Asa & amp; pix Firewall transparent mode configuration

Source: Internet
Author: User

 

In transparent mode, the pix is equivalent to a network cable.

Therefore, you do not need to set another network address. You only need to add an ip address for later configuration.

I. upgrade the system

Generally, the pre-installed IOS version of the PIX series firewall is 6.x, and only later than 7.0 supports transparent mode.

So the first step is to upgrade IOS

Preparations:

Find a computer with a firewall and install the ciscotftp software on the switch.

Go to www.skycn.com and you will find the Simplified Chinese version.

Then download a 7.0 bind file (pix701.bin I downloaded) on the cisco website and put it in the root directory of the tftp server.

Official start:

When the firewall is powered on, Press ESC to go to the monitor> status.

 

Monitor> address 192.1.1.1 -- set the firewall IP address

Address 192.1.1.1

Monitor> server 192.1.1.2 -- set the IP address of the tftp server

Server 192.1.1.2

Monitor> ping 192.1.1.2 -- check whether ping is successful

Sending 5, 100-byte 0x7970 ICMP Echoes to 10.32.2.78, timeout is 4 seconds:

!!!!!

Success rate is 100 percent (5/5)

Monitor> file pix701.bin -- declare the full name of the binfile you downloaded

File pix704.bin

Monitor> tftp -- start filling

Tftp ...........................

 

Wait patiently. Wait until the ">" symbol in the non-Permission mode appears. Enter the binfile in flash. The binfile can be used normally later.

Pixfirewall> en

Password:

Pixfirewall # con t

Pixfirewall (config) # interface ethernet1 -- enter port Mode

Pixfirewall (config-if) # ip address 192.1.11 255.255.255.0 -- configure the IP address of the e1 Port

Pixfirewall (config-if) # nameif inside -- configure the e1 port as the inside port of the firewall

INFO: Security level for "inside" set to 100 by default.

Pixfirewall (config-if) # no shutdown -- activate the inside Port

Pixfirewall (config-if) # ping 192.1.1.2 -- Test

Sending 5, 100-byte ICMP Echos to 192.1.1.2, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 MS

Pixfirewall (config-if) # exit -- exit port Mode

Pixfirewall (config) # copy tftp flash: -- copybin File

Address or name of remote host []? 192.1.1.2 -- IP address of the tftp Server

Source filename []? Pix701.bin -- file name

Destination filename [pix701.bin]? Pix701.bin -- confirm

Accessing t -- start copy and wait patiently

Writing file flash: pix701.bin ...!!!!!!!!!!!!!

5124096 bytes copied in 82.80 secs (62488 bytes/sec)

Pixfirewall (config) # reload -- upgrade complete. Restart !!!!!!! Ps. The first start time will take a little longer. Don't worry.

2. PIX anti-question control is generally implemented using ACL.

1. Use access-list to create a list.

2. access-group (access-list name) interface (interface name) in/out application.

Iii. Example

Pixfirewall> en

Password:

Pixfirewall # con t

Pixfirewall (config) # interface ethernet0

Pixfirewall (config-if) # nameif outside

INFO: Security level for "outside" set to 0 by default.

Pixfirewall (config-if) # no shutdown

Pixfirewall (config-if) # exit

Pixfirewall (config) # interface ethernet1

Pixfirewall (config-if) # nameif inside

INFO: Security level for "inside" set to 100 by default.

Pixfirewall (config-if) # no shutdown

Pixfirewall (config-if) # exit

Configure transparent mode

Pixfirewall (config) # firewall transparent -- set the firewall to transparent mode

Pixfirewall (config) # access-list out-list extended permit icmp any -- set to allow all protocols

Pixfirewall (config) # access-list out-list extended permit ip any -- set to allow all IP addresses

Pixfirewall (config) # access-group out-list in interface outside -- bind the access list to the outside interface

Pixfirewall (config) # access-group out-list out interface outside -- bind the access list to the outside interface

Pixfirewall (config) # ip address 192.168.11.1 255.255.255.0 -- set an IP address for configuring the firewall later

Access-list goout permit tcp any eq 7411 -- Port 7411 that can be opened

Access-list goout permit tcp any eq 7412 -- Port 7412 that can be opened

.....

Add a sentence

Access-list goout deny tcp any -- disable all ports except 7411 and 7412

Access-group goout in interface outside -- apply the acl rule to the outside endpoint.

Access-group goout out interface outside -- apply the acl rule to the outside egress end.

Enable telnet

Telnet 192.168.11.0 255.255.255.0 inside

Add User

Username cisco password cisco123456

Iv. Differences between in and out in acl

In and out are relative, for example:

A (s0) ----- (s0) B (s1) -------- (s1) C

Assume that you want to deny access to C by A, and assume that you want to perform an ACL on B (of course, C can also), we will replace this topology with an example:

B's s0 port is the front door, s1 port is the back door, B is your living room, the front door is connected to A, the living room backdoor is connected to your vault (C)

If you want to reject thieves from A, there are two ways to make A setup in your living room:

1. install an iron gate (ACL) in the front door of your living room (B) (s0 of B) and prevent thieves from coming in (in ).

2. install an iron gate (s1 of B) in the back door of your living room. Although thieves enter your living room, they still cannot go out (out) from the back door to your vault (C)

Although these two methods (in/out) can achieve the effect, there is a difference in performance,

In fact, the best way is to choose method 1, as though the thief did not enter the vault, at least into your living room (B ),

Dirty the carpet in your living room (B consumes some additional unnecessary processing)

Suppose you want to put the iron gate (ACL) in C, should you use in or out at that time?

You can answer this question by yourself.

 

Compared with a vro, the incoming

The extended acl must be close to the source. The standard acl is close to the target address.

In fact, in and out applications are flexible.

 

Heiying kid' blog

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.