Table of Contents
About This Guide
This preface describes:
- Document Objectives
- Audience
- Document Organization
- Document Conventions
- Cisco Connection Online
- CD-ROM Documentation
Cisco PIX (Private Internet Exchange) Firewall provides full firewall protection that completely conceals the architecture of an internal network from the outside world.
This guide is for network managers who perform any of the following tasks:
- Managing network security
- Installing and configuring firewalls
- Managing default and static routes, and TCP and UDP services
Use this guide with the installation guide supplied with your PIX Firewall unit.
This guide describes:
- Chapter 1, "Introduction," describes the PIX Firewall, its Adaptive Security feature, concepts, and new features for this release.
- Chapter 2, "Configuring the PIX Firewall," describes how to initially configure the PIX Firewall to participate on the network, how to test the new configuration, and how to improve the configuration to access each feature.
- Chapter 3, "Advanced Configurations," describes how to improve the configuration to handle optional features available for the PIX Firewall.
- Chapter 4, "Configuration Examples," provides example configurations.
- Chapter 5, "Command Reference," describes each PIX Firewall command and provides command syntax, usage guidelines, and an example.
- Appendix A, "Configuration Forms," provides forms you can use to plan a configuration before starting to create a configuration.
- Appendix B, "Acronyms and Abbreviations," lists the acronyms and abbreviations used in this guide.
- Appendix C, "Installing the PIX Firewall Setup Wizard," describes how to install the PIX Firewall Setup Wizard.
- Appendix D, "Configuring for MS-Exchange Use," describes how to configure PIX Firewall to handle mail transfers across the firewall from Windows NT Servers on the protected and unprotected networks.
- Appendix E, "Subnet Masking and Addressing," lists the IP addresses associated with each subnet mask value.
This guide uses the following conventions:
- Filenames, directory names, and arguments for which you supply values are in italics.
- The symbol ^ represents the key labeled Ctrl (control). To enter a control key; for example, ^z, hold down the Ctrl key while you press the z key.
- Command names, buttons, and keywords in text are shown in boldface. The PIX Firewall commands are described in Chapter 5, "Command Reference."
- Command statements in the default configuration section in Chapter 4, "Configuration Examples" that PIX Firewall provides are shown in boldface and italic screen font.
- Variables in command syntax descriptions are shown in italics. Command options in square brackets [ ] can be optionally entered, and parameters separated by a vertical bar (|) require you to enter one parameter, but not the other(s).
- Examples depict screen displays and the command line in screen font.
- Information you need to enter in examples is shown in boldface screen font.
- Variables for which you must supply a value are shown in italic screen font.
- Selecting a menu item (or screen) is indicated by the following convention:
- Select screen1>screen2>screen3.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.
Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.
CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.
You can access CCO in the following ways:
For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.
Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.
If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.
Copyright 1989-1998©Cisco Systems Inc.