Sunteți pe pagina 1din 27

For review only.

Please do not distribute


DRAFT May 2003. All rights reserved.

© 2003, Cisco Systems, Inc. All rights


© 2003,
reserved.
Cisco Systems, Inc. All rights reserved. FNS 1.0—8-11
For review only. Please do not distribute
FNS 1.0—8-2
© 2003, Cisco Systems, Inc. All rights reserved.
Module 3
DRAFT May 2003. All rights reserved.
Basic PIX Firewall
Configuration

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-3


PIX Firewall Basic Commands

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

• nameif
• interface
• ip address
• nat
• global
• route

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-4


nameif Command

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

pixfirewall(config)#
nameif hardware_id if_name security_level
• Assigns a name to each perimeter interface on the
PIX Firewall and specifies its security level.

pixfirewall(config)# nameif ethernet2


dmz sec50

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-5


interface Command

pixfirewall(config)#

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

interface hardware_id [hardware_speed] [shutdown]


• Enables an interface and configures its type and speed.

pixfirewall(config)# interface ethernet0 100full


pixfirewall(config)# interface ethernet1 100full
• The outside and inside interfaces are set for 100 Mbps Ethernet
full-duplex communication.

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-6


ip address Command
pixfirewall(config)#
ip address if_name ip_address [netmask]

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

• Assigns an IP address to each interface.

pixfirewall(config)#
ip address outside dhcp [setroute] [retry
retry_cnt]
• Enables the DHCP client feature on the outside interface.

pixfirewall(config)# ip address outside dhcp


pixfirewall(config)# ip address dmz 172.16.0.1
255.255.255.0
• The outside interface obtains an IP address from a DHCP
server, but the DMZ interface is assigned the static address of
172.16.0.1
© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-7
nat Command

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

pixfirewall(config)#
nat [(if_name)] nat_id address
[netmask][timeout hh:mm:ss]
• Enables IP address translation.

pixfirewall(config)# nat (inside)


1 0.0.0.0 0.0.0.0

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-8


global Command

pixfirewall(config)#

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

global[(if_name)] nat_id {global_ip[-global_ip]


[netmask global_mask]} | interface
• Works with the nat command to assign a registered or public IP
address to an internal host when accessing the outside network
through the firewall.

pixfirewall(config)# nat (inside) 1 0.0.0.0 0.0.0.0


pixfirewall(config)# global (outside) 1
192.168.0.20-192.168.0.254
• When internal hosts access the outside network through the firewall, they
are assigned public addresses from the
192.168.0.20–192.168.0.254 range.

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-9


route Command

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

pixfirewall(config)#
route if_name ip_address netmask
gateway_ip [metric]
• Defines a static or default route for an
interface.

pixfirewall(config)# route outside


0.0.0.0 0.0.0.0 192.168.0.1 1

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-10


Static Routes

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

pixfirewall(config)# route inside


10.1.1.0 255.255.255.0 10.0.0.3
pixfirewall(config)# route outside
0 0 192.168.0.1

pixfirewall(config)# show route


outside 0.0.0.0 0.0.0.0 192.168.0.1 1 OTHER static
inside 10.1.1.0 255.255.255.0 10.0.0.3 1 OTHER static
inside 10.0.0.0 255.255.255.0 10.0.0.1 1 CONNECT static
outside 192.168.0.2 255.255.255.0 192.168.0.1 1 CONNECT static

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-11


DHCP

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-12


PIX DHCP

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

Client

Server

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-13


DHCP

The PIX Firewall’s DHCP server can

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

be used to dynamically assign


• An IP address and subnet mask.
• The IP address of a DNS server.
• The IP address of a WINS server.
• A domain name.
• The IP address of a TFTP server.
• A lease length.

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-14


DHCP Server

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

1. DHCPDISCOVER—The
client seeks an address
2. DHCPOFFER—The
server offers 10.0.0.3
3. DHCPREQUEST—The
client requests 10.0.0.3
4. DHCPACK—The server
acknowledges the
assignment of 10.0.0.3

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-15


Configuring the PIX Firewall
as a DHCP Server

• Step 1—Assign a static IP address to the inside interface.

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

• Step 2—Specify a range of addresses for the DHCP server to


distribute.
• Step 3—Specify the IP address of the DNS server (optional).
• Step 4—Specify the IP address of the WINS server (optional).
• Step 5—Specify the IP address of the TFTP server (optional).
• Step 6—Specify the lease length (default = 3,600 seconds).
• Step 7—Specify the ping timeout value (optional).
• Step 8—Configure the domain name (optional).
• Step 9—Enable DHCP.

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-16


dhcpd address Command

pixfirewall(config)#

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

dhcpd address ip1[-ip2][if_name]


• Specifies a range of addresses for DHCP to assign.

pixfirewall(config)# dhcpd address


10.0.0.2–10.0.0.15 inside
• The DHCP server assigns addresses
10.0.0.2–10.0.0.15 to DHCP clients on the
inside. Addresses are assigned in
numerical order beginning with 10.0.0.2.

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-17


dhcpd dns Command

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

pixfirewall(config)#
dhcpd dns dns1 [dns2]
• Specifies the IP address of the DNS server the client
will use (optional)

pixfirewall(config)# dhcpd dns 10.0.0.20


• The DHCP server notifies the DHCP client that
10.0.0.20 is the address of the DNS server to use

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-18


dhcpd wins Command

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

pixfirewall(config)#
dhcpd wins wins1 [wins2]
• Specifies the IP address of the WINS server that the client will use (optional)

pixfirewall(config)# dhcpd wins 10.0.0.21


• The DHCP server notifies the DHCP client that it will
use 10.0.0.21 as its WINS server

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-19


dhcpd option Commands

pixfirewall(config)#

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

dhcpd option 66 ascii {server_name | server_ip_str}


• Enables the PIX Firewall to distribute the IP address of a TFTP server for IP Phone
connections

pixfirewall(config)#
dhcpd option 150 ip server_ip1 [server_ip2]
• Enables the PIX Firewall to distribute the IP addresses of a list of
TFTP servers for IP Phone connections

pixfirewall(config)# dhcpd option 150 ip 10.0.0.11

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-20


dhcpd lease Command

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

pixfirewall(config)#
dhcpd lease lease_length
• Specifies the lease length to grant the client
• Default = 3,600 seconds

pixfirewall(config)# dhcpd lease 3600


• The DHCP clients can use their
allocated leases for 3600 seconds

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-21


dhcpd ping_timeout Command

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

pixfirewall(config)#
dhcpd ping_timeout timeout
• Specifies the length of time the DHCP server waits before
allocating an address to a client.
• Default = 750 milliseconds

pixfirewall(config)# dhcpd ping_timeout 10000


• The DHCP server waits 10000 milliseconds (10 seconds)
before allocating an address to a client.

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-22


dhcpd domain Command

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

pixfirewall(config)#
dhcpd domain domain_name
• Specifies the domain name the client will use (optional)

pixfirewall(config)# dhcpd domain cisco.com


• The DHCP server notifies the client that the domain name is
cisco.com

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-23


dhcpd enable Command

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

pixfirewall(config)#
dhcpd enable [if_name]
• Enables the DHCP daemon within the PIX Firewall to
listen for DHCP client requests on the enabled
interface

pixfirewall(config)# dhcpd enable inside


• The DHCP server feature is enabled on the inside
interface

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-24


debug dhcpd and
clear dhcpd Commands

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

pixfirewall(config)#
debug dhcpd event | packet
• Displays information associated with the DHCP server

pixfirewall(config)#
clear dhcpd
• Removes all dhcpd command
statements from the
configuration

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-25


dhcpd auto_config Command
pixfirewall(config)#
dhcpd auto_config[client_ifx_name]

For review only. Please do not distribute


DRAFT May 2003. All rights reserved.

• Enables the PIX Firewall to automatically configure DNS, WINS, and


domain name values from the DHCP client to the DHCP server.

pixfirewall(config)# ip address outside dhcp


pixfirewall(config)# dhcpd address 10.0.0.51-10.0.0.60
inside
pixfirewall(config)# dhcpd enable inside
pixfirewall(config)# dhcpd auto_config
• The PIX Firewall obtains its outside IP address and other configuration
parameters from a DHCP server on its outside interface.
• The PIX Firewall distributes IP addresses from the 10.0.0.51–10.0.0.60
range to its own DHCP clients, the hosts on its inside interface.
• The PIX Firewall passes other configuration parameters it obtained from
the DHCP server on its outside interface to the hosts on its inside
interface.
© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-26
Summary

© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0—8-27

S-ar putea să vă placă și