection and translation slot depletion, and translation and connection counts every 10 minutes. System Console and Telnet logins and logouts, and when the PIX Firewall reboots. Accounting Bytes transferred per connection. Logging is enabled by configuring the PIX Firewall with the IP address of the log host. The syslog output command syntax lets you specify the SYSLOG facility and level for how messages are sent to the SYSLOG host. The facility consists of eight facilities LOCAL0(16) through LOCAL7(23); the default is LOCAL4(20). Hosts file the messages based on the facility number in the message PIX Firewall Series Configuration Guide

Configuring the Cisco Secure PIX Firewall with a Single Intern

Configuring the Cisco Secure PIX Firewall with a Single Intern Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

Cisco Secure PIX Firewall with Two Routers Configuration Example

Cisco Secure PIX Firewall with Two Routers Configuration Example Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Configuring the PIX Firewall with PDM

Configuring the PIX Firewall with PDM Configuring the PIX Firewall with PDM Objectives In this lab exercise you will complete the following tasks: Install PDM Configure inside to outside access through your PIX Firewall using PDM Configure

More information

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

P and FTP Proxy caching Using a Cisco Cache Engine 550 an P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1

More information

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example Document ID: 69374 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram

More information

PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example

PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 70031 Contents Introduction Prerequisites Requirements Components Used Conventions Related Products

More information

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel itoring Cisco Secure PIX Firewall Using SNMP and Syslog Thro Table of Contents Monitoring Cisco Secure PIX Firewall Using SNMP and Syslog Through VPN Tunnel...1 Introduction...1 Before You Begin...1 Conventions...1

More information

HOW TO CONFIGURE CISCO FIREWALL PART I

HOW TO CONFIGURE CISCO FIREWALL PART I HOW TO CONFIGURE CISCO FIREWALL PART I Cisco Abstract: Please find below a step by step process to configure the PIX Firewall from scratch. A simple scenario is given here where you have a corporate network

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 113336 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram

More information

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including

More information

Table of Contents. Cisco Configuring an IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to Cisco Secure PIX Firewall

Table of Contents. Cisco Configuring an IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to Cisco Secure PIX Firewall IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to irewall Table of Contents Configuring an IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to Cisco Secure PIX Firewall...1 Cisco has announced

More information

Chapter 10 Troubleshooting

Chapter 10 Troubleshooting Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided

More information

Configuring CSS Remote Access Methods

Configuring CSS Remote Access Methods CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller

More information

Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520

Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520 Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520 This document describes how to configure an IPSec tunnel with a WatchGuard Firebox II or Firebox III (software version 4.5 or later) at one

More information

Chapter 5 Customizing Your Network Settings

Chapter 5 Customizing Your Network Settings Chapter 5 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax NEXT Wireless Router WNR834B, including LAN, WAN, and routing settings.

More information

ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example

ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example Document ID: 113110 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background

More information

Deploying Secure Internet Connectivity

Deploying Secure Internet Connectivity C H A P T E R 5 Deploying Secure Internet Connectivity This chapter is a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security

More information

Configuring Trend Micro Content Security

Configuring Trend Micro Content Security 9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R- MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features

More information

Monitoring the Firewall Services Module

Monitoring the Firewall Services Module 24 CHAPTER This chapter describes how to configure logging and SNMP for the FWSM. It also describes the contents of system log messages and the system log message format. This chapter does not provide

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example

PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example Document ID: 82018 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background Information

More information

Issue 1 April 2, 2009 Using the VT2442 Web User Interface

Issue 1 April 2, 2009 Using the VT2442 Web User Interface Using the VT2442 Web User Interface View the Terms of Service by visiting the Vonage website at www.vonage.com/tos. 1 Table of Contents Introduction to the Web UI... 3 Home Page... 4 Setup... 7 WAN Configuration...

More information

Application Notes SL1000/SL500 VPN with Cisco PIX 501

Application Notes SL1000/SL500 VPN with Cisco PIX 501 Application Notes SL1000/SL500 VPN with Cisco PIX 501 Version 1.0 Copyright 2006, ASUSTek Computer, Inc. i Revision History Version Author Date Status 1.0 Martin Su 2006/5/4 Initial draft Copyright 2006,

More information

Lab Exercise Configure the PIX Firewall and a Cisco Router

Lab Exercise Configure the PIX Firewall and a Cisco Router Lab Exercise Configure the PIX Firewall and a Cisco Router Scenario Having worked at Isis Network Consulting for two years now as an entry-level analyst, it has been your hope to move up the corporate

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

BR-6624. Load Balancing Router. Manual

BR-6624. Load Balancing Router. Manual BR-6624 Load Balancing Router Manual TABLE OF CONTENTS 1: INTRODUCTION...1 Internet Features...1 Other Features...3 Package Contents...4 Physical Details...4 2: BASIC SETUP...8 Overview...8 Procedure...8

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Load Balancer LB-2. User s Guide

Load Balancer LB-2. User s Guide Load Balancer LB-2 User s Guide TABLE OF CONTENTS 1: INTRODUCTION...1 Internet Features...1 Other Features...3 Package Contents...4 Physical Details...4 2: BASIC SETUP...8 Overview...8 Procedure...8 3:

More information

ABB solar inverters. User s manual ABB Remote monitoring portal

ABB solar inverters. User s manual ABB Remote monitoring portal ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904

More information

- The PIX OS Command-Line Interface -

- The PIX OS Command-Line Interface - 1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

Load Balancing Router. User s Guide

Load Balancing Router. User s Guide Load Balancing Router User s Guide TABLE OF CONTENTS 1: INTRODUCTION... 1 Internet Features... 1 Other Features... 3 Package Contents... 4 Physical Details... 4 2: BASIC SETUP... 8 Overview... 8 Procedure...

More information

Lab 2 - Basic Router Configuration

Lab 2 - Basic Router Configuration CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how

More information

Chapter 3 Using Access Control Lists (ACLs)

Chapter 3 Using Access Control Lists (ACLs) Chapter 3 Using Access Control Lists (ACLs) Access control lists (ACLs) enable you to permit or deny packets based on source and destination IP address, IP protocol information, or TCP or UDP protocol

More information

iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp

iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp Table of Contents Configuring an IPSec Tunnel Cisco Secure PIX Firewall to Checkpoint 4.1 Firewall...1 Introduction...1 Before You Begin...1

More information

Wireless Cable Gateway CG3100Dv3

Wireless Cable Gateway CG3100Dv3 Wireless Cable Gateway CG3100Dv3 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA October 2011 202-10942-01 v1.0 2011 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,

More information

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS MODEL ATC-2000 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2000 is a RS232/RS485 to TCP/IP converter integrated with a robust system and network management features designed

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.

More information

Cisco ASA, PIX, and FWSM Firewall Handbook

Cisco ASA, PIX, and FWSM Firewall Handbook Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Cisco Secure PIX Firewall Frequently Asked Questions

Cisco Secure PIX Firewall Frequently Asked Questions Table of Contents...1 Questions...1 Hardware...1 Software...1 Hardware...2 Software...4 Tools Information...11 Related Information...11 i Cisco Secure PIX Firewall Frequently Asked Questions This document

More information

Networking Guide Redwood Manager 3.0 August 2013

Networking Guide Redwood Manager 3.0 August 2013 Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...

More information

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement Prestige 310 Cable/xDSL Modem Sharing Router User's Guide Supplement Domain Name Support Enhanced WAN Setup Remote Node Support PPPoE Support Enhanced Unix Syslog Setup Firmware and Configuration Files

More information

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for

More information

Chapter 8 Advanced Configuration

Chapter 8 Advanced Configuration Chapter 8 Advanced Configuration This chapter describes how to configure the advanced features of your ProSafe 802.11g Wireless VPN Firewall FVG318. Configuring Dynamic DNS If your network has a permanently

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

ASA 8.X: Routing SSL VPN Traffic through Tunneled Default Gateway Configuration Example

ASA 8.X: Routing SSL VPN Traffic through Tunneled Default Gateway Configuration Example ASA 8.X: Routing SSL VPN Traffic through Tunneled Default Gateway Configuration Example Document ID: 112182 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

Table of Contents. Configuring IP Access Lists

Table of Contents. Configuring IP Access Lists Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message

More information

Topic 7 DHCP and NAT. Networking BAsics.

Topic 7 DHCP and NAT. Networking BAsics. Topic 7 DHCP and NAT Networking BAsics. 1 Dynamic Host Configuration Protocol (DHCP) IP address assignment Default Gateway assignment Network services discovery I just booted. What network is this? What

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

UNCLASSIFIED. BlackBerry Enterprise Server Isolation in a Microsoft Exchange Environment (ITSG-23)

UNCLASSIFIED. BlackBerry Enterprise Server Isolation in a Microsoft Exchange Environment (ITSG-23) BlackBerry Enterprise Server Isolation in a Microsoft Exchange Environment (ITSG-23) March 2007 This page intentionally left blank. March 2007 Foreword The BlackBerry Enterprise Server Isolation in a Microsoft

More information

Cisco PIX Firewall 500 Series

Cisco PIX Firewall 500 Series Cisco PIX Firewall 500 Series Product Overview Cisco PIX Firewall is the high-performance, enterprise-class integrated hardware/software firewall within Cisco s firewall family. PIX Firewall delivers high

More information

Chapter 4 Security and Firewall Protection

Chapter 4 Security and Firewall Protection Chapter 4 Security and Firewall Protection This chapter describes how to use the Security features of the ProSafe Wireless ADSL Modem VPN Firewall Router to protect your network. These features can be

More information

WARP 3.0 Table of Contents

WARP 3.0 Table of Contents WARP 3.0 Table of Contents Overview................................................. 1 Chapter 1: Initial Setup Quick Install Instructions......................................4 Chapter 2: Interfaces LAN.....................................................6

More information

Broadband Bandwidth Controller

Broadband Bandwidth Controller User s Manual Broadband Bandwidth Controller Model No.: SP883B World Wide Web: www.micronet.com.tw Table of Content -------------------------------------------------------------------------------------------------------------------------

More information

PIX/ASA 7.x with Syslog Configuration Example

PIX/ASA 7.x with Syslog Configuration Example PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages

More information

3.1 Connecting to a Router and Basic Configuration

3.1 Connecting to a Router and Basic Configuration 3.1 Connecting to a Router and Basic Configuration Objective This lab will focus on the ability to connect a PC to a router in order to establish a console session and observe the user interface. A console

More information

Integrating Cisco Secure PIX Firewall and IP/VC Videoconferencing Networks

Integrating Cisco Secure PIX Firewall and IP/VC Videoconferencing Networks Integrating Cisco Secure PIX Firewall and IP/VC Videoconferencing Networks An IP/VC Application Note Jonathan Roberts Network Consultant Engineer Enterprise Voice, Video Business Unit September 24, 2001

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Manual. IP Sensor and Watchdog IPSW2210. I P S W 2 2 1 0 M a n u a l P a g e 1. Relay Output. Power input. 12VDC adapter LED Indicators. 2 Dry.

Manual. IP Sensor and Watchdog IPSW2210. I P S W 2 2 1 0 M a n u a l P a g e 1. Relay Output. Power input. 12VDC adapter LED Indicators. 2 Dry. IP Sensor and Watchdog IPSW2210 Manual Relay Output Power input 12VDC adapter LED Indicators 1 wire 2 Dry Output Green : Power Yellow: Link temperature & humidity contact inputs LED indicator sensor input

More information

Network Security 2. Module 2 Configure Network Intrusion Detection and Prevention

Network Security 2. Module 2 Configure Network Intrusion Detection and Prevention 1 1 Network Security 2 Module 2 Configure Network Intrusion Detection and Prevention 2 Learning Objectives 2.1 Cisco IOS Intrusion Prevention System 2.2 Configure Attack Guards on the PIX Security Appliance

More information

Router Setup Manual. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA 208-10060-01 2006-03-17

Router Setup Manual. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA 208-10060-01 2006-03-17 NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA 208-10060-01 2006-03-17 2006 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR is a trademark of Netgear, Inc. Microsoft, Windows,

More information

RF550VPN and RF560VPN

RF550VPN and RF560VPN RF550VPN and RF560VPN FQDN & DDNS Examples Reference Guide How-To: RF550VPN/RF560VPN FQDN & DDNS Examples Copyright 2003 This publication may not be reproduced, in whole or in part, without prior expressed

More information

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3 SIP Proxy Server Administrator Installation and Configuration Guide V2.31b 09SIPXM.SY2.31b.EN3 DSG, DSG logo, InterPBX, InterServer, Blaze Series, VG5000, VG7000, IP590, IP580, IP500, IP510, InterConsole,

More information

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1)

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) Lab GSA: Carlos Caicedo Page I. Lab resources

More information

Network Protocol Configuration

Network Protocol Configuration Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Keying Mode: Main Mode with No PFS (perfect forward secrecy) SA Authentication Method: Pre-Shared key Keying Group: DH (Diffie Hellman) Group 1

Keying Mode: Main Mode with No PFS (perfect forward secrecy) SA Authentication Method: Pre-Shared key Keying Group: DH (Diffie Hellman) Group 1 Prepared by SonicWALL, Inc. 09/20/2001 Introduction: VPN standards are still evolving and interoperability between products is a continued effort. SonicWALL has made progress in this area and is interoperable

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

Multi-Homing Gateway. User s Manual

Multi-Homing Gateway. User s Manual Multi-Homing Gateway User s Manual Contents System 5 Admin Setting Date/Time Multiple Subnet Hack Alert Route Table DHCP DNS Proxy Dynamic DNS Language Permitted IPs Logout Software Update 8 12 21 22 33

More information

Chapter 4 Firewall Protection and Content Filtering

Chapter 4 Firewall Protection and Content Filtering Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Applicazioni Telematiche

Applicazioni Telematiche Angelo Coiro Laboratorio Applicazioni Telematiche L emulatore Packet Tracer Packet Tracer Cisco Packet Tracer is an academic software that allows to emulate Cisco devices Packet Tracer can be used for

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Terminal Server Configuration and Reference Errata

Terminal Server Configuration and Reference Errata Doc. No. 78-0944-06A0 June 14, 1993 Terminal Server Configuration and Reference Errata This document supplies corrections and additional informaiton for the 9.0 version of the Cisco publication Terminal

More information

Connecting to the Firewall Services Module and Managing the Configuration

Connecting to the Firewall Services Module and Managing the Configuration CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting

More information

Broadband Router ESG-103. User s Guide

Broadband Router ESG-103. User s Guide Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits

More information

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program. Configuration Gateway > WAN Page Gateway: LAN nat config Page Gateway: LAN dhcp server config Page Gateway LOG Page Preparing the Network Preparing the Computers for TCP/IP Networking Configuring TCP/IP

More information

FINS Gateway For OMRON PLCs

FINS Gateway For OMRON PLCs 1 Purpose This Technical Note describes how to set up a remote collaboration. A remote collaboration consists in configuring, programming or monitoring a PLC from a remote location, without the need of

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

Wireless DSL Gateway GT704WG. User s Manual

Wireless DSL Gateway GT704WG. User s Manual Wireless DSL Gateway GT704WG User s Manual Table of Contents 1 Introduction 1 Minimum System Requirements 1 Features 2 Getting to Know the Gateway 3 2 Performing a Quick Setup 7 Accessing Quick Setup Screens

More information

FBR-4000. Multi-WAN VPN Router. User Manual

FBR-4000. Multi-WAN VPN Router. User Manual FBR-4000 Multi-WAN VPN Router User Manual V1.0 TABLE OF CONTENTS 1: INTRODUCTION... 1 INTERNET FEATURES... 1 OTHER FEATURES... 3 PACKAGE CONTENTS... 4 PHYSICAL DETAILS... 4 Front Panel... 4 Rear Panel...

More information

Tunnels and Redirectors

Tunnels and Redirectors Tunnels and Redirectors TUNNELS AND REDIRECTORS...1 Overview... 1 Security Details... 2 Permissions... 2 Starting a Tunnel... 3 Starting a Redirector... 5 HTTP Connect... 8 HTTPS Connect... 10 LabVNC...

More information

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1 Configuring the BIG-IP and Check Point VPN-1 /FireWall-1 Introducing the BIG-IP and Check Point VPN-1/FireWall-1 LB, HALB, VPN, and ELA configurations Configuring the BIG-IP and Check Point FireWall-1

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Pre-lab and In-class Laboratory Exercise 10 (L10)

Pre-lab and In-class Laboratory Exercise 10 (L10) ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students

More information

Troubleshooting the Firewall Services Module

Troubleshooting the Firewall Services Module 25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page

More information

Troubleshooting the Firewall Services Module

Troubleshooting the Firewall Services Module CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page

More information

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router 1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains

More information

GregSowell.com. Mikrotik Basics

GregSowell.com. Mikrotik Basics Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information