
1-23
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 1 Getting Started
Accessing and Monitoring PIX Firewall
The SNMP Firewall and Memory Pool MIBs extend the number of traps you can use to discover
additional information about the state of the PIX
Firewall, including the following events:
• Buffer usage from the show block command
• Connection count from the show conn command
• Failover status
• Memory usage from the show memory command
Note PIX Firewall Version 6.2 or higher supports monitoring CPU utilization through SNMP. This feature
allows network administrators to monitor the PIX
Firewall CPU usage using SNMP management
software, such as HP OpenView, for capacity planning. This CPU usage information is the same as that
shown by the show cpu usage command.
XDMCP
The PIX Firewall supports connections using XDMCP (X Display Manager Control Protocol) using the
established command. This feature negotiates an XWindows session and creates an embryonic
connection at destination port 6000. XDMCP handling is enabled by default, like other UDP application
inspection functions.
Using a Syslog Server
The PIX Firewall sends messages in TCP and UDP Syslog messages to any existing syslog server and
provides a syslog server for use on a Windows NT system. The Windows NT Syslog server can provide
time-stamped syslog messages, accept messages on alternate ports, and be configured to stop
PIX
Firewall traffic if messages cannot be received. You can also configure the Windows NT Syslog
server to stop PIX
Firewall connections if the Windows NT log disk fills or if the server goes down.
FTP and URL Logging
The FTP and URL logging feature lets you view inbound and outbound FTP commands entered by your
users as well as the URLs they use to access other sites. You can use this feature to monitor user access
of internal and external sites. It provides data you can use to block access to problem sites. You enable
this feature with the logging trap debugging command statement. Note that this feature can generate a
huge amount of syslog data on a high-traffic PIX
Firewall.
Integration with Cisco IDS
The PIX Firewall is interoperable with the Cisco Intrusion Detection System (Cisco IDS). The
PIX
Firewall traps IDS signatures and sends these as syslog messages the Syslog server. This feature
supports only single-packet IDS signatures.
Kommentare zu diesen Handbüchern