Network Management Learning: detailed configuration process of PIX525 transparent mode

Source: Internet
Author: User

I won't say much about how to connect to the computer. It is everywhere on the Internet. But it seems to be worth noting that, first power up the firewall after the Super Terminal is opened, otherwise nothing can be seen on the Super Terminal.

The configuration is as follows:

Because the pre-installed IOS version of the PIX series firewall is 6.x and only version 7.0 or above supports transparent mode, the first step is to upgrade IOS

Preparations:

Find a computer with a firewall and install the ciscotftp software on the switch. go to www.skycn.com. very simple Chinese version. then download a 7.0 bind file (pix701.bin I downloaded) on the cisco website and put it in the root directory of the tftp server.

Official start:

When the firewall is powered on, Press ESC to go to the monitor> status.

Monitor> address 192.1.1.1 -- set the firewall IP address
Address 192.1.1.1
Monitor> server 192.1.1.2 -- set the IP address of the tftp server
Server 192.1.1.2
Monitor> ping 192.1.1.2 -- check whether ping is successful
Sending 5, 100-byte 0x7970 ICMP Echoes to 10.32.2.78, timeout is 4 seconds:
!!!!!
Success rate is 100 percent (5/5)
Monitor> file pix701.bin -- declare the full name of the binfile you downloaded
File pix704.bin
Monitor> tftp -- start filling
Tftp pix704.bin@192.168.1.80 ...........................

Wait patiently. Wait until the ">" symbol in the non-Permission mode appears. Enter the binfile in flash. The binfile can be used normally later.

Pixfirewall> en

Password:

Pixfirewall # con t

Pixfirewall (config) # interface ethernet1 -- enter port Mode

Pixfirewall (config-if) # ip address 192.1.11 255.255.255.0 -- configure the IP address of the e1 Port

Pixfirewall (config-if) # nameif inside -- configure the e1 port as the inside port of the firewall

INFO: Security level for "inside" set to 100 by default.

Pixfirewall (config-if) # no shutdown -- activate the inside Port

Pixfirewall (config-if) # ping 192.1.1.2 -- Test

Sending 5, 100-byte ICMP Echos to 192.1.1.2, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 MS

Pixfirewall (config-if) # exit -- exit port Mode

Pixfirewall (config) # copy tftp flash: -- copybin File

Address or name of remote host []? 192.1.1.2 -- IP address of the tftp Server

Source filename []? Pix701.bin -- file name

Destination filename [pix701.bin]? Pix701.bin -- confirm

Accessing tftp: // 192.1.1.2/pix701.bin ...!! -- Start copy and wait patiently

Writing file flash: pix701.bin ...!!!!!!!!!!!!!

5124096 bytes copied in 82.80 secs (62488 bytes/sec)

Pixfirewall (config) # reload -- upgrade complete. Restart !!!!!!! Ps. The first start time will take a little longer. Don't worry.

The following is the configuration. it is also very easy. It is similar to configuring and activating the outside Port and the inside port just now, but be careful not to configure the IP address. this is a transparent mode. who has seen an IP address on both ends of a network cable?

Pixfirewall> en

Password:

Pixfirewall # con t

Pixfirewall (config) # interface ethernet0

Pixfirewall (config-if) # nameif outside

INFO: Security level for "outside" set to 0 by default.

Pixfirewall (config-if) # no shutdown

Pixfirewall (config-if) # exit

Pixfirewall (config) # interface ethernet1

Pixfirewall (config-if) # nameif inside

INFO: Security level for "inside" set to 100 by default.

Pixfirewall (config-if) # no shutdown

Pixfirewall (config-if) # exit

Remember ~~~~~~~~ Here is the most important sentence:

Pixfirewall (config) # firewall transparent -- set the firewall to transparent mode

Pixfirewall (config) # access-list out-list extended permit icmp any -- set to allow all protocols

Pixfirewall (config) # access-list out-list extended permit ip any -- set to allow all IP addresses

Pixfirewall (config) # access-group out-list in interface outside -- bind the access list to the outside interface

Pixfirewall (config) # access-group out-list out interface outside -- bind the access list to the outside interface

Pixfirewall (config) # ip address 192.1.1.1 255.255.255.0 -- set an IP address for configuring the firewall later

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.