Cisco PIX 525 Spezifikationen

Stöbern Sie online oder laden Sie Spezifikationen nach Sicherheitszugriffskontrollsysteme Cisco PIX 525 herunter. Cisco PIX 525 Specifications Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 466
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Cisco PIX Firewall and VPN
Configuration Guide
Version 6.3
Customer Order Number: DOC-7815033=
Text Part Number: 78-15033-01
Seitenansicht 0
1 2 3 4 5 6 ... 465 466

Inhaltsverzeichnis

Seite 1 - Configuration Guide

Corporate HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706 USAhttp://www.cisco.comTel: 408 526-4000800 553-NETS (6387)Fax:

Seite 2

ContentsxCisco PIX Firewall and VPN Configuration Guide78-15033-01Voice Over IP 5-14CTIQBE 5-14CU-SeeMe 5-15H.323 5-16Overview 5-

Seite 3 - CONTENTS

2-40Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing Outside NATThese commands translate all th

Seite 4

2-41Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityPolicy NATThe NAT command for outside NAT, which

Seite 5

2-42Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityPolicy NATFigure 2-12 shows a host on the 10.1.2

Seite 6

2-43Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityPolicy NATFigure 2-13 shows the use of source an

Seite 7

2-44Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityPolicy NATLimitationsThe following configuration

Seite 8

2-45Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingStep 4 Enter glob

Seite 9

2-46Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingOverviewSMR allow

Seite 10 - 78-15033-01

2-47Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingReplace mc-source

Seite 11

2-48Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingExample 2-7 Insid

Seite 12

2-49Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast Routing • Replace out-i

Seite 13

ContentsxiCisco PIX Firewall and VPN Configuration Guide78-15033-01CHAPTER 6 Configuring IPSec and Certification Authorities 6-1How IPSec Works

Seite 14

2-50Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingUse the following

Seite 15

2-51Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast RoutingEG - EgressForwar

Seite 16

2-52Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEnabling Stub Multicast Routing

Seite 17

CHAPTER 3-1Cisco PIX Firewall and VPN Configuration Guide78-15033-013Controlling Network Access and UseThis chapter describes how to establish and con

Seite 18 - INDEXndex

3-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseEnabling Inbound ConnectionsThe main opt

Seite 19 - About This Guide

3-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseEnabling Inbound ConnectionsYou use the

Seite 20 - Document Organization

3-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseControlling Outbound Connectivity • Use

Seite 21 - Obtaining Documentation

3-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing the Static Command for Port Redire

Seite 22 - Documentation Feedback

3-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing the Static Command for Port Redire

Seite 23 - Technical Assistance Center

3-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing the Static Command for Port Redire

Seite 24 - Cisco TAC Escalation Center

ContentsxiiCisco PIX Firewall and VPN Configuration Guide78-15033-01Using PIX Firewall with a VeriSign CA 7-7Scenario Description 7-7Configur

Seite 25

3-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationUs

Seite 26

3-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationFo

Seite 27 - Getting Started

3-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationS

Seite 28 - How the PIX Firewall Works

3-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationF

Seite 29 - Adaptive Security Algorithm

3-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationB

Seite 30

3-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing Authentication and AuthorizationU

Seite 31 - Address Translation

3-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseAccess Control Configuration ExampleTo

Seite 32 - Access Control

3-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseAccess Control Configuration ExampleThe

Seite 33 - Downloadable ACLs

3-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseAccess Control Configuration ExampleAut

Seite 34 - VLAN Support

3-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseAccess Control Configuration ExampleSte

Seite 35 - DNS Control

ContentsxiiiCisco PIX Firewall and VPN Configuration Guide78-15033-01Using an Easy VPN Remote Device with Digital Certificates 8-13Client Verific

Seite 36 - Configurable Proxy Pinging

3-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing TurboACLAdding Comments to ACLsPI

Seite 37 - Voice over IP

3-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseUsing TurboACLNote When you add or dele

Seite 38 - RAS Version 2

3-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseDownloading Access ListsViewing TurboAC

Seite 39

3-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseDownloading Access ListsThe following a

Seite 40 - NetBIOS over IP

3-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseDownloading Access ListsStep 3 Configur

Seite 41 - Virtual Private Networks

3-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseDownloading Access ListsStatements are

Seite 42 - Certification Authorities

3-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object

Seite 43 - Using a Site-to-Site VPN

3-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object

Seite 44

3-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object

Seite 45 - DHCP Server

3-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object

Seite 46 - DHCP Client

ContentsxivCisco PIX Firewall and VPN Configuration Guide78-15033-01Allowing a Telnet Connection to the Outside Interface 9-18Overview 9-18Us

Seite 47

3-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object

Seite 48

3-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object

Seite 49 - Integration with Cisco IDS

3-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseSimplifying Access Control with Object

Seite 50 - PIX Firewall Failover

3-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsTo remove

Seite 51 - Access Modes

3-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsFiltering

Seite 52 - Accessing Configuration Mode

3-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsWhen a us

Seite 53 - Abbreviating Commands

3-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsBuffering

Seite 54 - Filtering Show Command Output

3-35Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsTo enable

Seite 55 - Comments

3-36Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsFiltering

Seite 56 - Help Information

3-37Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsURL Serve

Seite 57 - Where to Go from Here

ContentsxvCisco PIX Firewall and VPN Configuration Guide78-15033-01SNMP Usage Notes 9-43SNMP Traps 9-44Receiving Requests and Sending Syslog

Seite 58

3-38Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsConfigura

Seite 59

3-39Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsStep 3 (O

Seite 60

3-40Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 3 Controlling Network Access and UseFiltering Outbound ConnectionsStep 9 Co

Seite 61 - Establishing Connectivity

CHAPTER 4-1Cisco PIX Firewall and VPN Configuration Guide78-15033-014Using PIX Firewall in SOHO NetworksThis chapter describes features provided by th

Seite 62

4-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot

Seite 63 - Setting Default Routes

4-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot

Seite 64

4-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot

Seite 65

4-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot

Seite 66

4-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot

Seite 67

4-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot

Seite 68

ContentsxviCisco PIX Firewall and VPN Configuration Guide78-15033-01Frequently Asked Failover Questions 10-21Configuration Replication Questions

Seite 69

4-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot

Seite 70 - Configuring NAT and PAT

4-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remot

Seite 71

4-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remo

Seite 72

4-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing PIX Firewall as an Easy VPN Remo

Seite 73 - Using RIP

4-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall PPPoE ClientTo

Seite 74 - PIX Firewall

4-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall PPPoE ClientPPP

Seite 75 - Using OSPF

4-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall PPPoE ClientSte

Seite 76 - OSPF Features Supported

4-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall PPPoE ClientFor

Seite 77 - Restrictions and Limitations

4-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DCHP Server 6

Seite 78 - Using OSPF in Public Networks

Ta b l e 4-2 DHCP Clients Supported by PIX FirewallPIX Firewall Version PIX Firewall PlatformMaximum Number of DHCP Client Addresses (Active Hosts)Ve

Seite 79

ContentsxviiCisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIX A Acronyms and Abbreviations B - 1APPENDIX B Configuration Examples

Seite 80

4-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DCHP ServerConf

Seite 81 - Viewing OSPF Configuration

4-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DCHP ServerStep

Seite 82 - Clearing OSPF Configuration

4-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DCHP Servercryp

Seite 83 - Testing Connectivity

4-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing DHCP RelayNote With PIX Firewall

Seite 84

4-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DHCP ClientRepl

Seite 85 - Basic Configuration Examples

4-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DHCP ClientNote

Seite 86

4-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 4 Using PIX Firewall in SOHO NetworksUsing the PIX Firewall DHCP Client

Seite 87

CHAPTER 5-1Cisco PIX Firewall and VPN Configuration Guide78-15033-015Configuring Application Inspection (Fixup)This chapter describes how to use and c

Seite 88

5-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)How Application Inspection Works

Seite 89

5-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)How Application Inspection Works

Seite 90 - Internet

ContentsxviiiCisco PIX Firewall and VPN Configuration Guide78-15033-01Configuring the Inside Server C - 3Configuring Both Systems After Rebooting

Seite 91

5-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Using the fixup CommandUsing the

Seite 92 - 209.165.201.4

5-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Using the fixup CommandYou can v

Seite 93

5-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsBasic In

Seite 94 - Using VLANs with the Firewall

5-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsPIX Fire

Seite 95 - Using Logical Interfaces

5-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsThe FTP

Seite 96 - VLAN Security Issues

5-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsHTTPYou

Seite 97 - Managing VLANs

5-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsApplica

Seite 98 - Using Outside NAT

5-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsSMTPThi

Seite 99 - Simplifying Routing

5-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsThe PIX

Seite 100 - 209.165.200.226

5-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Basic Internet ProtocolsSample

Seite 101 - Policy NAT

xixCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideThis preface introduces the Cisco PIX Firewall and VPN Configuration Guid

Seite 102

5-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPIf the mail server

Seite 103

5-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IP • CTIQBE applica

Seite 104 - Configuring Policy NAT

5-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPH.323This section

Seite 105

5-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPReplace hh with th

Seite 106 - Overview

5-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPThe PIX Firewall a

Seite 107

5-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPMGCP messages are

Seite 108

5-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPUse the mgcp gatew

Seite 109 - Clearing IGMP Configuration

5-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPOverviewCisco IP P

Seite 110 - Viewing and Debugging SMR

5-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPNote If the Cisco

Seite 111 - • RFC 2362 PIM-SM

5-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPUsing SCCP with Ci

Seite 112

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOM

Seite 113

xxCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideDocument OrganizationDocument OrganizationThis guide includes the followin

Seite 114 - Enabling Inbound Connections

5-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPOverviewSIP works

Seite 115

5-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPThis command state

Seite 116

5-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Voice Over IPNote When this fea

Seite 117

5-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Multimedia ApplicationsSIP insp

Seite 118 - Inside Outside

5-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Multimedia Applications2. Once

Seite 119 - Port Redirection Example

5-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Multimedia ApplicationsTCP Stre

Seite 120 - Configuring AAA

5-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Database and Directory SupportR

Seite 121

5-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Database and Directory SupportI

Seite 122

5-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Database and Directory SupportN

Seite 123

5-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Management ProtocolsExample 5-2

Seite 124

xxiCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideDocument ConventionsDocument ConventionsCommand descriptions use these co

Seite 125 - Using MAC-Based AAA Exemption

5-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Management ProtocolsInternet Co

Seite 126 - Basic Configuration

5-35Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Management ProtocolsThe fixup c

Seite 127

5-36Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 5 Configuring Application Inspection (Fixup)Management Protocols

Seite 128 - Managing Access to Services

CHAPTER 6-1Cisco PIX Firewall and VPN Configuration Guide78-15033-016Configuring IPSec and Certification AuthoritiesThis chapter provides information

Seite 129

6-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesInternet Key Exchange (IKE)

Seite 130 - Using TurboACL

6-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesInternet Key Exchange (IKE)

Seite 131 - Globally Configuring TurboACL

6-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesInternet Key Exchange (IKE)

Seite 132 - Downloading Access Lists

6-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesInternet Key Exchange (IKE)

Seite 133

6-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesInternet Key Exchange (IKE)

Seite 134

6-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Authori

Seite 135 - Software Restrictions

xxiiCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideObtaining DocumentationDocumentation CD-ROMCisco documentation and addit

Seite 136 - How Object Grouping Works

6-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Authori

Seite 137 - Using Subcommand Mode

6-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Authori

Seite 138

6-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Author

Seite 139

6-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Author

Seite 140

6-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Certification Author

Seite 141 - Nesting Object Groups

6-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSec Validit

Seite 142 - Removing Object Groups

6-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSecYou can e

Seite 143 - Filtering ActiveX Objects

6-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSeccrypto ma

Seite 144 - Filtering Java Applets

6-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSecBinding a

Seite 145

6-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSec(In other

Seite 146 - Filtering HTTPS and FTP Sites

xxiiiCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideObtaining Technical AssistanceObtaining Technical AssistanceCisco provi

Seite 147 - Configuring Filtering Policy

6-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSecassociati

Seite 148 - Filtering Long URLs

6-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSecIPSec sec

Seite 149

6-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesConfiguring IPSecNote PIX

Seite 150 - Configuration Procedure

6-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Dynamic Crypto Mapsc

Seite 151

6-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Dynamic Crypto MapsN

Seite 152

6-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Dynamic Crypto MapsS

Seite 153

6-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesUsing Dynamic Crypto MapsS

Seite 154

6-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesManual Configuration of SA

Seite 155

6-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesManual Configuration of SA

Seite 156 - Basic Configuration Procedure

6-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesManual Configuration of SA

Seite 157

xxivCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideObtaining Additional Publications and InformationAll customers, partners

Seite 158 - • Overview, page 4-7

6-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesViewing IPSec Configuratio

Seite 159

6-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesClearing SAs

Seite 160

6-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 6 Configuring IPSec and Certification AuthoritiesClearing SAs

Seite 161

CHAPTER 7-1Cisco PIX Firewall and VPN Configuration Guide78-15033-017Site-to-Site VPN Configuration ExamplesA site-to-site VPN protects the network re

Seite 162 - Using X.509 Certificates

7-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing Pre-Shared KeysNote If you do

Seite 163

7-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing Pre-Shared KeysStep 4 Configu

Seite 164

7-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing Pre-Shared Keysfixup protocol

Seite 165

7-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing Pre-Shared KeysConfiguring PI

Seite 166

7-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing Pre-Shared KeysStep 11 Apply

Seite 167

7-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign

Seite 168 - Using Related Commands

xxvCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideObtaining Additional Publications and Information • Internet Protocol Jo

Seite 169

7-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign

Seite 170

7-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign

Seite 171

7-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign

Seite 172

7-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign

Seite 173 - Using DHCP Relay

7-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with a VeriSign

Seite 174 - Configuring the DHCP Client

7-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous

Seite 175 - • debug dhcpc error

7-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous

Seite 176

7-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous

Seite 177

7-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous

Seite 178

7-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous

Seite 179

xxviCisco PIX Firewall and VPN Configuration Guide78-15033-01About This GuideObtaining Additional Publications and Information

Seite 180 - Using the fixup Command

7-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous

Seite 181

7-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing PIX Firewall with an In-Hous

Seite 182 - Basic Internet Protocols

7-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing an Encrypted Tunnel to Obtai

Seite 183

7-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing an Encrypted Tunnel to Obtai

Seite 184

7-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing an Encrypted Tunnel to Obtai

Seite 185

7-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing an Encrypted Tunnel to Obtai

Seite 186 - • SPI matching

7-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesUsing an Encrypted Tunnel to Obtai

Seite 187

7-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and

Seite 188 - Application Inspection

7-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and

Seite 189 - Sample Configuration

7-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and

Seite 190 - Voice Over IP

CHAPTER 1-1Cisco PIX Firewall and VPN Configuration Guide78-15033-011Getting StartedThe Cisco PIX Firewall lets you establish stateful firewall protec

Seite 191 - CU-SeeMe

7-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and

Seite 192

7-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and

Seite 193 - Technical Background

7-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and

Seite 194

7-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and

Seite 195

7-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and

Seite 196 - Viewing MGCP Information

7-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and

Seite 197 - Using PAT with SCCP

7-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesConnecting to a Catalyst 6500 and

Seite 198

7-35Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesManual Configuration with NATVerif

Seite 199 - Viewing SCCP Information

7-36Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesManual Configuration with NATExamp

Seite 200

7-37Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesManual Configuration with NATPIX F

Seite 201 - Providing IP Address Privacy

1-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network Access • Access Control, page 1-6 • V

Seite 202 - Viewing SIP Information

7-38Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 7 Site-to-Site VPN Configuration ExamplesManual Configuration with NATtimeo

Seite 203 - Multimedia Applications

CHAPTER 8-1Cisco PIX Firewall and VPN Configuration Guide78-15033-018Managing VPN Remote AccessThis chapter describes how to configure the PIX Firewal

Seite 204

8-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing the PIX Firewall as an Easy VPN ServerOver

Seite 205 - TCP Stream

8-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing the PIX Firewall as an Easy VPN ServerNote

Seite 206 - VDO LIVE

8-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing the PIX Firewall as an Easy VPN ServerEnab

Seite 207 - ILS and LDAP

8-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessConfiguring Extended Authentication (Xauth)To sp

Seite 208 - Step 2 Permit NFS access:

8-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessConfiguring Extended Authentication (Xauth)Note

Seite 209 - Management Protocols

8-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessConfiguring Easy VPN Remote Devices with IKE Mod

Seite 210 - Remote Shell

8-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Pre-Shared

Seite 211

8-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Pre-Shared

Seite 212

1-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network AccessThe PIX Firewall also lets you im

Seite 213 - How IPSec Works

8-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Pre-Shared

Seite 214 - Internet Key Exchange (IKE)

8-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Pre-Shared

Seite 215

8-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Pre-Shared

Seite 216 - Configuring IKE

8-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce

Seite 217

8-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce

Seite 218 - Disabling IKE

8-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce

Seite 219

8-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce

Seite 220 - Public Key Cryptography

8-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce

Seite 221 - Supported CA Servers

8-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing an Easy VPN Remote Device with Digital Ce

Seite 222

8-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing PPTP for Remote Accessvpngroup superteam

Seite 223

iiiCisco PIX Firewall and VPN Configuration Guide78-15033-01CONTENTSAbout This Guide xixDocument Objectives xixAudience xixDocument Organ

Seite 224

1-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network AccessPIX Firewall handles UDP data tra

Seite 225 - Configuring IPSec

8-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing PPTP for Remote AccessOverviewThe firewal

Seite 226 - Crypto Maps

8-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing PPTP for Remote AccessThe clear vpdn grou

Seite 227

8-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 8 Managing VPN Remote AccessUsing PPTP for Remote Access

Seite 228 - Access Lists

CHAPTER 9-1Cisco PIX Firewall and VPN Configuration Guide78-15033-019Accessing and Monitoring PIX FirewallThis chapter describes how to configure and

Seite 229

9-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User

Seite 230 - IPSec SA Lifetimes

9-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User

Seite 231 - Basic IPSec Configuration

9-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User

Seite 232

9-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User

Seite 233 - Using Dynamic Crypto Maps

9-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User

Seite 234

9-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User

Seite 235

1-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network AccessAddress TranslationThe Network Ad

Seite 236 - Using NAT Traversal

9-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User

Seite 237 - Manual Configuration of SAs

9-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCommand Authorization and LOCAL User

Seite 238

9-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallConfiguring PIX Firewall BannersThis

Seite 239

9-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Network Time ProtocolOverviewT

Seite 240 - Clearing SAs

9-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Network Time ProtocolViewing N

Seite 241

9-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Network Time ProtocolExample 9

Seite 242

9-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Network Time ProtocolExample 9

Seite 243 - Using Pre-Shared Keys

9-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallManaging the PIX Firewall ClockManag

Seite 244 - Step 1 Define a host name:

9-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Telnet for Remote System Manag

Seite 245

9-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Telnet for Remote System Manag

Seite 246

1-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network AccessCut-Through ProxyCut-through prox

Seite 247

9-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Telnet for Remote System Manag

Seite 248

9-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Telnet for Remote System Manag

Seite 249 - Scenario Description

9-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing Telnet for Remote System Manag

Seite 250 - Figure 7-2 VPN Tunnel Network

9-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SSH for Remote System Manageme

Seite 251

9-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SSH for Remote System Manageme

Seite 252

9-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SSH for Remote System Manageme

Seite 253

9-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SSH for Remote System Manageme

Seite 254

9-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallEnabling Auto Update Supportlists th

Seite 255

9-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallEnabling Auto Update SupportManaging

Seite 256

9-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCapturing PacketsTimeout: noneDevice

Seite 257

1-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedControlling Network AccessThe PIX Firewall allows a RADIUS

Seite 258

9-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCapturing PacketsReplace acl_id with

Seite 259

9-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCapturing PacketsStep 4 To copy the

Seite 260

9-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallCapturing PacketsPacket Capture Exam

Seite 261 - Step 11 Define a crypto map:

9-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallSaving Crash Information to Flash Me

Seite 262

9-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogTo save test crash infor

Seite 263 - PIX Firewall 1 Configuration

9-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogEnabling Logging to Sysl

Seite 264

9-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogReplace syslogid with th

Seite 265 - PIX Firewall 2 Configuration

9-35Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogTo view disabled message

Seite 266

9-36Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogTo enable logging of the

Seite 267 - Services Module

9-37Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogLogging BehaviorThere ar

Seite 268

1-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedProtecting Your Network from AttackObject GroupingObject gr

Seite 269

9-38Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogDeny Example1. An inboun

Seite 270

9-39Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogManaging IDS Syslog Mess

Seite 271

9-40Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SyslogTable 9-7 summarizes the

Seite 272

9-41Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPUsing SNMPThis section des

Seite 273

9-42Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPThe PIX Firewall SNMP trap

Seite 274

9-43Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPEach row of the cpmCPUTota

Seite 275

9-44Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPSNMP TrapsTraps are differ

Seite 276

9-45Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPStep 5 Start sending syslo

Seite 277 - Manual Configuration with NAT

9-46Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPStep 10 Find the file CISC

Seite 278

9-47Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPIn SNMP protocol, the MIB

Seite 279

1-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedProtecting Your Network from AttackFor more information abo

Seite 280

9-48Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPVerifying Memory UsageYou

Seite 281 - Managing VPN Remote Access

9-49Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPViewing The Connection Cou

Seite 282

9-50Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPViewing System Buffer Usag

Seite 283

9-51Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMPIn the HP OpenView Browse

Seite 284 - Enabling Redundancy

9-52Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 9 Accessing and Monitoring PIX FirewallUsing SNMP

Seite 285 - Bypassing AAA Authentication

CHAPTER 10-1Cisco PIX Firewall and VPN 78-15033-0110Using PIX Firewall FailoverThis chapter describes the PIX Firewall failover feature, which allows

Seite 286

10-2Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFailover System RequirementsFailover System RequirementsTable 1

Seite 287

10-3Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverUnderstanding FailoverUnderstanding FailoverThis section describ

Seite 288

10-4Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverUnderstanding FailoverFigure 10-1 Parallel Position in NetworkI

Seite 289

10-5Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverUnderstanding FailoverThe failover link can be one of the follow

Seite 290 - Configuring the PIX Firewall

1-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedProtecting Your Network from AttackActiveX BlockingActiveX

Seite 291

10-6Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverUnderstanding FailoverPrimary and Secondary Vs. Active and Stan

Seite 292

10-7Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverUnderstanding FailoverConfiguration replication from the active

Seite 293

10-8Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFailover Configuration Prerequisites3. Broadcast Ping test—The

Seite 294

10-9Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring Cable-Based FailoverStep 2 If an interface is not go

Seite 295

10-10Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring Cable-Based FailoverStep 2If you have not done so

Seite 296

10-11Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring LAN-Based FailoverConfiguring LAN-Based FailoverThi

Seite 297

10-12Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring LAN-Based FailoverNote If you are changing from ca

Seite 298

10-13Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring LAN-Based Failoverb.primary(config)# nameif hardwar

Seite 299 - Using PPTP for Remote Access

10-14Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring LAN-Based Failoverc.primary(config)# ip address in

Seite 300 - PPTP Configuration

10-15Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverConfiguring LAN-Based FailoverConfiguring the Secondary UnitFol

Seite 301 - PPTP Configuration Example

1-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedSupporting Specific Protocols and ApplicationsSupporting S

Seite 302

10-16Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverVerifying the Failover ConfigurationVerifying the Failover Con

Seite 303

10-17Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverVerifying the Failover Configuration • Using the Show Failover

Seite 304 - Privilege Levels

10-18Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverVerifying the Failover Configuration Logical Update Que

Seite 305 - User Authentication

10-19Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverVerifying the Failover ConfigurationInterface name (n.n.n.n): F

Seite 306

10-20Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverForcing FailoverTesting the Failover FunctionalityFollow these

Seite 307 - Command Authorization

10-21Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverMonitoring FailoverFailover Off...To disable the LAN failover l

Seite 308

10-22Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFrequently Asked Failover QuestionsFrequently Asked Failover Q

Seite 309

10-23Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFrequently Asked Failover QuestionsConfiguration Replication Qu

Seite 310 - TACACS+ Command Authorization

10-24Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFrequently Asked Failover Questions • How long does it take t

Seite 311 - Recovering from Lockout

10-25Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFrequently Asked Failover QuestionsLAN-Based Failover Questions

Seite 312 - Using Network Time Protocol

1-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedSupporting Specific Protocols and Applications • SCCP, pa

Seite 313 - Enabling NTP

10-26Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFailover Configuration ExamplesFailover Configuration Examples

Seite 314

10-27Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFailover Configuration Examplesfailover ip address outside 209.

Seite 315

10-28Cisco PIX Firewall and VPN 78-15033-01Chapter 10 Using PIX Firewall FailoverFailover Configuration Examplestelnet 192.168.2.45 255.255.255

Seite 316

CHAPTER 11-1Cisco PIX Firewall and VPN Configuration Guide78-15033-0111Changing Feature Licenses and System SoftwareThis chapter describes how to chan

Seite 317 - Setting the System Clock

11-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareUpgrading Your License by E

Seite 318 - option is

11-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareUpgrading Your License by E

Seite 319

11-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareUpgrading Your License by E

Seite 320

11-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareUsing HTTP to Copy Software

Seite 321

11-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareDownloading the Current Sof

Seite 322 - Using Telnet

11-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareDownloading the Current Sof

Seite 323 - Trace Channel Feature

1-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedSupporting Specific Protocols and ApplicationsWhen coupled

Seite 324 - Obtaining an SSH Client

11-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareDownloading the Current Sof

Seite 325

11-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareInstalling and Recovering P

Seite 326 - Viewing SSH Status

11-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareInstalling and Recovering

Seite 327 - Enabling Auto Update Support

11-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareInstalling and Recovering

Seite 328 - Managing Auto Update Support

11-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareInstalling and Recovering

Seite 329 - Capturing Packets

11-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareDowngrading to a Previous

Seite 330

11-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareUpgrading Failover Systems

Seite 331 - Packet Capture Output Formats

11-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareTFTP Download Error CodesS

Seite 332 - Packet Capture Examples

11-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 11 Changing Feature Licenses and System SoftwareTFTP Download Error Codes.

Seite 333

A-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIXAAcronyms and AbbreviationsThis appendix lists the acronyms and abbreviations use

Seite 334 - Using Syslog

ContentsivCisco PIX Firewall and VPN Configuration Guide78-15033-01Protecting Your Network from Attack 1-8Unicast Reverse Path Forwarding 1-9

Seite 335

1-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedCreating a Virtual Private NetworkLDAP Version 2 and ILSPI

Seite 336 - Disabling Syslog Messages

A-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix A Acronyms and AbbreviationsCPU Central Processing Unit.CRL certificate rev

Seite 337 - Configuration

A-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix A Acronyms and AbbreviationsIFP Internet Filtering Protocol.IGMP Internet G

Seite 338

A-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix A Acronyms and AbbreviationsNSSA not so stubby area.NTP Network Time Protoc

Seite 339 - Logging Behavior

A-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix A Acronyms and AbbreviationsSSH Secure Shell.SMR Stub Multicast Routing.SMT

Seite 340 - Syslog Message Format

A-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix A Acronyms and Abbreviations

Seite 341 - Managing IDS Syslog Messages

B-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIXBConfiguration Examples for Other Remote Access ClientsThis appendix describes di

Seite 342

B-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/

Seite 343 - Using SNMP

B-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/

Seite 344 - SNMP CPU Utilization

B-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/

Seite 345 - SNMP Usage Notes

B-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/

Seite 346 - SNMP Traps

1-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedCreating a Virtual Private NetworkVirtual Private Networks

Seite 347

B-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/

Seite 348

B-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsXauth with RSA Ace/

Seite 349 - Viewing Failover Status

B-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsL2TP with IPSec in

Seite 350 - Verifying Memory Usage

B-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsL2TP with IPSec in

Seite 351 - Viewing The Connection Count

B-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsL2TP with IPSec in

Seite 352 - Viewing System Buffer Usage

B-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsWindows 2000 Clien

Seite 353

B-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsWindows 2000 Clien

Seite 354

B-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsWindows 2000 Clien

Seite 355 - Using PIX Firewall Failover

B-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsWindows 2000 Clien

Seite 356 - Failover System Requirements

B-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsWindows 2000 Clien

Seite 357 - Understanding Failover

1-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedCreating a Virtual Private Network • Phase 1—This phase,

Seite 358 - Failover and State Links

B-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl

Seite 359 - State Link

B-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl

Seite 360 - Configuration Replication

B-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl

Seite 361 - Failover Triggers

B-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl

Seite 362

B-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl

Seite 363

B-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl

Seite 364

B-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix B Configuration Examples for Other Remote Access ClientsUsing Cisco VPN Cl

Seite 365

C-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIXCMS-Exchange Firewall ConfigurationThis appendix explains how you can configure t

Seite 366 - Configuring the Primary Unit

Ta b l e C-1 Names and AddressesSystem Name IP Address DomainOutside Windows NT Server outserver 209.165.201.2 pixoutInside Windows NT Server inserve

Seite 367

C-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix C MS-Exchange Firewall ConfigurationConfiguring the Outside ServerConfiguri

Seite 368

1-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedCreating a Virtual Private NetworkMost browsers, by defaul

Seite 369

C-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix C MS-Exchange Firewall ConfigurationConfiguring Both Systems After Rebootin

Seite 370

D-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIXDTCP/IP Reference InformationThis appendix includes the following sections: • IP

Seite 371

D-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationPorts • In this guide, the use of “address”

Seite 372

D-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationPortscitrix-ica TCP 1494 Citrix Independent C

Seite 373

D-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationPortsnetbios-ssn TCP 139 NetBIOS Session Serv

Seite 374 - Disabling Failover

D-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationProtocols and ApplicationsProtocols and Appli

Seite 375 - Monitoring Failover

D-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationProtocols and ApplicationsSupported Multimedi

Seite 376

D-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet Masks • Transmission Control Pr

Seite 377 - Basic Failover Questions

D-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet MasksIn these examples, the ip a

Seite 378

D-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet MasksUses for Subnet Information

Seite 379 - Stateful Failover Questions

1-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedCreating a Virtual Private NetworkSupporting Remote Access

Seite 380 - Cable-Based Failover Example

D-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet MasksAddresses in the .192 Mask

Seite 381 - LAN-Based Failover Example

D-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet MasksAddresses in the .248 Mask

Seite 382

D-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet MasksAddresses in the .252 Mask

Seite 383

D-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet Masks10 .36 .37 .38 .3911 .40 .

Seite 384 - Entering a New Activation Key

D-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix D TCP/IP Reference InformationUsing Subnet Masks45 .176 .177 .178 .17946 .

Seite 385 - 4. Reboot the system

E-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01APPENDIXESupported VPN Standards and Security ProposalsThis appendix lists the VPN standa

Seite 386

E-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix E Supported VPN Standards and Security ProposalsInternet Key Exchange (IKE)

Seite 387

E-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix E Supported VPN Standards and Security ProposalsCertification Authorities (

Seite 388

E-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix E Supported VPN Standards and Security ProposalsSupported Easy VPN Proposal

Seite 389 - Getting a TFTP Server

E-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix E Supported VPN Standards and Security ProposalsSupported Easy VPN Proposal

Seite 390 - Downloading Software with FTP

1-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing PIX Firewall in a Small Office, Home Office Environm

Seite 391

E-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Appendix E Supported VPN Standards and Security ProposalsSupported Easy VPN Proposal

Seite 392 - Using Boothelper

IN-1Cisco PIX Firewall and VPN Configuration Guide78-15033-01INDEXAAAAconfiguring 3-8exemption for MAC addresses 3-13support for 1-6with

Seite 393

IndexIN-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Bbacking up configurations 1-27Baltimore TechnologiesCA server support 6-9b

Seite 394

IndexIN-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01command line interfaceSee CLIcommandscommand line editing 1-28command output pa

Seite 395

IndexIN-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01DHCP leasesrenewing 4-22viewing 4-22DHCP Relay 1-20, 4-20DHCP servers

Seite 396

IndexIN-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01VLANs 2-35VPN with manual keys 7-35wildcard pre-shared key B-16Windows

Seite 397 - TFTP Download Error Codes

IndexIN-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01FTPapplication inspection 5-7downloading software using 11-8filtering 3

Seite 398

IndexIN-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01ILSapplication inspection 5-28feature 1-14IM 5-24images, softwareSee al

Seite 399 - Acronyms and Abbreviations

IndexIN-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01LL2TPconfiguring B-10configuring Windows 2000 client B-11, B-14description

Seite 400

IndexIN-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01NN2H2 filtering serveridentifying 3-32supported 1-10URL for website 1-1

Seite 401

1-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedAccessing and Monitoring PIX FirewallA DHCP server is simp

Seite 402

IndexIN-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Ppacket captureconfiguring 9-27 to 9-31feature 1-22formats (table) 9-2

Seite 403

IndexIN-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01privilege levelsconfiguring 9-2 to 9-3description 1-21viewing 9-5proto

Seite 404

IndexIN-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01SSAsclearing IPSec 6-29description 1-16establishing manual with pre-shared

Seite 405 - Access Clients

IndexIN-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01SNMPc (Cisco Works for Windows) 9-45support for 1-22traps 9-41using

Seite 406 - Introduction

IndexIN-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Trace Channeldescription 9-21disadvantages (note) 9-21transform setsconfig

Seite 407 - PIX Firewall Configuration

IndexIN-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01VLANsconfiguration 2-33 to 2-37defined 1-8Voice over IPSee VoIPVOIPSCCP

Seite 408 - Next Tokencode Mode

IndexIN-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01

Seite 409 - New PIN Mode

1-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedAccessing and Monitoring PIX Firewall • Telnet Interface,

Seite 410

1-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedAccessing and Monitoring PIX FirewallTelnet InterfaceThe P

Seite 411

1-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedAccessing and Monitoring PIX FirewallThe SNMP Firewall and

Seite 412

ContentsvCisco PIX Firewall and VPN Configuration Guide78-15033-01Accessing and Monitoring PIX Firewall 1-20Connecting to the Inside Interface of

Seite 413 - L2TP Overview

1-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedPIX Firewall FailoverPIX Firewall FailoverThe PIX Firewall

Seite 414 - Transport mode

1-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line InterfaceUsing the Command-Line Int

Seite 415

1-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line Interface • Configuration mode—Dis

Seite 416

1-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line InterfaceStep 5 The following promp

Seite 417

1-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line InterfaceCommand Line EditingPIX Fi

Seite 418

1-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line InterfaceCommand Output PagingOn co

Seite 419 - Enabling IPSec Debug

1-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedUsing the Command-Line InterfaceConfiguration SizeFor PIX

Seite 420 - Figure B-5 VPN Client Access

1-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedBefore You Start Configuring PIX FirewallNote The factory

Seite 421

1-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedWhere to Go from Here • To configure or use PIX Firewall

Seite 422

1-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedWhere to Go from HereFor more information on firewalls, re

Seite 423

ContentsviCisco PIX Firewall and VPN Configuration Guide78-15033-01Configuring PIX Firewall Interfaces 2-4Assigning an IP Address and Subnet Mask

Seite 424

1-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 1 Getting StartedWhere to Go from Here

Seite 425

CHAPTER 2-1Cisco PIX Firewall and VPN Configuration Guide78-15033-012Establishing ConnectivityThis chapter describes the basic preparation and configu

Seite 426

2-2Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityInitial Configuration ChecklistTa b l e 2-1 Init

Seite 427 - APPENDIX

2-3Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivitySetting Default RoutesSetting Default RoutesThis

Seite 428

2-4Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring PIX Firewall InterfacesTo configure t

Seite 429 - Configuring the Inside Server

2-5Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring PIX Firewall InterfacesAssigning an I

Seite 430

2-6Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring PIX Firewall Interfaces

Seite 431 - TCP/IP Reference Information

2-7Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring PIX Firewall Interfaces • Replace ha

Seite 432

2-8Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEstablishing Outbound Connectivity with NAT and P

Seite 433

2-9Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEstablishing Outbound Connectivity with NAT and P

Seite 434

ContentsviiCisco PIX Firewall and VPN Configuration Guide78-15033-01Policy NAT 2-40Limitations 2-42Configuring Policy NAT 2-42Configuring

Seite 435 - Protocols and Applications

2-10Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEstablishing Outbound Connectivity with NAT and

Seite 436

2-11Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEstablishing Outbound Connectivity with NAT and

Seite 437 - Using Subnet Masks

2-12Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityEstablishing Outbound Connectivity with NAT and

Seite 438

2-13Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingAnother

Seite 439 - Addresses in the .128 Mask

2-14Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingNote Bef

Seite 440 - Addresses in the .240 Mask

2-15Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingThe “1”

Seite 441 - Addresses in the .248 Mask

2-16Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingA router

Seite 442 - Addresses in the .252 Mask

2-17Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingRestrict

Seite 443

2-18Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for Routing • Redi

Seite 444

2-19Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingIn this

Seite 445 - Proposals

ContentsviiiCisco PIX Firewall and VPN Configuration Guide78-15033-01Downloading Access Lists 3-20Configuring Downloadable ACLs 3-20Downloadi

Seite 446

2-20Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingTo move

Seite 447 - Supported Easy VPN Proposals

2-21Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityConfiguring the PIX Firewall for RoutingViewing

Seite 448

2-22Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityTesting and Saving Your ConfigurationClearing OS

Seite 449

2-23Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityTesting and Saving Your ConfigurationTesting Con

Seite 450

2-24Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityTesting and Saving Your ConfigurationTo ping fro

Seite 451

2-25Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesAlso try the followi

Seite 452

2-26Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesTwo Interfaces Witho

Seite 453

2-27Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesStep 5 Set the ARP t

Seite 454

2-28Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesStep 14 Disable SNMP

Seite 455

2-29Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesFigure 2-6 Two Inter

Seite 456

ContentsixCisco PIX Firewall and VPN Configuration Guide78-15033-01Using Secure Unit Authentication 4-6Overview 4-6Establishing a Connection

Seite 457

2-30Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration Examplesno failovernamespage

Seite 458

2-31Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesThe following proced

Seite 459

2-32Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration Examplesno failoverarp timeo

Seite 460

2-33Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityBasic Configuration ExamplesThe following proced

Seite 461

2-34Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing VLANs with the Firewallglobal (outside) 1

Seite 462

2-35Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing VLANs with the FirewallNote When configuri

Seite 463

2-36Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing VLANs with the FirewallNote To determine t

Seite 464

2-37Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing VLANs with the FirewallIn Figure 2-9, the

Seite 465

2-38Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing Outside NATReplace old_vlan_id with the ex

Seite 466

2-39Cisco PIX Firewall and VPN Configuration Guide78-15033-01Chapter 2 Establishing ConnectivityUsing Outside NATAfter you configure outside NAT

Kommentare zu diesen Handbüchern

Keine Kommentare