Cisco PIX 525 Spezifikationen Seite 86

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 466
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 85
2-26
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 2 Establishing Connectivity
Basic Configuration Examples
Two Interfaces Without NAT or PAT
When you first add a PIX Firewall to an existing network, it is easiest to implement if you do not have
to renumber all the inside and outside IP addresses. The configuration in
Figure 2-5 illustrates this
scenario. All inside hosts can start connections. All external hosts are blocked from initiating
connections or sessions on inside hosts.
Figure 2-5 Two Interfaces Without NAT
Internet
Intranet
Outside
209.165.202.129
209.165.201.1
209.165.201.3
90189
The values given are examples only. You should change this configuration for the information and
requirements that are specific for your network.
The following steps describe the configuration procedure that is the same regardless of how you
implement your PIX
Firewall:
Step 1 Identify the security level and names of each interface by entering the following commands:
nameif ethernet0 outside security0
nameif ethernet1 inside security100
Step 2 Identify the line speed of each interface by entering the following commands:
interface ethernet0 100basetx
interface ethernet1 100basetx
You may get better performance by changing the default auto option in the interface command to the
specific line speed for the interface card.
Step 3 Identify the IP addresses for each interface:
ip address outside 209.165.201.3 255.255.255.224
ip address inside 209.165.202.129 255.255.255.0
Step 4 Specify the host name for the PIX Firewall:
hostname pixfirewall
This name appears in the command line prompt.
Seitenansicht 85
1 2 ... 81 82 83 84 85 86 87 88 89 90 91 ... 465 466

Kommentare zu diesen Handbüchern

Keine Kommentare