
3-15
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 3 Controlling Network Access and Use
Access Control Configuration Example
The following procedure shows the basic configuration required for this example. This procedure is
similar to the configuration shown in “
Basic Configuration Examples:” in Chapter 2, “Establishing
Connectivity”:
Step 1 Identify the security level and names of each interface by entering the following commands:
nameif ethernet0 outside security0
nameif ethernet1 inside security100
Step 2 Identify the line speed of each interface by entering the following commands:
interface ethernet0 100basetx
interface ethernet1 100basetx
You may get better performance by changing the default auto option in the interface command to the
specific line speed for the interface card.
Step 3 Identify the IP addresses for each interface:
ip address inside 10.1.1.1 255.255.255.0
ip address outside 209.165.201.1 255.255.255.224
Step 4 Specify the host name for the PIX Firewall:
hostname pixfirewall
This name appears in the command-line prompt.
Step 5 Let inside IP addresses be recognized on the outside network and let inside users start outbound
connections:
nat (inside) 1 0.0.0.0 0.0.0.0
nat (inside) 2 192.168.3.0 255.255.255.0
global (outside) 1 209.165.201.6-209.165.201.8 netmask 255.255.255.224
global (outside) 1 209.165.201.10 netmask 255.255.255.224
global (outside) 2 209.165.200.225-209.165.200.254 netmask 255.255.255.224
Step 6 Set the outside default route to the router attached to the Internet:
route outside 0 0 209.165.201.4 1
Example 3-2 shows the basic configuration required to implement a PIX Firewall with two interfaces
with NAT.
Example 3-2 Two Interfaces with NAT—Basic Configuration
nameif ethernet0 outside security0
nameif ethernet1 inside security100
interface ethernet0 100basetx
interface ethernet1 100basetx
ip address inside 10.1.1.1 255.255.255.0
ip address outside 209.165.201.1 255.255.255.224
hostname pixfirewall
nat (inside) 1 0.0.0.0 0.0.0.0
nat (inside) 2 192.168.3.0 255.255.255.0
global (outside) 1 209.165.201.6-209.165.201.8 netmask 255.255.255.224
global (outside) 1 209.165.201.10 netmask 255.255.255.224
global (outside) 2 209.165.200.225-209.165.200.254 netmask 255.255.255.224
route outside 0 0 209.165.201.4 1
Kommentare zu diesen Handbüchern