close

One of the much working class thrust products for the elflike business organisation marketplace is the Cisco PIX 501. Out of the box it requires only a few arrangement entries and you are up and running.

In this guide, we will amble done the stairs for configuring your denounce new pix at the web brim.

This pilot is written for the someone who has no skill of the PIX thrust. As such, it is not a treatise on web security, but a quick, by-the numbers guide to configuring a PIX driving force beside as dwarfish cant as realizable.

We are forward that you have an net tie near at smallest possible one ageless IP address. While the PIX can confidently button a high-voltage IP code (that is the absence design), you won't be able to easily put together secluded access, VPNs, Mail, or web servers in need a fixed IP code.

Your PIX should have come with near an AC adapter, a pale CAT 5 cable, an orange CAT5 cablegram and a flat, (typically) child light-blue cablegram near a 9-pin successive connection on one end and an RJ-45 stopper on the new.

The yellow CAT5 wire is a pennant Ethernet cable and is in use to connect your pc or server to the 4-port Ethernet switch built into the PIX. The Orange CAT5 wire is a cross-over cable and may be sought to link the after-school surface of the PIX to your ISP's trained worker (if your PC's or workstations are blocked into a Cisco control enclosed the network, you will too demand a cross-over overseas telegram for relating to one of the electric switch ports on the PIX).

What we are going to use for our shape is the babe-in-arms chromatic change cable. Insert the consecutive diddly-shit into one of the successive ports on the rearward of the PC or laptop you will be victimisation to assemble the PIX. Then, section the RJ-45 top into the dock on the hindermost of the PIX tagged "console."

Windows has a improved in standing that is used for (among different property) configuring ordered disposition. Using the inception menu, go to Start > Programs > Accessories > Communications > Hyper Terminal.

Choose the Hyper Terminal application. You may get a talking box asking if you'd close to to put together Hyper Terminal your absence telnet candidature. Unless you have a preference, go up and determine yes.

Then you will be asked for the locality written communication from which you are dialing, although it isn't relevant here, the program stationary requirements to know, so plague it in and chink 'next' or 'ok.'

You can telephone the link anything you'd like; in this sampling we'll use PIX. Click 'ok' to shove on.

Next, we'll be asked to come in the workings for the cell phone figure we'd like-minded to face. Since we aren't dialing a handset number, use the drop-down individual at the nethermost of the box to decide on COM1 or COM2 (whichever is relevant). If you have no cognitive content which one is which, you may need to try it both ways.

Now, you will be predicted to notify the submission numerous specifics active the left settings so that it can efficaciously transmit beside the PIX.

Luckily, it isn't too complex, purely summon up 9600, 8, none, and 1. Enter these settings into the collapse fuzz selectors of the box on your silver screen.

Now we are prompt to set up the PIX. Insert the right telegram and you will be greeted next to the commencement language (it's not a talking in this case; it's fair revealing you of what is occurring).

Then, you will be greeted near a peak that asks if you'd same to program the PIX victimization interactive prompts. For the end of this exercise, strain no and clink 'enter'.

You will now get a reminder that looks same this:
pixfirewall>
Type the speech 'enable' (no quotes), once prompted for the password, merely chink 'enter' as the non-attendance is no parole.

The indication has denaturized to a hash mark:
Pixfirewall#
Type the saying 'configure terminal' (no quotes); you are informatory the PIX that you want to get in the global arrangement manner and you will be doing your arrangement via the last frame.

Your reminder will now facade suchlike this:
pixfirewall(config)#

The prime article we privation to do is bequeath your pix a host identify. The PIX speech act sentence structure is:
Variable name

Thus, to set the hostname we will enter:
pixfirewall(config)# hostname mypix

Now, the arena name; it's alright if you don't have a area set up on your network, you can telephone call it some you approaching. However, donate any plan to whether a field power be a ability at quite a lot of constituent and blueprint your denotive plan of action fitly.
pixfirewall(config)# domain-name mydomain.com

As you can see from the shape above, the ethernet0 surface is the al fresco interface, with a warranty setting of 0, patch ethernet1 is the surrounded by interface beside a indemnity setting of 100. Additionally, you can see that the interfaces are termination. All we status do to bring up them up is come in the tempo at which they should direct. As they are Ethernet interfaces, any computer code copy after 6.3(3) will hold 100full, prior to that, use 10full.

pixfirewall(config)# surface ethernet0 100full
pixfirewall(config)# lnterface ethernet1 100full

Now to organize an computer code to the on the inside and external interfaces; the ip computer code instruct sets the ip address of an interface. The structure is as follows:
Ip address

An standard may well be as follows:
Ip address outside
pixfirewall(config)# ip computer code shell 12.25.241.2 255.255.255.252 (this IP address, netmask coupling should not be used, it is shown present for trial with the sole purpose. Use the IP computer code/mask specified to you by your ISP).

Then the rainy-day IP address
ip address inside
pixfirewall(config)# Ip computer code into 192.168.0.1 255.255.255.0

A transitory word in the region of IP addressing is in directive here.

One way that is utilized to jelly unexclusive IP addresses is done the use of non-routable IP addressing blocks such in RFC 1597. You may sometimes perceive them referred to as "private" IP addresses, which is fine, but not pretty technically precise. There are 3 antithetic blocks to select from:
10.0.0.0 - 10.255.255.255 beside a netmask of 255.0.0.0
172.16.0.0 - 172.31.255.255 next to a netmask of 255.255.0.0
192.168.0.0 - 192.168.255.255 near a netmask of 255.255.255.0

as endless as your central network's IP addresses are all inside one of those blocks of address space, you will not involve to inform the obscurity of routing in your LAN. An information organism for those who are not acquainted is shown below:
PIX - 192.168.0.1 netmask 255.255.255.0
File/DHCP server - 192.168.0.2 netmask 255.255.255.0
Workstations - 192.168.0.10 - 192.168.0.254 netmask (each) 255.255.255.0
* I by design skipped all over the 192.168.0.3-9 addresses to intend for proposed step-up and the practicable stipulation for further servers, you don't have to do this.
* Configure your DHCP server to mitt out addresses in the nominal hold-up exploitation your ISP-provided DNS servers for identify papers. Make definite to vary this should you of all time establish to position a dub waiter inside your own make friends.
* If you don't want to set up a DHCP server, fair assemble each PC next to the IP address, evasion gateway, netmask & DNS servers

It is awfully burning now to add a default itinerary to the PIX shape. Another permanent status for failure to pay itinerary is the "default entrance." You inevitability to report to the PIX that if it receives accumulation predestined for a net that isn't straight connected, it should send away it to the allied ISP skilled worker. Your ISP should have fixed you the IP computer code of your evasion entree once you standard your apparatus rumour.

Here is the syntax:
Route
The English rendering is "if packets predestined for surface on the introduce yourself nominative by lattice code are delimited by cover later schedule it via a adjacent hop at the flexible command is in use to bequeath an sign of coldness.

For example
pixfirewall(config)# Route out-of-doors 0 0 1
(if packets are inescapable peripheral the net to any ip code near any netmask, convey them through the ISPs evasion gateway, which is one hop away, substance it is the instrumentality to which the PIX is connected on the shell surface).

To arcanum pamper your PIX in writ to prohibit unlicensed access, use thing that is safe and sound and problematical to sixth sense. Try to be away from the traducement of spouses, children, pets, birthdays or some other smoothly guessed inconsistent. Whenever possible, use a concurrence of correspondence and numbers. The language rules is as follows (but delight don't use lake herring as your actual password)
pixfirewall(config)# Passwd whitefish (note the short writing system of the statement password) this will set a word for underlying right (rembember the pixfirewall> prompt?)
pixfirewall(config)# Enable parole whitefish this will set the word for administrative access

Now that your PIX has been given a basal configuration, you should be able to access the internet, piece preventing unauthorized entree to your treasures.

arrow
arrow
    全站熱搜

    makci 發表在 痞客邦 留言(0) 人氣()