|
|
This chapter provides information you need before configuring PIX Firewall and includes the following sections:
Refer to Appendix B, "Acronyms and Abbreviations" for information on acronyms used in this chapter.
The PIX Firewall, when properly configured, helps prevent unauthorized connections between two or more networks.
This section includes the following topics:
The PIX Firewall can protect one or more networks from intruders on an outer, unprotected network. Most PIX Firewall models optionally support multiple outside or perimeter networks (also known as demilitarized zones (DMZs)). Connections between the networks can all be controlled by the PIX Firewall.
To effectively use a firewall in your organization, you need a security policy to ensure that all traffic from the protected networks passes only through the firewall to the unprotected network. Refer to "Creating a Security Policy" in this chapter for more information. You can then control who may access the networks with which services, and how to implement your security policy using the features PIX Firewall provides.
Figure 1-1 shows how a PIX Firewall protects a network while providing outbound connections and secure access to the Internet.
Within this architecture, the PIX Firewall forms the boundary between the protected networks and the unprotected networks. All traffic between the protected and unprotected networks must flow through the firewall to maintain security. The unprotected network is typically accessible to the Internet. PIX Firewall lets you locate servers such as those for Web access, SNMP, electronic mail (SMTP) in the protected network and control who on the outside can access these servers.
Alternatively, for all PIX Firewall models except the PIX 506, server systems can be located on a perimeter network as shown in Figure 1-1, and access to the server systems can be controlled and monitored by the PIX Firewall. The PIX 506 only has two network interfaces, so all systems must be located either on the inside or the outside interfaces.
The PIX Firewall also lets you implement your security policies for connection to and from the inside network.
Typically, the inside network is an organization's own internal network, or intranet, and the outside network is the Internet, but the PIX Firewall can also be used within an intranet to isolate or protect one group of internal computing systems and users from another.

The perimeter network can be configured to be as secure as the inside network or with varying security levels. Security levels are assigned numeric values from 0, the least secure, to 100, the most secure. The outside interface is always 0 and the inside interface is always 100. The perimeter interfaces can be any security level from 1 to 99.
Both the inside and perimeter networks are protected with the PIX Firewall's Adaptive Security algorithm described later in this chapter. The inside, perimeter, and outside interfaces can listen to RIP routing updates, and all interfaces can broadcast a RIP default route if required.
This section includes the following topics:
The Adaptive Security algorithm is a very stateful approach to security. Every inbound packet is checked against the Adaptive Security algorithm and against connection state information in memory. This stateful approach to security is regarded in the industry as being far more secure than a stateless packet screening approach.
Adaptive Security follows these rules:
PIX Firewall handles UDP data transfers in a manner similar to TCP. Special handling allows DNS, archie, StreamWorks, H.323, and RealAudio to work securely. The PIX Firewall creates UDP "connection" state information when a UDP packet is sent from the inside network. Response packets resulting from this traffic are accepted if they match the connection state information. The connection state information is deleted after a short period of inactivity.
When an outbound packet arrives at a PIX Firewall higher security level interface (security levels can be viewed with the show nameif command), the PIX Firewall checks to see if the packet is valid based on the Adaptive Security Algorithm, and then whether or not previous packets have come from that host. If not, then the packet is for a new connection, and PIX Firewall creates a translation slot in its state table for the connection. The information that PIX Firewall stores in the translation slot includes the inside IP address and a globally unique IP address assigned by Network Address Translation (NAT), Port Address Translation (PAT), or Identity (which uses the inside address as the outside address). The PIX Firewall then changes the packet's source IP address to the globally unique address, modifies the checksum and other fields as required, and forwards the packet to the lower security level interface.
When an inbound packet arrives at an external interface such as the outside interface, it must first pass the PIX Firewall Adaptive Security criteria. If the packet passes the security tests, the PIX Firewall removes the destination IP address, and the internal IP address is inserted in its place. The packet is forwarded to the protected interface.
Dynamic translation slots are useful for desktop machines that do not need constant addresses on the Internet. Inside network hosts with IP addresses not registered with the NIC (Network Information Center) can directly access the Internet with standard TCP/IP software on the desktop by enabling address translation within the PIX Firewall. No special client software is needed. The PIX Firewall supports Network Address Translation (NAT) which provides a globally unique address for each inside host, and Port Address Translation (PAT) which shares a single globally unique address for up to 64K simultaneously accessing inside hosts.
Another class of address translation on the PIX Firewall is static translation. Static translation effectively moves an internal, unregistered host into the virtual network in the PIX Firewall. This is useful for internal machines that need to be addressed from the outside Internet gateways; for example, an SMTP server.
For more information on firewalls, refer to:
![]() |
Note You can view information on the PIX Firewall and additional documentation over the World Wide Web at the following site: http://www.cisco.com/warp/public/778/security/pix/ |
The PIX Firewall provides full firewall protection that completely conceals the architecture of an internal network from the outside world. The PIX Firewall allows secure access to the Internet from within existing private networks and the ability to expand and reconfigure TCP/IP networks without being concerned about a shortage of IP addresses.
The PIX Firewall features are described in Table 1-1.
| Feature | Description | Benefit | Security Implication |
|---|---|---|---|
16 MB Flash Memory Card | Version 5.1 provides support for a 16 MB Flash memory card. This unit replaces the current Flash memory card. (PIX Firewall must not be run with two Flash memory cards.) | Permits the PIX Firewall to store larger configurations and additional information not previously possible.
| With the 16 MB Flash memory card installed, PIX Firewall can only be downgraded to version 4.4(4). If an earlier version is loaded via TFTP, you will need to contact Customer Support for a recovery procedure. Does not work with the PIX 515, which has a 16 MB Flash unit on the motherboard. |
AAA Service Selection | You can now include or exclude access to AAA services. | Specifies exceptions to previously defined rules in the aaa command. | Replaces the except option to the aaa command. |
AAA Server Groups | PIX Firewall lets you define separate groups of TACACS+ or RADIUS servers for specifying different types of traffic; such as, a TACACS+ server for inbound traffic and another for outbound traffic. | AAA server group are defined by a tag name that directs different types of traffic to each authentication server. | If accounting is in effect, the accounting information goes to the active server. |
Controls which inside systems can establish connections to the outside network. Implemented with the access-list and access-group commands. Can be used as an alternative to the conduit and outbound commands. | The default security policy can be modified to be consistent with the site security policy by limiting outgoing connections based on inside source address, outside destination address, or protocol. | Configure access lists carefully if your security policy limits outgoing connections. The access-list and access-group command statements take precedence over the conduit and outbound command statements in your configuration. | |
ActiveX Blocking | ActiveX controls, formerly known as OLE or OCX controls, are components you can insert in a web page or other application. | The PIX Firewall ActiveX blocking feature blocks HTML <object> commands and comments them out of the HTML web page. | As a technology, ActiveX creates many potential problems for the network clients including causing workstations to fail, introducing network security problems, or be used to attack servers. |
Implements stateful connection control through the firewall. | Allows one way (inside to outside) connections without an explicit configuration for each internal system and application. | Always in operation monitoring return packets to ensure they are valid. Actively randomizes TCP sequence numbers to minimize the risk of TCP sequence number attack. | |
Boothelper Installation | As of version 5.1, install PIX Firewall software using the Boothelper installation diskette and download the PIX Firewall image via TFTP. | Permits loading larger images than were previously possible with a diskette. | Requires TFTP server. If you have CCO access, you can download a free server from Cisco for use with Windows 95 or Windows NT. |
Cisco IOS-like Configuration | Supports a command line interface similar to Cisco IOS software. | Administrators familiar with the Cisco IOS router interface will be comfortable with the PIX Firewall. | Similar interfaces provide less chance to make errors and cause security holes. |
Conduits protects connections from the external networks to the internal networks; that is, from a lower security level interface to a higher level interface. You can also use the access-list and access-group commands to provide the same protection. | For some applications or business requirements, it is desirable to establish connections to the inside or perimeter networks. This may be to allow access from certain remote systems, or to provide access to applications hosted on inside systems. | Each conduit is a potential hole through the PIX Firewall and hence their use should be limited as your security policy and business needs require. Make conduits as specific as possible, by specifying a remote source address, local destination address, and protocol. | |
User-based authentication of inbound or outbound connections. Unlike a proxy server that analyzes every packet at layer seven of the OSI model, a time- and processing-intensive function, the PIX Firewall first queries an authentication server, and when the connection is approved, establishes a data flow. All traffic thereafter flows directly and quickly between the two parties. | Allows security policies to be enforced on a per user ID basis. Connections must be authenticated with a user ID and password before they can be established. Supports authentication and authorization. The user ID and password are entered via an initial HTTP, Telnet, or FTP connection. | Allows much finer level of administrative control over connections compared to checking source IP addresses. When providing inbound authentication, appropriate controls need to be applied to the user ID and passwords used by external users (one-time passwords are recommended in this instance). | |
DC Power on PIX Firewall 520 | The PIX Firewall 520 now comes in a DC power model. | Able to work in 48-volt DC environments. | Provides network security in telephony and environments where a firewall might not previously be considered. |
DNS Guard | Identifies an outbound DNS resolve request, and only allows a single DNS response. | A host may query several servers for a response (in the case that the first server is slow in responding), but only the first answer to the specific question will be allowed. All the additional answers from other servers will be dropped. | Always enabled. |
Failover | PIX Firewall failover allows you to configure two PIX Firewall units in a fully redundant topology. | Fault tolerant networks are an increasingly important requirement, which PIX Firewall failover provides. | Both PIX Firewall units must be configured identically; failover does not provide stateful redundancy. |
FDDI Interfaces | PIX Firewall supports two FDDI network interfaces. | The Cisco FDDI card complies with ANSI specification ASC X3T9.5, which is a peer to the Ethernet IEEE802.3 or Token Ring IEEE802.5 specifications. The FDDI driver supports failover. | FDDI interfaces cannot be used with Ethernet or Token Ring interfaces. |
Firewall and Memory Pool MIBs | The SNMP Firewall and Memory Pool MIBs extend the number of traps you can use to discover additional information about the state of the PIX Firewall. | The following SNMP events augment the current set:
| Permits extended monitoring capability to SNMP management stations. |
Flood Defender | Protects inside systems from TCP SYN flood attacks. Enable by setting the maximum embryonic connections option to the nat and static commands. | Allows servers within the inside network to be protected from one style of denial of service attack. (This is not the floodguard feature.) | Protects inside systems from SYN attacks. |
Flood Guard | Controls the AAA service's tolerance for unanswered login attempts, to prevent a Denial of Service attack on AAA services in particular. | Optimizes AAA system use. Enabled with the floodguard 1 command. | Enabled by default. |
Four-Port Ethernet Interfaces | This component provides four 10/100 Ethernet connections and has autosense capability. | Can be intermixed with Token Ring interfaces except on PIX 515. | Connectors on the 4-port card are numbered top to bottom; however, the actual device number depends on the slot in which the 4-port card is installed. |
FragGuard and Virtual Re-assembly | IP fragment protection that performs full-reassembly of all ICMP error messages and virtual-reassembly of the remaining IP fragments that are routed through the PIX Firewall. | Virtual reassembly is currently enabled by default. | Uses syslog to notify of any fragment overlapping and small fragment offset anomalies, especially those caused by a teardrop.c attack. |
FTP and URL Logging | View inbound and outbound FTP commands entered by your users as well as the URLs they use to access other sites. | Monitor user access of internal and external sites. Provides data you can use to block access to problem sites. | Enabled with the logging trap debugging command statement. However, use of this command can generate a huge amount of syslog data on a high-traffic PIX Firewall. |
Gigabit Ethernet | Support for 1000 Mbps (gigabit) Ethernet. | Provides access to high-speed Ethernet interfaces. | Gigabit interface cards do not provide information for the extended show interface command counters. Gigabit Ethernet uses the same MTU as regular Ethernet. |
Graphical User Interface with | Provides a management interface from Windows NT, Windows 95, or Solaris web browsers. | Lets you configure the PIX Firewall via GUI interface rather than the command line interface. | Limits access of the HTML interface to specified client systems within the inside network (based on source address) and is password protected. |
Identity | Allows address translation to be disabled. | If existing internal systems have valid globally unique addresses, the Identity feature allows NAT and PAT to be selectively disabled for these systems. | Makes internal network addresses visible to the outside network.
|
IPSec | Provides Virtual Private Network (VPN) access via digital certificates or pre-shared or manual keys. | Encrypts data between peers. | Works with VPN clients, routers, and another PIX Firewall. With IPSec, you can manage the PIX Firewall remotely. |
Java Filtering | Lets an administrator prevent Java applets from being downloaded by an inside system. | Java applets are executable programs that are banned within some security policies. | Java programs can provide a vehicle through which an inside system can be invaded. |
Provides safe access for Simple Mail Transfer Protocol (SMTP) connections from the outside to an inside electronic mail server. | Allows a single mail server to be deployed within the internal network without it being exposed to known security problems with some SMTP server implementations. Avoids the need for an external mail relay (or bastion host) system. | Enforces a safe minimal set of SMTP commands to avoid an SMTP server system from being compromised. Also logs all SMTP connections. | |
Memory upgrade | Lets PIX Firewall work more effectively. 16 MB of RAM is the minimum; 32 MB is recommended. | Permits more simultaneous connections through the PIX Firewall with the memory upgrade. | Requires PIX Firewall software version 4.2 and later. |
Multiple Interfaces | Additional network interfaces can be added to the PIX Firewall. | Takes the place of multiple PIX Firewall units in a single chassis. | Provides Adaptive Security for perimeter interfaces. |
Multimedia Support | The PIX Firewall supports multimedia applications including RealAudio, Streamworks, CU-SeeMe, Internet Phone, IRC, H.323, Vxtreme and VDO Live. | Users increasingly make use of a wide range of multimedia applications, many of which require special handling in a firewall environment. The PIX Firewall handles these without requiring client reconfiguration and without becoming a performance bottleneck. | Support for protocols can be disabled using access-lists if required. |
Supports NETBIOS over IP connections from the inside network to the outside network. | Allows Microsoft client systems, such as Windows 95, within the inside network, possibly using NAT, to access servers, such as Windows NT, located within the outside network. This enables security policies to encompass Microsoft environments across the Internet and inside an intranet. | Allows access controls native to the Microsoft environment. | |
Network Address Translation (NAT) | For inside systems, translates the source IP address of outgoing packets per RFC 1631. Supports both dynamic and static translation. | Allows inside systems to be assigned private addresses (defined in RFC 1918), or to retain existing invalid addresses. | Hides the real network identity of internal systems from the outside network. |
PIX 506 | The PIX 506 provides a simplified PIX Firewall with two Ethernet 10BaseT interfaces, 32 MB RAM memory, and 8 MB of Flash memory. | The RAM and Flash memory are not upgradeable, which provides a low-cost firewall that works well in corporate intranets or small businesses. Supports all PIX Firewall functionality except failover. | Uses 10BaseT on both interfaces. Permits flexible routing. Is not affected by network ingress filter DoS attacks. |
PIX 515 | The PIX 515 provides an entry into the low-cost firewall market. Three interfaces are permitted with the R (restricted) license and up to 6 with the UR (unrestricted) license. One of the two PCI slots can contain a 4-port Ethernet board. | The PIX 515 only supports Ethernet interfaces for the inside and outside interfaces. | |
Port Address Translation (PAT) | By using port remapping, a single valid IP address can support source | PAT minimizes the number of globally valid IP addresses required to support private or invalid internal addressing schemes. Will not work with multimedia applications that have an inbound data stream different from the outgoing control path. | Hides the real network identity of internal systems from the outside network. |
PPTP | Point-to-Point Tunneling Protocol (PPTP) is a layer 2 tunneling protocol which lets a remote VPN client use a public IP network to communicate securely with servers protected by PIX Firewall. | Provides VPN client support for use with Windows NT PAP, CHAP, and MS-CHAP authentication. Simpler setup than IPSec. | Considered less secure than IPSec. Works with TACACS+ or RADIUS AAA server to authenticate users. |
Private Link IPSec Accelerator Card | Accelerates IPSec DES processing. | PCI-slot card that accelerates IPSec DES processing. | Does not increase Triple DES performance. Takes up a PCI slot that can be used for a network interface card. |
RAS Version 2 | RAS (Registration, Admission, and Status) handles the increased popularity of multimedia applications such as video conferencing and Voice over IP that require video and audio encoding. | A RAS channel carries bandwidth change, registration, admission, and status messages (following the recommendations in H.225) between endpoints and gatekeepers. | Multimedia applications use a high number of dynamically negotiated data and control channels to handle the various visual and auditory streams. |
RIP Version 2 | RIP (Routing Information Protocol) version 2 provides MD5 authentication of encryption keys. The PIX Firewall only listens in passive mode and/or broadcasts a default route. | Supports Cisco IOS software standards, which conform to RFC 1058, RFC 1388, and RFC 2082 of RIPv2 with text and keyed MD5 authentication. | Allows one key and key ID per PIX Firewall interface. While the key has an infinite lifetime, for best security, you should change the key every two weeks or sooner. The use of Telnet to change the configuration may expose the key and key ID on the network. |
RTSP | Lets PIX Firewall pass RTSP (Real Time Streaming Protocol) packets. RTSP is used by RealAudio, RealNetworks, Apple QuickTime 4, RealPlayer, and Cisco IP/TV connections. | Lets PIX Firewall handle multimedia applications including Cisco IP/TV connections. | PIX Firewall does not yet have the ability to recognize HTTP cloaking where RTSP messages are hidden in the HTTP messages. PIX Firewall does not support NAT with RTSP messages. |
Simplified Installation with Setup Wizard | PIX Firewall Setup Wizard works with a Windows 95 or Windows NT system to simplify the initial configuration. | Speeds the initial setup by guiding you through the process with both on-screen descriptions and associated help files with more detailed information. | Eliminates common configuration problems. |
Six Interfaces | PIX Firewall supports up to six interfaces, four of which are on the optional 4-port Ethernet card. | Can provide a mixed Token Ring and Ethernet environment. | Lets you distribute your network onto separate interfaces that can be protected individually with separate security policies. |
SNMP MIB-II Support | Support for network monitoring via SNMP (Simple Network Management Protocol). | With its SNMP interface, the PIX Firewall integrates into traditional network management environments. | Only supports SNMP GET (read-only) access. |
Syslog Server | Provides syslog server for use on Windows NT system that accepts TCP and UDP syslog messages from PIX Firewall. | Syslog server can provide time stamped syslog messages, accept messages on alternate ports, and be configured to stop PIX Firewall traffic if messages cannot be received. | Can stop PIX Firewall connections if Windows NT syslog server log disk fills or server goes down. |
Provides a command-line interface similar to Cisco IOS software. The Telnet interface lets you remotely manage the PIX Firewall via the console interface. | Enables remote configuration and management of the PIX Firewall console. | Limits access of the Telnet interface to specified client systems within the inside network (based on source address) and is password protected. If the inside network is not secure and sessions on the LAN can be snooped, you should limit use of the Telnet interface. If IPSec is configured, you can also access the PIX Firewall console from the outside interface. | |
TFTP Configuration Server | Provides PIX Firewall configuration via TFTP. | Allows one or more firewalls access to configurations from a central source. | Insecure. Do not use if your security policy prevents sharing privileged information in clear text. |
TFTP Image Downloading | A .bin image you can download from CCO can be downloaded from a host on the inside interface to the PIX Firewall via the Trivial File Transfer Protocol (TFTP). | Lets you manage PIX Firewall .bin images from a remote server and download them as needed. | TFTP does not perform any authentication when transferring files, so a user name and password on the remote host are not required. |
URL Filtering | The PIX Firewall URL filtering is provided in partnership with the NetPartners WebSENSE product. PIX Firewall checks outgoing URL requests with the policy defined on the WebSENSE server, which runs either on Windows NT or UNIX. | Based on the response from the NetPartners WebSENSE server, which matches a request against a list of 17 web site characteristics deemed inappropriate for business use, PIX Firewall either permits or denies the connection. | Because URL filtering is handled on a separate platform, no additional performance burden is placed on the PIX Firewall. Check http://www.websense.com for more information. |
VPN | Utilizes IPSec technology and replaces the previous Private Link software. Can work with Private Link card. | Encrypts data between peers. | Works with VPN clients, Certification Authorities, routers, and other PIX Firewalls. With IPSec, you can manage the PIX Firewall remotely. |
Xauth | Lets you deploy IPSec to remote users to gain the privacy and packet-level authentication available with IPSec. | This feature provides authentication by prompting for user credentials and verifies them with the information stored in Cisco Secure Database in the VPN environment (AAA with VPN). | Extended authentication is negotiated between IKE phase 1 and IKE phase 2 at the same time as mode configuration. Authentication is performed using your existing TACACS+ or RADIUS authentication system. |
XDMCP | XDMCP (X Display Manager Control Protocol). The established command has been enhanced to support this feature. | XWindows TCP back connection fixup negotiates an XWindows session and creates an embryonic connection at destination port 6000. | XDMCP handling is enabled by default, which is the same as other UDP fixups. |
The PIX Firewall separates the details of implementing a security policy from providing network services such as Web, FTP, Telnet, and SMTP.
This section includes the following topics:
A security policy provides the following features:
The following sections describe many of the issues associated with security policies; refer also to RFC 2196 "Site Security Handbook" for more information.
To effectively use a firewall in your organization, you need a security policy to protect your data resources from intrusion. By creating or improving a security policy, you can protect against malicious attack by outsiders and control the effects of errors and equipment failures.
Your security policy needs to ensure that users can only perform tasks they are authorized to do, only obtain information they are authorized to have, and not cause damage to the data, applications, or operating environment of a system.
Before creating a security policy, follow these guidelines:
Step 2 Identify which systems you need to protect from Internet access and which must be visible on the outside network, such as NIC-registered IP addresses. The Network Address Translation (NAT) feature of the PIX Firewall lets you specify that NIC-registered IP addresses are visible on the outside of the firewall or that the inside network IP addresses depend solely on the global pool for translation.
Step 3 Identify which inside servers need to be visible on the outside and perimeter networks and what type of authentication and authorization you require before users can access the servers.
Step 4 Identify which router features you will need to set to accommodate the PIX Firewall in your network.
![]() |
Note When properly configured, the PIX Firewall can secure your network from outside threats. The PIX Firewall is not a turn-key system. You have to program it to identify which hosts can access your inside network and which cannot. It is your responsibility to protect your network. The PIX Firewall will not prevent all forms of security threats, but its features provide you with an arsenal of resources to repel network attacks. The PIX Firewall cannot protect your network from inside attackers. To properly protect against these threats, all persons with access to the inside network should be given only the least privilege and access they require to perform their jobs. This access should be reviewed periodically, and updated if necessary. |
Security measures keep people honest in the same way that locks do.
This section includes the following topics:
Consider who might want to circumvent your security measures and identify their motivations. Determine what they might want to do and the damage that they could cause to your network.
Security measures can never make it impossible for a user to perform unauthorized tasks with a computer system. They can only make it harder.
The goal is to make sure the network security controls are beyond the attacker's ability or motivation.
Security measures almost always reduce convenience, especially for sophisticated users. Security can delay work and create expensive administrative and educational overhead. It can use significant computing resources and require dedicated hardware.
When you design your security measures, understand their costs and weigh those costs against the potential benefits. To do that, you must understand the costs of the measures themselves and the costs and likelihoods of security breaches. If you incur security costs out of proportion to the actual dangers, you have done yourself a disservice.
Every security system has underlying assumptions. For example, you might assume that your network is not tapped, or that attackers know less than you do, that they are using standard software, or that a locked room is safe. Be sure to examine and justify your assumptions. Any hidden assumption is a potential security hole.
Most security is based on secrets. Passwords and encryption keys, for example, are secrets. Too often, though, the secrets are not really all that secret. The most important part of keeping secrets is knowing the areas you need to protect. What knowledge would enable someone to circumvent your system? You should jealously guard that knowledge and assume that everything else is known to your adversaries. The more secrets you have, the harder it will be to keep all of them. Security systems should be designed so that only a limited number of secrets need to be kept.
Many security procedures fail because their designers do not consider how users will react to them. For example, because they can be difficult to remember, automatically generated nonsense passwords are often found written on the undersides of keyboards. For convenience, a secure door that leads to the system's only tape drive is sometimes propped open. For expediency, unauthorized modems are often connected to a network to avoid onerous dial-in security measures.
If your security measures interfere with essential use of the system, those measures will be resisted and perhaps circumvented. To get compliance, you must make sure that users can get their work done, and you must sell your security measures to users. Users must understand and accept the need for security.
Any user can compromise system security, at least to some degree. Passwords, for instance, can often be found simply by calling legitimate users on the telephone, claiming to be a system administrator, and asking for them. If your users understand security issues, and if they understand the reasons for your security measures, they are far less likely to make an intruder's life easier.
At a minimum, users should be taught never to release passwords or other secrets over unsecured telephone lines (especially cellular telephones) or electronic mail (e-mail). Users should be wary of questions asked by people who call them on the telephone. Some companies have implemented formalized network security training for their employees; that is, employees are not allowed access to the Internet until they have completed a formal training program.
Every security system has vulnerabilities. You should understand your system's weak points and know how they could be exploited. You should also know the areas that present the largest danger and prevent access to them immediately. Understanding the weak points is the first step toward turning them into secure areas.
You should create appropriate barriers inside your system so that if intruders access one part of the system, they do not automatically have access to the rest of the system. The security of a system is only as good as the weakest security level of any single host in the system.
Understanding how your system normally functions, knowing what is expected and what is unexpected, and being familiar with how devices are usually used, will help you to detect security problems. Noticing unusual events can help you to catch intruders before they can damage the system. Auditing tools can help you to detect those unusual events.
You should know exactly which software you rely on, and your security system should not have to rely upon the assumption that all software is bug-free or that your firewall can prevent all attacks.
Physical access to a computer, router, or your firewall usually gives a sufficiently sophisticated user total control over that device. Physical access to a network link usually allows a person to tap that link, jam it, or inject traffic into it. It makes no sense to install complicated software security measures when access to the hardware is not controlled.
Almost any change you make in your system may have security effects. This is especially true when new services are created. Administrators, programmers, and users should consider the security implications of every change they make. Understanding the security implications of a change is something that takes practice. It requires lateral thinking and a willingness to explore every way in which a service could potentially be manipulated.
If your PIX Firewall has two interfaces, deciding which interface does what is straight forward---the inside is the network you want to protect and the outside is unprotected. With three or four interfaces, the decision becomes more difficult.
PIX Firewall has the following conditions for interface use:
With these conditions and the needs of your security policy, you can decide which network to connect to each interface.
This section includes the following topics, which provide valuable information you need before starting to configure PIX Firewall from its command line:
The PIX Firewall contains a command set based on Cisco IOS technologies, which provides three administrative access modes:
You can abbreviate most commands down to the fewest unique characters for a command; for example, you can enter wr t to view the configuration instead of entering the full command write terminal, or you can enter en to start privileged mode and con t to start configuration mode.
In addition, you can enter 0 to represent 0.0.0.0.
You should back up your configuration in at least one of the following ways:
Each image you store overwrites the last stored image.
Should the need arise, you can restore your configuration from Flash memory with the configure memory command, or from diskette with the configure floppy command.
PIX Firewall uses the same command line editing conventions as Cisco IOS software. You can view all previously entered commands with the show history command or individually with the up arrow or ^p command. Once you have examined a previously entered command, you can move forward in the list with the down arrow or ^n command. When you reach a command you wish to reuse, you can edit it or press the Enter key to start it. You can also delete the word to the left of the cursor with ^w, or erase the line with ^u.
PIX Firewall permits up to 512 characters in a command; additional characters are ignored.
On commands such as help or ?, show, show xlate, or other commands that provide long listings, you can determine if the information displays a screenful and pauses, or lets the command run to completion. The pager command lets you choose the number of lines to display before the More prompt appears.
When paging is enabled, the following prompt appears:
<--- More --->
The More prompt uses syntax similar to the UNIX more command:
You can precede a line with a colon (:) to create a comment. However, the comment only appears in the command history buffer and not in the configuration. Therefore, you can view the comment with the show history command or by pressing an arrow key to retrieve a previous command, but because the comment is not in the configuration, the write terminal command does not display it.
The maximum size of a configuration is 350 KB. This is true for the PIX 515, the PIX 520, and any previous PIX Firewall models. Use the UNIX wc command or a Windows word processing program, such as Microsoft Word, to view the number of characters in the configuration.
PIX Firewall provides a default configuration on the bootable system disk that automatically provides the commands described in this section. This section also describes how to utilize the commands as you create a new configuration or augment an existing configuration.
After you start writing or changing the PIX Firewall configuration as described in "Configuring the PIX Firewall," you can view the default configuration with the write terminal command. The default configuration commands follow:
The number of commands listed when you use the question mark or help command differs by access mode so that unprivileged mode offers the least commands and configuration mode offers the greatest number of commands.
In addition, you can enter any command by itself on the command line and then press Enter to view the command syntax.
For the PIX Firewall commands that accept network masks, specify the correct mask for a network address. For hosts, use 255.255.255.255. However, for the ip address command, use a network mask, and for the global command, use a network address for both PAT addresses and when specifying a pool of global addresses.
For the conduit and access-list commands, precede host addresses with the host parameter and without specifying a mask.
The following are examples of commands in which a mask can be specified:
ip address inside 10.1.1.1 255.255.255.0 ip address outside 209.165.201.1 255.255.255.224 nat (inside) 1 10.1.1.0 255.255.255.0 global (outside) 1 209.165.201.2 netmask 255.255.255.224 static (inside,outside) 209.165.201.3 10.1.1.3 netmask 255.255.255.255 access-list acl_out permit tcp any host 209.165.201.3 eq www aaa authentication include http outside 209.165.201.3 255.255.255.255 0 0 TACACS+ route outside 0 0 209.165.201.4 1 telnet 10.1.1.2 255.255.255.255
In these examples, the ip address commands specify addresses for the inside and outside network interfaces. The ip address command only uses network masks. The inside interface is a Class A address, but only the last octet is used in the example network and therefore has a Class C mask. The outside interface is part of a subnet so the mask reflects the .224 subnet value.
The nat command lets users start connections from the inside network. Because a network address is specified, the class mask specified by the ip address inside command is used.
The global command provides a PAT (Port Address Translation) address to handle the translated connections from the inside. The global address is also part of the subnet and contains the same mask specified in the ip address outside command.
The static command maps an inside host to a global address for access by outside users. Host masks are always specified as 255.255.255.255.
The access-list command permits any outside host to access the global address specified by the static command. The host parameter is the same as if you specified 209.165.201.3 255.255.255.255.
The aaa command indicates that any users wishing to access the global address must be authenticated. Because authentication only occurs when users access the specified global which is mapped to a host, the mask is for a host. The "0 0" entry indicates any host and its respective mask.
The route statement specifies the address of the default router. The "0 0" entry indicates any host and its respective mask.
The telnet command specifies a host that can access the PIX Firewall unit's console using Telnet. Because it is a single host, a host mask is used.
If you are using subnet masks, refer to Appendix D, "Subnet Masking and Addressing" to be sure that each IP address you choose for global or static addresses is in the correct subnet.
The following literal names can be used instead of a numerical port value in command lines:
PIX Firewall permits the following TCP literal names: bgp, chargen, cmd, daytime, discard, domain, echo, exec, finger, ftp, ftp-data, gopher, h323, hostname, http, ident, irc, klogin, kshell, lpd, nntp, pop2, pop3, pptp, rpc, smtp, sqlnet, sunrpc, tacacs, talk, telnet, time, uucp, whois, and www.
![]() |
Note PIX Firewall uses port 1521 for SQL*Net. This is the default port used by Oracle for SQL*Net; however, this value does not agree with IANA port assignments. |
![]() |
Note PIX Firewall listens for RADIUS on ports 1645 and 1646. If your RADIUS server uses ports 1812 and 1813, you will need to reconfigure it to listen on ports 1645 and 1646. |
Permitted UDP literal names are biff, bootpc, bootps, discard, dnsix, echo, mobile-ip, nameserver, netbios-dgm, netbios-ns, ntp, rip, snmp, snmptrap, sunrpc, syslog, tacacs, talk, tftp, time, who, and xdmcp.
![]() |
Note To assign a port for DNS access, use domain, not dns. The dns keyword translates into the port value for dnsix. |
Port numbers can be viewed online at the IANA site:
Table 1-2 lists the literal values.
| Literal | Value | Description |
|---|---|---|
bgp | 179 | Border Gateway Protocol, RFC 1163 |
biff | 512 | Used by mail system to notify users that new mail is received |
bootpc | 68 | Bootstrap Protocol Client |
bootps | 67 | Bootstrap Protocol Server |
chargen | 19 | Character Generator |
cmd | 514 | Similar to exec except that cmd has automatic authentication |
daytime | 13 | Day time, RFC 867 |
discard | 9 | Discard |
domain | 53 | DNS (Domain Name System) |
dnsix | 195 | DNSIX Session Management Module Audit Redirector |
echo | 7 | Echo |
exec | 512 | Remote process execution |
finger | 79 | Finger |
ftp | 21 | File Transfer Protocol (control port) |
ftp-data | 20 | File Transfer Protocol (data port) |
gopher | 70 | Gopher |
hostname | 101 | NIC Host Name Server |
nameserver | 42 | Host Name Server |
ident | 113 | Ident authentication service |
irc | 194 | Internet Relay Chat protocol |
isakmp | 500 | ISAKMP |
klogin | 543 | KLOGIN |
kshell | 544 | Korn Shell |
lpd | 515 | Line Printer Daemon - printer spooler |
login | 513 | Remote login |
mobile-ip | 434 | MobileIP-Agent |
netbios-ns | 137 | NETBIOS Name Service |
netbios-dgm | 138 | NETBIOS Datagram Service |
nntp | 119 | Network News Transfer Protocol |
ntp | 123 | Network Time Protocol |
pim-auto-rp | 496 | Protocol Independent Multicast, reverse path flooding, dense mode |
pop2 | 109 | Post Office Protocol - Version 2 |
pop3 | 110 | Post Office Protocol - Version 3 |
radius | 1645, 1646 | Remote Authentication Dial-In User Service |
rip | 520 | Routing Information Protocol |
smtp | 25 | Simple Mail Transport Protocol |
snmp | 161 | Simple Network Management Protocol |
snmptrap | 162 | Simple Network Management Protocol - Trap |
sqlnet | 1521 | Structured Query Language Network |
sunrpc | 111 | Sun RPC (Remote Procedure Call) |
syslog | 514 | System Log |
tacacs | 49 | TACACS+ (Terminal Access Controller Access Control System Plus) |
talk | 517 | Talk |
telnet | 23 | RFC 854 Telnet |
tftp | 69 | Trivial File Transfer Protocol |
time | 37 | Time |
uucp | 540 | UNIX-to-UNIX Copy Program |
who | 513 | Who |
whois | 43 | Who Is |
www | 80 | World Wide Web |
xdmcp | 177 | X Display Manager Control Protocol, used to communicate between X terminals and workstations running UNIX |
Possible literal values are ahp, eigrp, esp, gre, icmp, igmp, igrp, ip, ipinip, ipsec, nos, ospf, pcp, snp, tcp, and udp. You can also specify any protocol by number. The esp and ah protocols only work in conjunction with Private Link.
![]() |
Note PIX Firewall does not pass multicast packets. Many routing protocols use multicast packets to transmit their data. If you need to send routing protocols across the PIX Firewall, configure the routers with the Cisco IOS software neighbor command. Cisco considers it inherently dangerous to send routing protocols across the PIX Firewall. If the routes on the unprotected interface are corrupted, the routes transmitted to the protected side of the firewall will pollute routers there as well. |
Table 1-3 lists the numeric values for the protocol literals.
| Literal | Value | Description |
|---|---|---|
ah | 51 | Authentication Header for IPv6, RFC 1826 |
eigrp | 88 | Enhanced Interior Gateway Routing Protocol |
esp | 50 | Encapsulated Security Payload for IPv6, RFC 1827 |
gre | 47 | General Routing Encapsulation |
icmp | 1 | Internet Control Message Protocol, RFC 792 |
igmp | 2 | Internet Group Management Protocol, RFC 1112 |
igrp | 9 | Interior Gateway Routing Protocol |
ip | 0 | Internet Protocol |
ipinip | 4 | IP-in-IP encapsulation |
nos | 94 | Network Operating System (Novell's NetWare) |
ospf | 89 | Open Shortest Path First routing protocol, RFC 1247 |
pcp | 108 | Payload Compression Protocol |
snp | 109 | Sitara Networks Protocol |
tcp | 6 | Transmission Control Protocol, RFC 793 |
udp | 17 | User Datagram Protocol, RFC 768 |
Protocol numbers can be viewed online at the IANA site:
PIX Firewall supports the following multimedia and video conferencing applications:
PIX Firewall supports the following TCP/IP protocols and applications:
If after reading the documentation, a problem still exists, view the PIX Firewall tips at:
http://www.cisco.com/warp/public/110/index.shtml
If you need additional help, you can place a call to Cisco's Technical Assistance Center (TAC).
Before contacting Cisco's TAC, perform the following tasks:
Refer to "Step 10 - Check the Configuration" in "Configuring the PIX Firewall," for troubleshooting information.
Describing how a firewall interacts with your network requires a different set of terms than may be used in other types of computing or than in other networking applications. This guide uses these terms:
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Sun May 21 18:03:17 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.