
1-31
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 1 Getting Started
Before You Start Configuring PIX Firewall
Note The factory default setting for the DHCP address pool size is determined by your PIX Firewall platform
and your feature license. For information about the possible options, refer to “
Using the PIX Firewall
DHCP Client” in Chapter 4, “Using PIX Firewall in SOHO Networks.”
Clearing and Removing Configuration Settings
To clear all the configuration for a specified command and all its subcommands, enter the following
command:
clear configurationcommand [subconfigurationcommand]
This command clears all the current configuration for the specified configuration command. If you only
want to clear the configuration for a specific subcommand, you can enter a value for
subconfigurationcommand.
To disable the specific parameters or options of a command or subcommand, enter the no form of the
command, as follows:
no configurationcommand [subconfigurationcommand] qualifier [...]
In this case, you use the no command to remove the specific configuration identified by qualifier.
Before You Start Configuring PIX Firewall
The key to successful implementation of your PIX Firewall is having a clear security policy that
describes how to control access and use of your organization’s network resources. You need to
understand your security policy to ensure that you implement and configure the PIX
Firewall in a way
that supports this policy. Your security policy should have the support of the various departments and
administrators responsible for its implementation and should be well understood by network users.
Before you configure the PIX Firewall, sketch out a network diagram with IP addresses that you will
assign to the PIX
Firewall and those of routers on each interface. If you have more than two interfaces
in the PIX
Firewall, note the security level for each interface.
Where to Go from Here
• To complete the configuration required to connect your PIX Firewall to your existing network, refer
to
Chapter 2, “Establishing Connectivity.”
• To allow or restrict specific types of network activity and access, refer to Chapter 3, “Controlling
Network Access and Use.”
• To use the application inspection and the fixup command to control the secure use of specific
applications and services, refer to
Chapter 5, “Configuring Application Inspection (Fixup).”
• To use a PIX Firewall as an Easy VPN Remote device in relation to an Easy VPN Server or to use
it with DHCP or PPPoE, refer to
Chapter 4, “Using PIX Firewall in SOHO Networks.”
• To perform basic VPN configuration, refer to Chapter 6, “Configuring IPSec and Certification
Authorities.”
Kommentare zu diesen Handbüchern