Corporate HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706 USAhttp://www.cisco.comTel: 408 526-4000800 553-NETS (6387)Fax:
ContentsxCisco PIX Firewall and VPN Configuration Guide78-15033-01Voice Over IP 5-14CTIQBE 5-14CU-SeeMe 5-15H.323 5-16Overview 5-
2-40Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing Outside NATThese commands translate all th
2-41Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityPolicy NATThe NAT command for outside NAT, which
2-42Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityPolicy NATFigure 2-12 shows a host on the 10.1.2
2-43Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityPolicy NATFigure 2-13 shows the use of source an
2-44Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityPolicy NATLimitationsThe following configuration
2-45Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingStep 4 Enter glob
2-46Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingOverviewSMR allow
2-47Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingReplace mc-source
2-48Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingExample 2-7 Insid
2-49Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast Routing • Replace out-i
ContentsxiCisco PIX Firewall and VPN Configuration Guide78-15033-01CHAPTER 6 Configuring IPSec and Certification Authorities 6-1How IPSec Works
2-50Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingUse the following
2-51Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingEG - EgressForwar
2-52Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast Routing
CHAPTER 3-1Cisco PIX Firewall and VPN Configuration Guide78-15033-013Controlling Network Access and UseThis chapter describes how to establish and con
3-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseEnabling Inbound ConnectionsThe main opt
3-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseEnabling Inbound ConnectionsYou use the
3-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseControlling Outbound Connectivity • Use
3-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing the Static Command for Port Redire
3-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing the Static Command for Port Redire
3-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing the Static Command for Port Redire
ContentsxiiCisco PIX Firewall and VPN Configuration Guide78-15033-01Using PIX Firewall with a VeriSign CA 7-7Scenario Description 7-7Configur
3-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationUs
3-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationFo
3-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationS
3-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationF
3-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationB
3-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationU
3-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseAccess Control Configuration ExampleTo
3-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseAccess Control Configuration ExampleThe
3-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseAccess Control Configuration ExampleAut
3-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseAccess Control Configuration ExampleSte
ContentsxiiiCisco PIX Firewall and VPN Configuration Guide78-15033-01Using an Easy VPN Remote Device with Digital Certificates 8-13Client Verific
3-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing TurboACLAdding Comments to ACLsPI
3-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing TurboACLNote When you add or dele
3-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseDownloading Access ListsViewing TurboAC
3-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseDownloading Access ListsThe following a
3-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseDownloading Access ListsStep 3 Configur
3-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseDownloading Access ListsStatements are
3-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object
3-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object
3-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object
3-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object
ContentsxivCisco PIX Firewall and VPN Configuration Guide78-15033-01Allowing a Telnet Connection to the Outside Interface 9-18Overview 9-18Us
3-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object
3-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object
3-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object
3-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsTo remove
3-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsFiltering
3-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsWhen a us
3-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsBuffering
3-35Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsTo enable
3-36Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsFiltering
3-37Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsURL Serve
ContentsxvCisco PIX Firewall and VPN Configuration Guide78-15033-01SNMP Usage Notes 9-43SNMP Traps 9-44Receiving Requests and Sending Syslog
3-38Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsConfigura
3-39Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsStep 3 (O
3-40Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsStep 9 Co
CHAPTER 4-1Cisco PIX Firewall and VPN Configuration Guide78-15033-014Using PIX Firewall in SOHO NetworksThis chapter describes features provided by th
4-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot
4-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot
4-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot
4-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot
4-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot
4-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot
ContentsxviCisco PIX Firewall and VPN Configuration Guide78-15033-01Frequently Asked Failover Questions 10-21Configuration Replication Questions
4-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot
4-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot
4-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remo
4-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remo
4-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall PPPoE ClientTo
4-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall PPPoE ClientPPP
4-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall PPPoE ClientSte
4-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall PPPoE ClientFor
4-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DCHP Server 6
Ta b l e 4-2 DHCP Clients Supported by PIX FirewallPIX Firewall Version PIX Firewall PlatformMaximum Number of DHCP Client Addresses (Active Hosts)Ve
ContentsxviiCisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIX A Acronyms and Abbreviations B - 1APPENDIX B Configuration Examples
4-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DCHP ServerConf
4-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DCHP ServerStep
4-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DCHP Servercryp
4-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing DHCP RelayNote With PIX Firewall
4-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DHCP ClientRepl
4-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DHCP ClientNote
4-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DHCP Client
CHAPTER 5-1Cisco PIX Firewall and VPN Configuration Guide78-15033-015Configuring Application Inspection (Fixup)This chapter describes how to use and c
5-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)How Application Inspection Works
5-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)How Application Inspection Works
ContentsxviiiCisco PIX Firewall and VPN Configuration Guide78-15033-01Configuring the Inside Server C - 3Configuring Both Systems After Rebooting
5-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Using the fixup CommandUsing the
5-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Using the fixup CommandYou can v
5-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsBasic In
5-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsPIX Fire
5-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsThe FTP
5-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsHTTPYou
5-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsApplica
5-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsSMTPThi
5-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsThe PIX
5-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsSample
xixCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideThis preface introduces the Cisco PIX Firewall and VPN Configuration Guid
5-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPIf the mail server
5-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IP • CTIQBE applica
5-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPH.323This section
5-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPReplace hh with th
5-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPThe PIX Firewall a
5-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPMGCP messages are
5-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPUse the mgcp gatew
5-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPOverviewCisco IP P
5-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPNote If the Cisco
5-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPUsing SCCP with Ci
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOM
xxCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideDocument OrganizationDocument OrganizationThis guide includes the followin
5-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPOverviewSIP works
5-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPThis command state
5-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPNote When this fea
5-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Multimedia ApplicationsSIP insp
5-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Multimedia Applications2. Once
5-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Multimedia ApplicationsTCP Stre
5-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Database and Directory SupportR
5-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Database and Directory SupportI
5-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Database and Directory SupportN
5-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Management ProtocolsExample 5-2
xxiCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideDocument ConventionsDocument ConventionsCommand descriptions use these co
5-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Management ProtocolsInternet Co
5-35Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Management ProtocolsThe fixup c
5-36Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Management Protocols
CHAPTER 6-1Cisco PIX Firewall and VPN Configuration Guide78-15033-016Configuring IPSec and Certification AuthoritiesThis chapter provides information
6-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesInternet Key Exchange (IKE)
6-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesInternet Key Exchange (IKE)
6-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesInternet Key Exchange (IKE)
6-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesInternet Key Exchange (IKE)
6-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesInternet Key Exchange (IKE)
6-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Authori
xxiiCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideObtaining DocumentationDocumentation CD-ROMCisco documentation and addit
6-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Authori
6-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Authori
6-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Author
6-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Author
6-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Author
6-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSec Validit
6-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSecYou can e
6-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSeccrypto ma
6-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSecBinding a
6-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSec(In other
xxiiiCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideObtaining Technical AssistanceObtaining Technical AssistanceCisco provi
6-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSecassociati
6-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSecIPSec sec
6-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSecNote PIX
6-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Dynamic Crypto Mapsc
6-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Dynamic Crypto MapsN
6-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Dynamic Crypto MapsS
6-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Dynamic Crypto MapsS
6-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesManual Configuration of SA
6-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesManual Configuration of SA
6-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesManual Configuration of SA
xxivCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideObtaining Additional Publications and InformationAll customers, partners
6-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesViewing IPSec Configuratio
6-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesClearing SAs
6-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesClearing SAs
CHAPTER 7-1Cisco PIX Firewall and VPN Configuration Guide78-15033-017Site-to-Site VPN Configuration ExamplesA site-to-site VPN protects the network re
7-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing Pre-Shared KeysNote If you do
7-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing Pre-Shared KeysStep 4 Configu
7-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing Pre-Shared Keysfixup protocol
7-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing Pre-Shared KeysConfiguring PI
7-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing Pre-Shared KeysStep 11 Apply
7-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign
xxvCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideObtaining Additional Publications and Information • Internet Protocol Jo
7-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign
7-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign
7-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign
7-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign
7-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign
7-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous
7-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous
7-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous
7-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous
7-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous
xxviCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideObtaining Additional Publications and Information
7-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous
7-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous
7-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing an Encrypted Tunnel to Obtai
7-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing an Encrypted Tunnel to Obtai
7-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing an Encrypted Tunnel to Obtai
7-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing an Encrypted Tunnel to Obtai
7-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing an Encrypted Tunnel to Obtai
7-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and
7-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and
7-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and
CHAPTER 1-1Cisco PIX Firewall and VPN Configuration Guide78-15033-011Getting StartedThe Cisco PIX Firewall lets you establish stateful firewall protec
7-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and
7-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and
7-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and
7-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and
7-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and
7-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and
7-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and
7-35Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesManual Configuration with NATVerif
7-36Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesManual Configuration with NATExamp
7-37Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesManual Configuration with NATPIX F
1-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network Access • Access Control, page 1-6 • V
7-38Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesManual Configuration with NATtimeo
CHAPTER 8-1Cisco PIX Firewall and VPN Configuration Guide78-15033-018Managing VPN Remote AccessThis chapter describes how to configure the PIX Firewal
8-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing the PIX Firewall as an Easy VPN ServerOver
8-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing the PIX Firewall as an Easy VPN ServerNote
8-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing the PIX Firewall as an Easy VPN ServerEnab
8-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessConfiguring Extended Authentication (Xauth)To sp
8-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessConfiguring Extended Authentication (Xauth)Note
8-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessConfiguring Easy VPN Remote Devices with IKE Mod
8-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Pre-Shared
8-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Pre-Shared
1-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network AccessThe PIX Firewall also lets you im
8-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Pre-Shared
8-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Pre-Shared
8-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Pre-Shared
8-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce
8-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce
8-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce
8-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce
8-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce
8-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce
8-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing PPTP for Remote Accessvpngroup superteam
iiiCisco PIX Firewall and VPN Configuration Guide78-15033-01CONTENTSAbout This Guide xixDocument Objectives xixAudience xixDocument Organ
1-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network AccessPIX Firewall handles UDP data tra
8-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing PPTP for Remote AccessOverviewThe firewal
8-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing PPTP for Remote AccessThe clear vpdn grou
8-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing PPTP for Remote Access
CHAPTER 9-1Cisco PIX Firewall and VPN Configuration Guide78-15033-019Accessing and Monitoring PIX FirewallThis chapter describes how to configure and
9-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User
9-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User
9-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User
9-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User
9-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User
9-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User
1-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network AccessAddress TranslationThe Network Ad
9-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User
9-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User
9-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallConfiguring PIX Firewall BannersThis
9-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Network Time ProtocolOverviewT
9-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Network Time ProtocolViewing N
9-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Network Time ProtocolExample 9
9-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Network Time ProtocolExample 9
9-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallManaging the PIX Firewall ClockManag
9-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Telnet for Remote System Manag
9-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Telnet for Remote System Manag
1-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network AccessCut-Through ProxyCut-through prox
9-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Telnet for Remote System Manag
9-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Telnet for Remote System Manag
9-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Telnet for Remote System Manag
9-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SSH for Remote System Manageme
9-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SSH for Remote System Manageme
9-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SSH for Remote System Manageme
9-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SSH for Remote System Manageme
9-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallEnabling Auto Update Supportlists th
9-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallEnabling Auto Update SupportManaging
9-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCapturing PacketsTimeout: noneDevice
1-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network AccessThe PIX Firewall allows a RADIUS
9-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCapturing PacketsReplace acl_id with
9-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCapturing PacketsStep 4 To copy the
9-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCapturing PacketsPacket Capture Exam
9-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallSaving Crash Information to Flash Me
9-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogTo save test crash infor
9-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogEnabling Logging to Sysl
9-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogReplace syslogid with th
9-35Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogTo view disabled message
9-36Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogTo enable logging of the
9-37Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogLogging BehaviorThere ar
1-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedProtecting Your Network from AttackObject GroupingObject gr
9-38Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogDeny Example1. An inboun
9-39Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogManaging IDS Syslog Mess
9-40Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogTable 9-7 summarizes the
9-41Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPUsing SNMPThis section des
9-42Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPThe PIX Firewall SNMP trap
9-43Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPEach row of the cpmCPUTota
9-44Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPSNMP TrapsTraps are differ
9-45Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPStep 5 Start sending syslo
9-46Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPStep 10 Find the file CISC
9-47Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPIn SNMP protocol, the MIB
1-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedProtecting Your Network from AttackFor more information abo
9-48Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPVerifying Memory UsageYou
9-49Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPViewing The Connection Cou
9-50Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPViewing System Buffer Usag
9-51Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPIn the HP OpenView Browse
9-52Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMP
CHAPTER 10-1Cisco PIX Firewall and VPN 78-15033-0110Using PIX Firewall FailoverThis chapter describes the PIX Firewall failover feature, which allows
10-2Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFailover System RequirementsFailover System RequirementsTable 1
10-3Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverUnderstanding FailoverUnderstanding FailoverThis section describ
10-4Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverUnderstanding FailoverFigure 10-1 Parallel Position in NetworkI
10-5Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverUnderstanding FailoverThe failover link can be one of the follow
1-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedProtecting Your Network from AttackActiveX BlockingActiveX
10-6Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverUnderstanding FailoverPrimary and Secondary Vs. Active and Stan
10-7Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverUnderstanding FailoverConfiguration replication from the active
10-8Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFailover Configuration Prerequisites3. Broadcast Ping test—The
10-9Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring Cable-Based FailoverStep 2 If an interface is not go
10-10Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring Cable-Based FailoverStep 2If you have not done so
10-11Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring LAN-Based FailoverConfiguring LAN-Based FailoverThi
10-12Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring LAN-Based FailoverNote If you are changing from ca
10-13Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring LAN-Based Failoverb.primary(config)# nameif hardwar
10-14Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring LAN-Based Failoverc.primary(config)# ip address in
10-15Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring LAN-Based FailoverConfiguring the Secondary UnitFol
1-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedSupporting Specific Protocols and ApplicationsSupporting S
10-16Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverVerifying the Failover ConfigurationVerifying the Failover Con
10-17Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverVerifying the Failover Configuration • Using the Show Failover
10-18Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverVerifying the Failover Configuration Logical Update Que
10-19Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverVerifying the Failover ConfigurationInterface name (n.n.n.n): F
10-20Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverForcing FailoverTesting the Failover FunctionalityFollow these
10-21Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverMonitoring FailoverFailover Off...To disable the LAN failover l
10-22Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFrequently Asked Failover QuestionsFrequently Asked Failover Q
10-23Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFrequently Asked Failover QuestionsConfiguration Replication Qu
10-24Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFrequently Asked Failover Questions • How long does it take t
10-25Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFrequently Asked Failover QuestionsLAN-Based Failover Questions
1-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedSupporting Specific Protocols and Applications • SCCP, pa
10-26Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFailover Configuration ExamplesFailover Configuration Examples
10-27Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFailover Configuration Examplesfailover ip address outside 209.
10-28Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFailover Configuration Examplestelnet 192.168.2.45 255.255.255
CHAPTER 11-1Cisco PIX Firewall and VPN Configuration Guide78-15033-0111Changing Feature Licenses and System SoftwareThis chapter describes how to chan
11-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareUpgrading Your License by E
11-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareUpgrading Your License by E
11-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareUpgrading Your License by E
11-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareUsing HTTP to Copy Software
11-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareDownloading the Current Sof
11-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareDownloading the Current Sof
1-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedSupporting Specific Protocols and ApplicationsWhen coupled
11-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareDownloading the Current Sof
11-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareInstalling and Recovering P
11-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareInstalling and Recovering
11-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareInstalling and Recovering
11-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareInstalling and Recovering
11-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareDowngrading to a Previous
11-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareUpgrading Failover Systems
11-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareTFTP Download Error CodesS
11-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareTFTP Download Error Codes.
A-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIXAAcronyms and AbbreviationsThis appendix lists the acronyms and abbreviations use
ContentsivCisco PIX Firewall and VPN Configuration Guide78-15033-01Protecting Your Network from Attack 1-8Unicast Reverse Path Forwarding 1-9
1-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedCreating a Virtual Private NetworkLDAP Version 2 and ILSPI
A-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix A Acronyms and AbbreviationsCPU Central Processing Unit.CRL certificate rev
A-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix A Acronyms and AbbreviationsIFP Internet Filtering Protocol.IGMP Internet G
A-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix A Acronyms and AbbreviationsNSSA not so stubby area.NTP Network Time Protoc
A-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix A Acronyms and AbbreviationsSSH Secure Shell.SMR Stub Multicast Routing.SMT
A-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix A Acronyms and Abbreviations
B-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIXBConfiguration Examples for Other Remote Access ClientsThis appendix describes di
B-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/
B-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/
B-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/
B-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/
1-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedCreating a Virtual Private NetworkVirtual Private Networks
B-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/
B-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/
B-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsL2TP with IPSec in
B-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsL2TP with IPSec in
B-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsL2TP with IPSec in
B-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsWindows 2000 Clien
B-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsWindows 2000 Clien
B-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsWindows 2000 Clien
B-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsWindows 2000 Clien
B-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsWindows 2000 Clien
1-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedCreating a Virtual Private Network • Phase 1—This phase,
B-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl
B-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl
B-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl
B-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl
B-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl
B-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl
B-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl
C-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIXCMS-Exchange Firewall ConfigurationThis appendix explains how you can configure t
Ta b l e C-1 Names and AddressesSystem Name IP Address DomainOutside Windows NT Server outserver 209.165.201.2 pixoutInside Windows NT Server inserve
C-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix C MS-Exchange Firewall ConfigurationConfiguring the Outside ServerConfiguri
1-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedCreating a Virtual Private NetworkMost browsers, by defaul
C-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix C MS-Exchange Firewall ConfigurationConfiguring Both Systems After Rebootin
D-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIXDTCP/IP Reference InformationThis appendix includes the following sections: • IP
D-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationPorts • In this guide, the use of “address”
D-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationPortscitrix-ica TCP 1494 Citrix Independent C
D-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationPortsnetbios-ssn TCP 139 NetBIOS Session Serv
D-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationProtocols and ApplicationsProtocols and Appli
D-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationProtocols and ApplicationsSupported Multimedi
D-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet Masks • Transmission Control Pr
D-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet MasksIn these examples, the ip a
D-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet MasksUses for Subnet Information
1-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedCreating a Virtual Private NetworkSupporting Remote Access
D-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet MasksAddresses in the .192 Mask
D-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet MasksAddresses in the .248 Mask
D-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet MasksAddresses in the .252 Mask
D-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet Masks10 .36 .37 .38 .3911 .40 .
D-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet Masks45 .176 .177 .178 .17946 .
E-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIXESupported VPN Standards and Security ProposalsThis appendix lists the VPN standa
E-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix E Supported VPN Standards and Security ProposalsInternet Key Exchange (IKE)
E-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix E Supported VPN Standards and Security ProposalsCertification Authorities (
E-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix E Supported VPN Standards and Security ProposalsSupported Easy VPN Proposal
E-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix E Supported VPN Standards and Security ProposalsSupported Easy VPN Proposal
1-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing PIX Firewall in a Small Office, Home Office Environm
E-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix E Supported VPN Standards and Security ProposalsSupported Easy VPN Proposal
IN-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01INDEXAAAAconfiguring 3-8exemption for MAC addresses 3-13support for 1-6with
IndexIN-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Bbacking up configurations 1-27Baltimore TechnologiesCA server support 6-9b
IndexIN-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01command line interfaceSee CLIcommandscommand line editing 1-28command output pa
IndexIN-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01DHCP leasesrenewing 4-22viewing 4-22DHCP Relay 1-20, 4-20DHCP servers
IndexIN-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01VLANs 2-35VPN with manual keys 7-35wildcard pre-shared key B-16Windows
IndexIN-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01FTPapplication inspection 5-7downloading software using 11-8filtering 3
IndexIN-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01ILSapplication inspection 5-28feature 1-14IM 5-24images, softwareSee al
IndexIN-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01LL2TPconfiguring B-10configuring Windows 2000 client B-11, B-14description
IndexIN-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01NN2H2 filtering serveridentifying 3-32supported 1-10URL for website 1-1
1-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedAccessing and Monitoring PIX FirewallA DHCP server is simp
IndexIN-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Ppacket captureconfiguring 9-27 to 9-31feature 1-22formats (table) 9-2
IndexIN-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01privilege levelsconfiguring 9-2 to 9-3description 1-21viewing 9-5proto
IndexIN-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01SSAsclearing IPSec 6-29description 1-16establishing manual with pre-shared
IndexIN-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01SNMPc (Cisco Works for Windows) 9-45support for 1-22traps 9-41using
IndexIN-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Trace Channeldescription 9-21disadvantages (note) 9-21transform setsconfig
IndexIN-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01VLANsconfiguration 2-33 to 2-37defined 1-8Voice over IPSee VoIPVOIPSCCP
IndexIN-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01
1-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedAccessing and Monitoring PIX Firewall • Telnet Interface,
1-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedAccessing and Monitoring PIX FirewallTelnet InterfaceThe P
1-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedAccessing and Monitoring PIX FirewallThe SNMP Firewall and
ContentsvCisco PIX Firewall and VPN Configuration Guide78-15033-01Accessing and Monitoring PIX Firewall 1-20Connecting to the Inside Interface of
1-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedPIX Firewall FailoverPIX Firewall FailoverThe PIX Firewall
1-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line InterfaceUsing the Command-Line Int
1-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line Interface • Configuration mode—Dis
1-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line InterfaceStep 5 The following promp
1-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line InterfaceCommand Line EditingPIX Fi
1-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line InterfaceCommand Output PagingOn co
1-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line InterfaceConfiguration SizeFor PIX
1-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedBefore You Start Configuring PIX FirewallNote The factory
1-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedWhere to Go from Here • To configure or use PIX Firewall
1-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedWhere to Go from HereFor more information on firewalls, re
ContentsviCisco PIX Firewall and VPN Configuration Guide78-15033-01Configuring PIX Firewall Interfaces 2-4Assigning an IP Address and Subnet Mask
1-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedWhere to Go from Here
CHAPTER 2-1Cisco PIX Firewall and VPN Configuration Guide78-15033-012Establishing ConnectivityThis chapter describes the basic preparation and configu
2-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityInitial Configuration ChecklistTa b l e 2-1 Init
2-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivitySetting Default RoutesSetting Default RoutesThis
2-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring PIX Firewall InterfacesTo configure t
2-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring PIX Firewall InterfacesAssigning an I
2-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring PIX Firewall Interfaces
2-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring PIX Firewall Interfaces • Replace ha
2-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEstablishing Outbound Connectivity with NAT and P
2-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEstablishing Outbound Connectivity with NAT and P
ContentsviiCisco PIX Firewall and VPN Configuration Guide78-15033-01Policy NAT 2-40Limitations 2-42Configuring Policy NAT 2-42Configuring
2-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEstablishing Outbound Connectivity with NAT and
2-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEstablishing Outbound Connectivity with NAT and
2-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEstablishing Outbound Connectivity with NAT and
2-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingAnother
2-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingNote Bef
2-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingThe “1”
2-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingA router
2-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingRestrict
2-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for Routing • Redi
2-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingIn this
ContentsviiiCisco PIX Firewall and VPN Configuration Guide78-15033-01Downloading Access Lists 3-20Configuring Downloadable ACLs 3-20Downloadi
2-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingTo move
2-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingViewing
2-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityTesting and Saving Your ConfigurationClearing OS
2-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityTesting and Saving Your ConfigurationTesting Con
2-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityTesting and Saving Your ConfigurationTo ping fro
2-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesAlso try the followi
2-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesTwo Interfaces Witho
2-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesStep 5 Set the ARP t
2-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesStep 14 Disable SNMP
2-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesFigure 2-6 Two Inter
ContentsixCisco PIX Firewall and VPN Configuration Guide78-15033-01Using Secure Unit Authentication 4-6Overview 4-6Establishing a Connection
2-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration Examplesno failovernamespage
2-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesThe following proced
2-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration Examplesno failoverarp timeo
2-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesThe following proced
2-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing VLANs with the Firewallglobal (outside) 1
2-35Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing VLANs with the FirewallNote When configuri
2-36Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing VLANs with the FirewallNote To determine t
2-37Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing VLANs with the FirewallIn Figure 2-9, the
2-38Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing Outside NATReplace old_vlan_id with the ex
2-39Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing Outside NATAfter you configure outside NAT
Comentários a estes Manuais