Article

Getting started with the Cisco PIX firewall

Christian Degu and Greg Bastien

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide


Chapter 6, Getting Started with the Cisco PIX Firewall

This excerpt is reprinted with permission from Cisco Press. For more information or to order the book, visit the Cisco Press Web site.

    Requires Free Membership to View

This chapter describes the basic preparation and configuration required to use the network firewall features of the Cisco PIX Firewall. It focuses on how to establish basic connectivity from the internal network to the public Internet.

This chapter covers the following exam topics for the Cisco Secure PIX Firewall Advanced Exam:

5. User interface
6. Configuring the PIX Firewall
8. Time setting and NTP support
13. DHCP server configuration

Foundation topics include:

Access Modes
The Cisco PIX Firewall contains a command set based on Cisco IOS Software technologies that provides three administrative access modes:

  • Unprivileged mode is available when you first access the PIX Firewall through console or Telnet. It displays the > prompt. This mode lets you view only restricted settings.
  • You access privileged mode by entering the enable command and the enable password. The prompt then changes to # from >. In this mode you can change a few of the current settings and view the existing Cisco PIX Firewall configuration. Any unprivileged command also works in privileged mode. To exit privileged mode, enter the disable, exit, or ^z command.
  • You access configuration mode by entering the configure terminal command. This changes the prompt to (config)# from #. In this mode you can change system configurations. All privileged, unprivileged, and configuration commands work in this mode. Use the exit or ^z command to exit configuration mode.

    Configuring the PIX Firewall
    Six important commands are used to produce a basic working configuration for the PIX Firewall:

    • interface
    • nameif
    • ip address
    • nat
    • global
    • route

    This chapter is posted in full as a pdf file. To continue reading, click here.


  • There are Comments. Add yours.

     
    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: