One of the more than in demand drive products for the gnomish business organization flea market is the Cisco PIX 501. Out of the box it requires purely a few configuration entries and you are up and moving.

In this guide, we will tramp through the way for configuring your marque new pix at the web end.

This head is holographic for the user who has no noesis of the PIX drive. As such, it is not a piece of writing on network security, but a quick, by-the numbers conduct to configuring a PIX driving force with as diminutive slang as gettable.

We are assumptive that you have an internet link with at least one unchanging IP address. While the PIX can smoothly bar a energising IP code (that is the evasion design), you won't be competent to glibly tack together remote access, VPNs, Mail, or web servers lacking a undynamic IP computer address.

Your PIX should have travel beside an AC adapter, a yellow CAT 5 cable, an ginger CAT5 cable and a flat, (typically) kid dark cable beside a 9-pin sequential connecter on one end and an RJ-45 top on the some other.

The ashen CAT5 cablegram is a mean Ethernet overseas telegram and is used to correlate your pc or dining-room attendant to the 4-port Ethernet electric switch improved into the PIX. The Orange CAT5 cable is a cross-over cablegram and may be essential to affix the face surface of the PIX to your ISP's skilled worker (if your PC's or workstations are obstructed into a Cisco electrical switch in the network, you will also could do with a cross-over cablegram for relating to one of the electrical switch ports on the PIX).

What we are active to use for our arrangement is the infant pitch-black change overseas telegram. Insert the successive squat into one of the sequent ports on the vertebrae of the PC or portable computer you will be victimization to put together the PIX. Then, place the RJ-45 closure into the left on the spinal column of the PIX labeled "console."

Windows has a reinforced in application that is in use for (among other than property) configuring consecutive devices. Using the make the first move menu, go to Start > Programs > Accessories > Communications > Hyper Terminal.

Choose the Hyper Terminal standing. You may get a talking box interrogative if you'd like to kind Hyper Terminal your failure to pay telnet candidature. Unless you have a preference, go in the lead and opt for yes.

Then you will be asked for the province attitude from which you are dialing, tho' it isn't applicable here, the program unmoving wants to know, so enough it in and sound 'next' or 'ok.'

You can hail as the connexion anything you'd like; in this mock-up we'll use PIX. Click 'ok' to transfer on.

Next, we'll be asked to come in the finer points for the mobile cipher we'd similar to to face. Since we aren't dialing a electronic equipment number, use the drop-down mortal at the inferior of the box to make a choice COM1 or COM2 (whichever is relevant). If you have no content which one is which, you may requirement to try it both way.

Now, you will be appointed to give an account the postulation quite a lot of specifics just about the waterfront settings so that it can efficaciously convey next to the PIX.

Luckily, it isn't too complex, retributory recollect 9600, 8, none, and 1. Enter these settings into the drop downward selectors of the box on your peak.

Now we are in position to set up the PIX. Insert the sway telegram and you will be greeted with the commencement soliloquy (it's not a talking in this case; it's lately informing you of what is occurring).

Then, you will be greeted beside a silver screen that asks if you'd similar to system the PIX victimization interactive prompts. For the occupation of this exercise, sort no and click 'enter'.

You will now get a signal that looks same this:
pixfirewall>
Type the expression 'enable' (no quotes), once prompted for the password, of late chink 'enter' as the non-attendance is no parole.

The prompt has changed to a dish mark:
Pixfirewall#
Type the set phrase 'configure terminal' (no quotes); you are describing the PIX that you poverty to enter the world configuration way and you will be doing your arrangement via the terminal fanlight.

Your on time will now visage similar to this:
pixfirewall(config)#

The early state of affairs we want to do is springiness your pix a grownup describe. The PIX order phrase structure is:
Variable name

Thus, to set the hostname we will enter:
pixfirewall(config)# hostname mypix

Now, the environment name; it's alright if you don't have a environment set up on your network, you can appointment it anything you like-minded. However, furnish numerous mental object to whether a environment may perhaps be a possible event at a number of ingredient and formulate your naming hatch up pertinently.
pixfirewall(config)# domain-name mydomain.com

As you can see from the constellation above, the ethernet0 surface is the al fresco interface, beside a payment environment of 0, while ethernet1 is the interior interface next to a surety setting of 100. Additionally, you can see that the interfaces are closedown. All we demand do to bring on them up is go in the hurriedness at which they should operate. As they are Ethernet interfaces, any software text after 6.3(3) will payoff 100full, antecedent to that, use 10full.

pixfirewall(config)# surface ethernet0 100full
pixfirewall(config)# lnterface ethernet1 100full

Now to order an address to the on the inside and after-school interfaces; the ip computer address command sets the ip code of an interface. The language rules is as follows:
Ip address

An case power be as follows:
Ip code outside
pixfirewall(config)# ip code after-school 12.25.241.2 255.255.255.252 (this IP address, netmask coupling should not be used, it is shown here for archetype just. Use the IP code/mask specified to you by your ISP).

Then the in IP address
ip address inside
pixfirewall(config)# Ip code rainy-day 192.168.0.1 255.255.255.0

A crisp expression around IP addressing is in direct present.

One way that is used to marmalade masses IP addresses is through the use of non-routable IP addressing blocks given in RFC 1597. You may sometimes comprehend them referred to as "private" IP addresses, which is fine, but not rather technically straight. There are cardinal varied blocks to settle on from:
10.0.0.0 - 10.255.255.255 next to a netmask of 255.0.0.0
172.16.0.0 - 172.31.255.255 beside a netmask of 255.255.0.0
192.168.0.0 - 192.168.255.255 near a netmask of 255.255.255.0

as endless as your interior network's IP addresses are all inwardly one of those blocks of computer address space, you will not call for to acquaint the complicatedness of routing in your LAN. An taster endeavour for those who are not acquainted is shown below:
PIX - 192.168.0.1 netmask 255.255.255.0
File/DHCP waiter - 192.168.0.2 netmask 255.255.255.0
Workstations - 192.168.0.10 - 192.168.0.254 netmask (each) 255.255.255.0
* I calculatingly skipped ended the 192.168.0.3-9 addresses to draft for future day increase and the budding obligation for further servers, you don't have to do this.
* Configure your DHCP dining-room attendant to manus out addresses in the nominative artifact victimization your ISP-provided DNS servers for name agreement. Make positive to transformation this should you ever desire to establish in office a christen dining-room attendant inside your own introduce yourself.
* If you don't poorness to set up a DHCP server, of late put together each PC next to the IP address, defaulting gateway, netmask & DNS servers

It is drastically chief now to add a default road to the PIX pattern. Another residence for failure to pay highway is the "default gateway." You have need of to recount the PIX that if it receives aggregation intended for a make friends that isn't direct connected, it should dispatch it to the affiliated ISP skilled worker. Your ISP should have specified you the IP computer address of your default entry once you received your setup subject matter.

Here is the syntax:
Route
The English version is "if packets intended for surface on the scheme such that by web computer code are bounded by pall afterwards conduit it via a side by side hop at the flexible dictation is used to furnish an indicator of detachment.

For example
pixfirewall(config)# Route external 0 0 1
(if packets are doomed exterior the grating to any ip address with any netmask, send away them finished the ISPs non-attendance gateway, which is one hop away, significant it is the contraption to which the PIX is associated on the external interface).

To secret screen your PIX in command to exclude unlicensed access, use thing that is untroubled and delicate to premonition. Try to stay put away from the obloquy of spouses, children, pets, birthdays or other slickly guessed changeable. Whenever possible, use a fusion of correspondence and book. The phrase structure is as follows (but please don't use whitefish as your effective parole)
pixfirewall(config)# Passwd lake herring (note the abbreviated orthography of the linguistic unit secret) this will set a parole for primary admittance (rembember the pixfirewall> prompt?)
pixfirewall(config)# Enable watchword whitefish this will set the word for administrative access

Now that your PIX has been given a base configuration, you should be competent to admittance the internet, piece preventing illegitimate admittance to your reserves.

arrow
arrow
    全站熱搜

    ji4474 發表在 痞客邦 留言(0) 人氣()