|
|
This chapter includes the following sections:
![]() |
Note For IPSec configuration information, refer to the IPSec User Guide for the Cisco Secure PIX Firewall Version 5.2. |
Support for DHCP (Dynamic Host Configuration Protocol) server and DHCP client within the PIX Firewall is now available. DHCP is a protocol that supplies automatic configuration parameters to Internet hosts. This protocol has two components:
A DHCP server is simply a computer that provides configuration parameters to a DHCP client, and a DHCP client is a computer or network device that uses DHCP to obtain network configuration parameters.
The primary purpose of implementing the DHCP server and DHCP client features into the PIX Firewall is to significantly simplify the configuration of a PIX 506 unit.
This section includes the following topics:
DHCP client support within the PIX Firewall is designed for use within a small office or home office (SOHO) environment using a PIX 506 unit that is directly connected to a DSL or cable modem that supports the DHCP server function. With the DHCP client feature enabled on a PIX Firewall, the PIX Firewall functions as a DHCP client to a DHCP server allowing the server to configure the unit's enabled interface with an IP address, subnet mask, and optionally a default route.
![]() |
Note Use of the DHCP client feature to acquire an IP address from a generic DHCP server is not supported. |
![]() |
Note The PIX Firewall DHCP client does not support failover configurations. |
To support the DHCP client feature within the PIX Firewall, the following enhancements were made:
The ip address dhcp command enables the DHCP client feature on the specified PIX Firewall interface. The optional setroute argument tells the PIX Firewall to set the default route using the default gateway parameter the DHCP server returns.
The debug dhcpc commands provide debugging tools for the enabled DHCP client feature.
The PIX Firewall commands used to implement the DHCP client are described in the ip address command page and the debug command page within "Command Reference." Refer to these command pages for more information.
To enable the DHCP client feature on a given PIX Firewall interface and set the default route via the DHCP server, configure the ip address dhcp setroute command as part of your entire PIX Firewall configuration, including the setroute option. Specify the name of the interface on which the DHCP client will be enabled.
DHCP server support within the PIX Firewall is designed for use within a remote home or branch office (ROBO) environment using a PIX 506 unit. Connecting to the PIX 506 unit are PC clients and other network devices (DHCP clients) that establish network connections that are either nonsecure (not encrypted) or secure (encrypted using IPSec) to access an enterprise or corporate network. As a DHCP server, the PIX Firewall provides network configuration parameters to the DHCP clients through the use of DHCP. These configuration parameters provide a DHCP client the networking parameters used to access the enterprise network, and once in the network, the network services to use, such as the DNS server.
![]() |
Note The PIX Firewall DHCP server does not support BOOTP requests and failover configurations. |
The PIX Firewall commands used to implement the DHCP server feature are described in the dhcpd command page and the debug command page within "Command Reference." Refer to these command pages for more information.
Be sure to configure the IP address and the subnet mask of the inside interface using the ip address command prior to enabling the DHCP server feature.
Follow these steps to enable the DHCP server feature on a given PIX Firewall interface.
(Steps 1 and 6 are required.)
dhcpd address 10.0.1.101-10.0.1.110 inside
Step 2 (Optional) Specify the IP address(es) of the DNS server(s) the client will use. You can specify up to two DNS servers. For example:
dhcpd dns 209.165.201.2 209.165.202.129
Step 3 (Optional) Specify the IP address(es) of the WINS server(s) the client will use. You can specify up to two WINS servers. For example:
dhcpd wins 209.165.201.5
Step 4 Specify the lease length to grant the client. This lease equals the amount of time (in seconds) the client can use its allocated IP address before the lease expires. The default value is 3,600 seconds. For example:
dhcpd lease 3000
Step 5 (Optional) Configure the domain name the client will use. For example:
dhcpd domain example.com
Step 6 Enable the DHCP daemon within the PIX Firewall to listen for DHCP client requests on the enabled interface. Currently, you can only enable the DHCP server feature on the inside interface, which is the default. For example:
dhcpd enable inside
Here is the sample configuration stemming from the steps configured previously:
! set the ip address of the inside interface ip address inside 10.0.1.2 255.255.255.0 ! configure the network parameters the client will use once in the corporate network and dhcpd address 10.0.1.101-10.0.1.110 dhcpd dns 209.165.201.2 209.165.202.129 dhcpd wins 209.165.201.5 dhcpd lease 3000 dhcpd domain example.com ! enable dhcp server daemon on the inside interface dhcpd enable inside
The following example shows the configuration of a DHCP address pool and a DNS server address with the inside interface being enabled for the DHCP server feature:
dhcpd address 10.0.1.100-10.0.1.108 dhcpd dns 209.165.200.227 dhcpd enable
The following is a partial configuration example of the DHCP server and IPSec features configured on a PIX 506 that is within a remote office. The PIX 506 unit's VPN peer is another PIX Firewall that has an outside interface IP address of 209.165.200.228 and functions as a gateway for a corporate network.
! configure interface ip address ip address outside 209.165.202.129 255.255.255.0 ip address inside 172.17.1.1 255.255.255.0 ! configure ipsec with corporate pix access-list ipsec-peer permit ip 172.17.1.0 255.255.255.0 192.168.0.0 255.255.255.0 ipsec transform-set myset esp-des esp-sha-hmac crypto map mymap 10 ipsec-isakmp crypto map mymap 10 match address ipsec-peer crypto map mymap 10 set transform-set myset crypto map mymap 10 set peer 209.165.200.228 crypto map mymap interface outside sysopt connection permit-ipsec nat (inside) 0 access-list ipsec-peer isakmp policy 10 authentication preshare isakmp policy 10 encryption des isakmp policy 10 hash sha isakmp policy 10 group 1 isakmp policy 10 lifetime 3600 isakmp key 12345678 address 0.0.0.0 netmask 0.0.0.0 isakmp enable outside !configure dhcp server address dhcpd address 172.17.1.100-172.17.1.109 dhcpd dns 192.168.0.20 dhcpd wins 192.168.0.10 dhcpd lease 3000 dhcpd domain example.com ! enable dhcp server on inside interface dhcpd enable ! use outside interface ip as PAT global address nat (inside) 1 0 0 global (outside) 1 interface
Failover lets you add a second PIX Firewall unit that takes control if the Primary unit fails.
This section includes the following topics:
A failover configuration example is provided in "Failover Configuration" in "Configuration Examples."
![]() |
Note The PIX 506 cannot be used for failover, either as the Primary or Secondary unit. |
![]() |
Note The PIX 515 can only be used for failover if you have the optional "UR" license. Similarly, the PIX 525 can only be used for failover if you have the optional "UR" license. |
Failover lets you connect a second PIX Firewall unit to your network to protect your network should the first unit go offline. If you use Stateful Failover, you can maintain operating state for non-HTTP connections during the failover from the Primary unit to the Standby unit.
When a failover occurs, each unit changes state. The unit that activates assumes the IP and MAC addresses of the previously Active unit and begins accepting traffic. The new Standby unit assumes the failover IP and MAC addresses of the unit that was previously the Active unit. Because network devices see no change in these addresses, no ARP entries change or time out anywhere on the network.
Failover requires you to purchase a second PIX Firewall unit sold as a failover unit that only works as a failover unit. You need to ensure that both units have the same software version, activation key type, Flash memory, and the same RAM. Once you configure the Primary unit and attach the necessary cabling, the Primary unit automatically copies the configuration over to the Standby unit.
The ACT indicator light on the front of the PIX 515 and PIX 525 is on when the unit is the Active failover unit. If failover is not enabled, this light is on. If failover is present, the light is on when the unit is the Active unit and off when the unit is the Standby unit.
Failover works with Ethernet, Token Ring, Gigabit, or FDDI interfaces. However, the Stateful Failover interface must be full duplex 100 Mbps Ethernet. A PIX Firewall unit equipped with FDDI interfaces cannot use Stateful Failover.
The failover feature causes the PIX Firewall to ARP for itself every 15 seconds (depending on the time set with the failover poll command). This ARPing can only be stopped by disabling failover.
Cabling the two PIX Firewall units together requires connecting a high-speed serial cable for communications, a dedicated full duplex 100 Mbps Ethernet connection if you are using Stateful Failover, and attaching all interfaces between the two units.
Configuring the Primary PIX Firewall for failover requires you to configure the failover command to enable failover, the failover ip address command to assign IP addresses to the Standby unit, and the failover link command to enable Stateful Failover.
![]() |
Note Refer to "Additional Failover Information" for information on Stateful Failover, how failover occurs, and frequently asked questions. |
For failover, both PIX Firewall units must be the same model number, have at least as much RAM, have the same Flash memory size, and be running the same software version.
![]() |
Note If you have already powered on the Standby unit, power it off and leave it off until instructed in the steps that follow. |
Follow these steps to configure failover:
Step 2 Ensure that all active network interfaces are connected between both units.
Step 3 Connect the failover cable to the Primary PIX Firewall unit ensuring that the end of the cable marked "Primary" attaches to the Primary unit and that the end marked "Secondary" connects to the Secondary unit.
Step 4 Only configure the Primary unit. Changes made to the Standby unit are not copied to the Primary unit and are lost during the next reboot. When you are done configuring the PIX Firewall and enter the write memory command to save the configuration to Flash memory, the Primary unit automatically updates the Secondary unit.
![]() |
Note Do not power on the Secondary unit until instructed. First configure the Primary unit and then power on the Secondary unit only when instructed to do so. |
Step 5 Enter configuration mode with the configure terminal command.
Step 6 Ensure that you have not used the auto or the 1000auto option in any interface command in your configuration. To view interface commands in your configuration, use the write terminal command. Reenter an interface with new information to correct a command you wish to change. Always specify the speed for the interface, such as 10baset for 10 Mbps or 100basetx for 100 Mbps. Ensure that the same speeds and duplexes are the same for any devices on the subnets including switches and routers.
Step 7 If you are using Stateful Failover, set the Stateful Failover dedicated interface to 100 Mbps full duplex using the 100full option to the interface command. This is extremely important and must be performed even if you are using a crossover connector to connect the PIX Firewall units directly to each other.
Step 8 Use the clear xlate command after changing the interface command.
Step 9 If you have not done so already, use the ip address command statement to assign IP addresses to each interface on the Primary unit. If you make a mistake while entering an ip address command, reenter the command again correctly.
Use the show ip address command to view the addresses you specified:
show ip address
System IP Addresses:
ip address outside 192.168.1.1 255.255.255.0
ip address inside 10.1.1.1 255.255.255.0
ip address intf2 192.168.2.1 255.255.255.0
ip address intf3 192.168.3.1 255.255.255.0
ip address 4th 172.16.1.1 255.255.255.0
Current IP Addresses:
ip address outside 192.168.1.1 255.255.255.0
ip address inside 10.1.1.1 255.255.255.0
ip address intf2 192.168.2.1 255.255.255.0
ip address intf3 192.168.3.1 255.255.255.0
ip address 4th 172.16.1.1 255.255.255.0
The Current IP Addresses are the same as the System IP Addresses on the failover Active unit. When the Primary unit fails, the Current IP Addresses become those of the Standby unit.
Step 10 Use the failover command statement to enable failover on the Primary unit.
Step 11 Use the show failover command to verify that the Primary unit is enabled by checking for the following statement:
This host: Primary - Active
An example of the show failover command is as follows:
show failover
Failover On
Cable status: Other side powered off
Reconnect timeout 0:00:00
Poll frequency 15 seconds
This host: Primary - Active
Active time: 225 (sec)
Interface 4th (172.16.1.1): Normal (Waiting)
Interface intf3 (192.168.3.1): Normal (Waiting)
Interface intf2 (192.168.2.1): Normal (Waiting)
Interface outside (192.168.1.1): Normal (Waiting)
Interface inside (10.1.1.1): Normal (Waiting)
Other host: Secondary - Standby
Active time: 0 (sec)
Interface 4th (0.0.0.0): Unknown (Waiting)
Interface intf3 (0.0.0.0): Unknown (Waiting)
Interface intf2 (0.0.0.0): Unknown (Waiting)
Interface outside (0.0.0.0): Unknown (Waiting)
Interface inside (0.0.0.0): Unknown (Waiting)
The Cable Status that displays with the show failover command has these values:
The failover interface flags appear to the right of each interface's IP address in the show failover display. The failover flags indicate the following:
Step 12 Enter a failover ip address command statement for each interface to specify the Standby unit's interface addresses. It is not necessary for the two units to be configured for this command to work correctly. The IP addresses on the Standby unit are different from the Active unit's addresses, but must be in the same subnet for each interface. The following example sets the IP addresses for the interfaces on the Standby unit:
failover ip address inside 10.1.1.2 failover ip address outside 192.168.1.2 failover ip address intf2 192.168.2.2 failover ip address intf3 192.168.3.2 failover ip address 4th 172.16.1.2
Use the show failover command and you can see that the Secondary unit now has IP addresses for each interface:
show failover
Failover On
Cable status: Other side powered off
Reconnect timeout 0:00:00
Poll frequency 15 seconds
This host: Primary - Active
Active time: 510 (sec)
Interface 4th (172.16.1.1): Normal (Waiting)
Interface intf3 (192.168.3.1): Normal (Waiting)
Interface intf2 (192.168.2.1): Normal (Waiting)
Interface outside (192.168.1.1): Normal (Waiting)
Interface inside (10.1.1.1): Normal (Waiting)
Other host: Secondary - Standby
Active time: 0 (sec)
Interface 4th (172.16.1.2): Unknown (Waiting)
Interface intf3 (192.168.3.2): Unknown (Waiting)
Interface intf2 (192.168.2.2): Unknown (Waiting)
Interface outside (192.168.1.2): Unknown (Waiting)
Interface inside (10.1.1.2): Unknown (Waiting)
Step 13 If you are configuring Stateful Failover, use the failover link command to specify the name of the dedicated interface you are using. For example, assume the "4th" interface will be used for Stateful Failover and enter the following command:
failover link 4th
Step 14 After enabling Stateful Failover, use the show failover command and additional information is provided as follows:
show failover
Failover On
Cable status: Other side powered off
Reconnect timeout 0:00:00
Poll frequency 15 seconds
This host: Primary - Active
Active time: 510 (sec)
Interface 4th (172.16.1.1): Normal (Waiting)
Interface intf3 (192.168.3.1): Normal (Waiting)
Interface intf2 (192.168.2.1): Normal (Waiting)
Interface outside (192.168.1.1): Normal (Waiting)
Interface inside (10.1.1.1): Normal (Waiting)
Other host: Secondary - Standby
Active time: 0 (sec)
Interface 4th (172.16.1.2): Unknown (Waiting)
Interface intf3 (192.168.3.2): Unknown (Waiting)
Interface intf2 (192.168.2.2): Unknown (Waiting)
Interface outside (192.168.1.2): Unknown (Waiting)
Interface inside (10.1.1.2): Unknown (Waiting)
Stateful Failover Logical Update Statistics
Link : 4th
Stateful Obj xmit xerr rcv rerr
General 0 0 0 0
sys cmd 0 0 0 0
up time 0 0 0 0
xlate 0 0 0 0
tcp conn 0 0 0 0
udp conn 0 0 0 0
ARP tbl 0 0 0 0
RIP Tbl 0 0 0 0
Logical Update Queue Information
Cur Max Total
Recv Q: 0 0 0
Xmit Q: 0 0 0
The items in the top row of the "Stateful Failover Logical Update Statistics" section of the show failover command are as follows:
The items in the first column provide an object static count for each statistic:
The items in the "Logical Update Queue Information" list the current, maximum, and total number of packets in the receive (Recv) and transmit (Xmit) queues.
Step 15 If you want to set a time shorter than 15 seconds for the units to exchange "hello" packets to ensure each unit is available, use the failover poll seconds command. The default is 15 seconds. The minimum value is 3 seconds and the maximum is 15 seconds. Set to a lower value for Stateful Failover. With a faster poll time, PIX Firewall can detect failure and trigger failover faster. However, faster detection may cause unnecessary switchovers when the network is temporarily congested or a network card starts slowly.
Step 16 Power on the Secondary unit. As soon as the Secondary unit starts, the Primary unit recognizes it and starts synchronizing the configurations. As the configurations synchronize, the messages "Sync Started" and "Sync Completed" appear.
Step 17 After the Standby unit comes up, use the show failover command on the Primary unit to verify status:
show failover
Failover On
Cable status: Other side powered off
Reconnect timeout 0:00:00
Poll frequency 15 seconds
This host: Primary - Active
Active time: 510 (sec)
Interface 4th (172.16.1.1): Normal
Interface intf3 (192.168.3.1): Normal
Interface intf2 (192.168.2.1): Normal
Interface outside (192.168.1.1): Normal
Interface inside (10.1.1.1): Normal
Other host: Secondary - Standby
Active time: 0 (sec)
Interface 4th (172.16.1.2): Normal
Interface intf3 (192.168.3.2): Normal
Interface intf2 (192.168.2.2): Normal
Interface outside (192.168.1.2): Normal
Interface inside (10.1.1.2): Normal
Stateful Failover Logical Update Statistics
Link : 4th
Stateful Obj xmit xerr rcv rerr
General 0 0 0 0
sys cmd 0 0 0 0
up time 0 0 0 0
xlate 0 0 0 0
tcp conn 0 0 0 0
udp conn 0 0 0 0
ARP tbl 0 0 0 0
RIP Tbl 0 0 0 0
Logical Update Queue Information
Cur Max Total
Recv Q: 0 0 0
Xmit Q: 0 0 0
Step 18 Use the write memory command to save the Primary unit's configuration to Flash memory and to synchronize the configuration on the Standby unit with the Primary unit.
Follow these steps to verify that the configuration was successful:
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v52/index.htm
Additional information on syslog is available on the logging command page in "Command Reference."
To enable logging to a server with the example address 10.1.1.5 on the inside interface, use these commands:
logging host inside 10.1.1.5 logging trap debugging logging on
The logging trap debugging command statement lets all levels of syslog messages be sent, which can produce a large number of messages on a system in production, but is very helpful for debugging. When you are done testing failover, use the logging trap error command to reduce the number of syslog messages to only those messages displaying an alert, critical condition, or error.
Step 2 Test the Secondary unit by turning off the Primary unit.
Step 3 Use the show failover command to verify that the Secondary unit is now active.
Step 4 Use FTP to send a file between hosts on different interfaces.
Step 5 Use the show interface command to verify that traffic is being processed.
Step 6 You can also use the debug fover option command. Choose an option from the following:
Option | Description |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Step 7 When ready, power on the Primary unit and it will take over automatically as the Active unit.
Use the steps that follow to upgrade failover from versions 4.2 and later:
Step 2 Insert the PIX Firewall version's diskette into the Primary unit. Enter the reload command at the Primary unit.
Step 3 As the Primary unit reboots, PIX Firewall prompts you to write the image to Flash memory. Before entering a reply, read the next three substeps and be ready to move quickly to complete them. When ready, enter y for yes at the prompt.
a. Immediately remove the diskette from the Primary unit and insert it into the Standby unit. Locate the reset button on the front of the Standby unit.
b. When the PIX Firewall Cisco banner appears on the Primary unit's console, press the reset button on the Standby unit to load the new image.
c. On the Primary unit, enter the show failover command to make sure the Primary unit is active and the Secondary unit is in Standby mode after the upgrade of the Primary unit.
Step 4 Wait for the Standby unit to finish booting. Once the Standby unit is up, the two units synchronize during which time the Primary unit's console does not accept input. On the Standby unit, use the show failover command to monitor progress. When both PIX Firewall units report Normal, the replication is done.
Step 5 On each unit, enter the write memory command to store the new images in Flash memory. The Primary unit is the Active unit now.
This section includes the following topics:
Both units in a failover pair communicate through the failover cable, which is a modified RS-232 serial link cable that transfers data at 117,760 baud (115K). The data provides the unit identification of Primary or Secondary, the power status of the other unit, and serves as a communication link for various failover communications between the two units.
The two units send special failover "hello" packets to each other over all network interfaces and the failover cable every 15 seconds. The failover poll seconds command lets you determine how long failover waits before sending special failover "hello" packets between the Primary and Standby units over all network interfaces and the failover cable. The default is 15 seconds. The minimum value is 3 seconds and the maximum is 15 seconds. Set to a lower value for Stateful Failover. With a faster poll time, PIX Firewall can detect failure and trigger failover faster. However, faster detection may cause unnecessary switchovers when the network is temporarily congested or a network card starts slowly.
The failover feature in PIX Firewall monitors failover communication, the power status of the other unit, and hello packets received at each interface. If two consecutive hello packets are not received within a time determined by the failover feature, failover starts testing the interfaces to determine which unit has failed, and transfers active control to the Standby unit.
You can choose the Stateful Failover option if you have 100 Mbps LAN interfaces so that connection states are automatically relayed between the two units.If you are using Stateful Failover, connection states are relayed from the Primary unit to the Secondary unit. Without Stateful Failover, the Standby unit does not maintain the state information of each connection. This means that all active connections will be dropped when failover occurs and that client systems must reestablish connections.
If a failure is due to a condition other than a loss of power on the other unit, failover will begin a series of tests to determine which unit failed. This series of tests will begin when "hello" messages are not heard for two consecutive 15-second intervals (the interval depends on how you set the failover poll command). Hello messages are sent over both network interfaces and the failover cable.
The purpose of these tests is to generate network traffic in order to determine which (if either) unit has failed. At the start of each test, each unit clears its received packet count for its interfaces. At the conclusion of each test, each unit looks to see if it has received any traffic. If it has, the interface is considered operational. If one unit receives traffic for a test and the other unit does not, the unit that received no traffic is considered failed. If neither unit has received traffic, then go to the next test.
![]() |
Note If the failover IP address has not been set, failover does not work, and the Network Activity, ARP, and Broadcast ping tests are not performed. |
Failover uses the following tests to determine if the other unit is available:
The two PIX Firewall units must be configured exactly the same and running the same software release. Configuration replication occurs over the failover cable from the Active unit to the Standby unit in three ways:
The configuration replication only occurs from memory to memory. After replication, use the write memory command to write the configuration into Flash memory. Because the failover cable is used, the replication can take a long time to complete with a large configuration. If a switchover occurs during the replication, the new Active unit will have a partial configuration. The unit will reboot itself to recover the configuration from the Flash or re-synchronize with the other unit. When the replication starts, the PIX Firewall console displays the message "Sync Started," and when complete, displays the message "Sync Completed." During the replication, information cannot be entered on the PIX Firewall console.
The Stateful Failover feature passes per-connection stateful information to the Standby unit. After a failover occurs, the same connection information is available at the new Active unit. End user applications are not required to do a reconnect to keep the same communication session.
The state information passed to the Standby unit includes the global pool addresses and status, connection and translation information and status, the negotiated H.323 UDP ports, the port allocation bit map for PAT, and other details necessary to let the Standby unit take over processing if the Primary unit fails.
Depending on the failure, the PIX Firewall takes from 15 to 45 seconds to cause a switchover. Applications not handled by Stateful Failover will then require time to reconnect before the Active unit becomes fully functional.
Stateful Failover requires a 100 Mbps Ethernet interface to be used exclusively for passing state information between the two PIX Firewall units.
The Stateful Failover interface can be connected to any of the following:
PIX Firewall does not support use of either Token Ring or FDDI for the Stateful Failover dedicated interface. Data is passed over the dedicated interface using IP protocol 105. No hosts or routers should be on this interface.
![]() |
Note In the event of a failover, information on idle TCP connections is not always sent to the Standby unit when using Stateful Failover. This can cause idle TCP connections to be dropped. The information is sent correctly approximately 66% of the time, but approximately 34% of the time it is not. |
Figure 3-1 shows two PIX Firewall units connected for use with Stateful Failover.

![]() |
Note All enabled interfaces must be connected between the Active and Standby units. If an interface is not in use, use the shutdown option to the interface command to disable the interface. |
You can disable failover with the no failover command. If failover is disabled, the following messages display when you enter the show failover command:
show failover Failover Off Cable Status: My side not connected Reconnect timeout: 0:00:00
The following notes apply to the use of failover on the PIX Firewall:
1. When a failover cable connects two PIX Firewall units, the no failover command disables failover until you enter the failover command to explicitly enable failover. Previously, when the failover cable connected two PIX Firewall units and you entered the no failover command, failover would automatically re-enable after 15 seconds.
2. Perform the following for other devices on the subnets:
a. Turn off spanning tree on ports on switches.
b. Lower the timers on the switches.
c. Ensure the MSFC is not running a deferred Cisco IOS software version.
d. Turn off trunking.
3. The PIX Firewall failover unit (order number PIX-515-FO-BUN or PIX-520-FO-BUN) is intended to be used solely for failover and not in standalone mode. If a failover unit is used in standalone mode, the unit will reboot at least once every 24 hours until the unit is returned to failover duty. When the unit reboots, the following message displays at the console:
=========================NOTICE ==========================
This machine is running in secondary mode without
a connection to an active primary PIX. Please
check your connection to the primary system.
REBOOTING....
==========================================================
4. If a failover-only PIX Firewall is not attached to a failover cable or is attached to the Primary end of a failover cable, then it will hang at boot time. It must be a Secondary unit.
5. Changes made on the Standby unit are not replicated on the Active unit.
6. Failover messages always have a syslog priority level of 2, which indicates a critical condition. Refer to the logging command description in "Command Reference," for more information on syslog messages. Refer to System Log Messages for the Cisco Secure PIX Firewall Version 5.2, available online. PIX Firewall documentation is available online at the following site:
This section contains some frequently asked questions about the failover features.
PIX Firewall lists single-packet (called "atomic") Cisco Secure Intrusion Detection System (formerly known as NetRanger) signature messages via syslog. Refer to System Log Messages for the Cisco Secure PIX Firewall Version 5.2 for a list of the supported messages. You can view this document online at the following site:
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v52/syslog/index.htm
All signature messages are not supported by PIX Firewall in this release. IDS syslog messages all start with %PIX-4-4000nn and have the following format:
%PIX-4-4000nn IDS:sig_num sig_msg from ip_addr to ip_addr on interface int_name
For example:
%PIX-4-400013 IDS:2003 ICMP redirect from 10.4.1.2 to 10.2.1.1 on interface dmz %PIX-4-400032 IDS:4051 UDP Snork attack from 10.1.1.1 to 192.168.1.1 on interface outside
Options:
sig_num | The signature number. Refer to the Cisco Secure Intrusion Detection System Version 2.2.1 User Guide for more information. You can view the "NSDB and Signatures" chapter from this guide at the following site: http://www.cisco.com/univercd/cc/td/doc/product/iaabu/csids/csids1/csidsug/sigs.htm |
sig_msg | The signature messageapproximately the same as the NetRanger signature message. |
ip_addr | The local to remote address to which the signature applies. |
int_name | The name of the interface on which the signature originated. |
You can determine which messages display with the following commands:
ip audit signature signature_number disableAttaches a global policy to a signature. Used to disable or exclude a signature from auditing.
no ip audit signature signature_numberRemoves the policy from a signature. Used to reenable a signature.
show ip audit signature [signature_number]Displays disabled signatures.
ip audit info [action [alarm] [drop] [reset]]Specifies the default action to be taken for signatures classified as informational signatures.
The alarm option indicates that when a signature match is detected in a packet, PIX Firewall reports the event to all configured syslog servers. The drop option drops the offending packet. The reset option drops the offending packet and closes the connection if it is part of an active connection. The default is alarm. To cancel event reactions, specify the ip audit info command without an action option.
no ip audit infoSets the action to be taken for signatures classified as informational and reconnaissance to the default action.
show ip audit infoDisplays the default informational actions.
ip audit attack [action [alarm] [drop] [reset]]Specifies the default actions to be taken for attack signatures. The action options are as previously described.
no ip audit attackSets the action to be taken for attack signatures to the default action.
show ip audit attackDisplays the default attack actions. An audit policy (audit rule) defines the attributes for all signatures that can be applied to an interface along with a set of actions. Using an audit policy the user may limit the traffic that is audited or specify actions to be taken when the signature matches. Each audit policy is identified by a name and can be defined for informational or attack signatures. Each interface can have two policies; one for informational signatures and one for attack signatures. If a policy is defined without actions, then the configured default actions will take effect. Each policy requires a different name.
ip audit name audit_name info [action [alarm] [drop] [reset]]All informational signatures except those disabled or excluded by the ip audit signature command are considered part of the policy. The actions are the same as described previously .
no ip audit name audit_name [info]Remove the audit policy audit_name.
ip audit name audit_name attack [action [alarm] [drop] [reset]]All attack signatures except those disabled or excluded by the ip audit signature command are considered part of the policy. The actions are the same as described previously.
no ip audit name audit_name [attack]Removes the audit specification audit_name.
show ip audit name [name [info | attack]]Displays all audit policies or specific policies referenced by name and possibly type.
ip audit interface if_name audit_nameApplies an audit specification or policy (via the ip audit name command) to an interface.
no ip audit interface [if_name]Removes a policy from an interface.
show ip audit interfaceDisplays the interface configuration.
PIX Firewall provides support for Microsoft PPTP, which is an alternative to IPSec handling for VPN Clients. While PPTP is less secure than IPSec, PPTP is easier to implement and maintain.
This section contains the following topics:
The vpdn command implements the PPTP feature for inbound connections between the PIX Firewall and a Windows client. Point-to-Point Tunneling Protocol (PPTP) is a layer 2 tunneling protocol which lets a remote client use a public IP network to communicate securely with servers at a private corporate network. PPTP tunnels the IP protocol. RFC 2637 describes the PPTP protocol.
Support is provided for only inbound PPTP and only one PIX Firewall interface can have the vpdn command enabled.
Supported authentication protocols include: PAP, CHAP, and MS-CHAP using external AAA (RADIUS or TACACS+) servers or the PIX Firewall local username and password database. Through the PPP IPCP protocol negotiation, PIX Firewall assigns a dynamic internal IP address to the PPTP client allocated from a locally defined IP address pool.
PIX Firewall PPTP VPN supports standard PPP CCP negotiations with Microsoft Point-To-Point Encryption (MPPE) extensions using RSA/RC4 algorithm. MPPE currently supports 40-bit and 128-bit session keys. MPPE generates an initial key during user authentication and refreshes the key regularly. In this release, compression is not supported.
When you specify MPPE, you must use the MS-CHAP PPP authentication protocol. If you are using an external AAA server, the protocol must be RADIUS and the external RADIUS server must be able to return the Microsoft MSCHAP_MPPE_KEY attribute to the PIX Firewall in the RADIUS Authentication Accept packet. See RFC 2548, "Microsoft Vendor Specific RADIUS Attributes," for more information on the MSCHAP_MPPE_KEY attribute.
Currently, Cisco has only tested the Steel-Belted RADIUS server from Funk Software as a server able to return the MSCHAP_MPPE_KEYS attribute.
PIX Firewall PPTP VPN has been tested with the following Microsoft Windows products: Windows 95 with DUN1.3, Windows 98, Windows NT 4.0 with SP6, and Windows 2000.
Use the vpdn command with the sysopt connection permit-pptp command to allow PPTP traffic to bypass checking of access-list command statements.
The show vpdn command lists tunnel and session information.
The clear vpdn command removes all vpdn commands from the configurations and stops all the active PPTP tunnels. The clear vpdn all command lets you remove all tunnels, and the clear vpdn id tunnel_id command lets you remove tunnels associated with tunnel_id. (You can view the tunnel_id with the show vpdn command.)
The clear vpdn group command removes all the vpdn group commands from the configuration. The clear vpdn username command removes all the vpdn username commands from the configuration. The clear vpdn command removes all vpdn commands from the configuration.
You can troubleshoot PPTP traffic with the debug ppp and debug vpdn commands.
The following example shows a simple configuration, which lets a Windows PPTP client dial in without any authentication (not recommended). Refer to the vpdn command page in "Command Reference," for more examples and descriptions of the vpdn commands and the command syntax.
The ip local pool command specifies the IP addresses assigned to each VPN Client as they log in to the network. The Windows client can Telnet to host 192.168.0.2 through the global IP address 209.165.201.2 in the static command statement. The access-list command statement permits Telnet access to the host.
ip local pool my-addr-pool 10.1.1.1-10.1.1.254 vpdn group 1 accept dialin pptp vpdn group 1 client configuration address local my-addr-pool vpdn enable outside static (inside, outside) 209.165.201.2 192.168.0.2 netmask 255.255.255.255 access-list acl_out permit tcp any host 209.165.201.2 eq telnet access-group acl_out in interface outside
The snmp-server command causes the PIX Firewall to send SNMP traps so that the PIX Firewall can be monitored remotely. Use snmp-server host command to specify which systems receive the SNMP traps.
This section includes the following topics:
The PIX Firewall SNMP MIB-II groups available are System and Interfaces. The Cisco Firewall MIB and Cisco Memory Pool MIB are also available.
All SNMP values are read only (RO).
Using SNMP, you can monitor system events on the PIX Firewall. SNMP events can be read, but information on the PIX Firewall cannot be changed with SNMP.
The PIX Firewall SNMP traps available to an SNMP management station are as follows:
Use CiscoWorks for Windows or any other SNMP V1, MIB-II compliant browser to receive SNMP traps and browse an MIB. SNMP traps occur at UDP port 162.
![]() |
Note The PIX Firewall does not support browsing of the Cisco syslog MIB. |
You can browse the System and Interface groups of MIB-II. Browsing an MIB is different from sending traps. Browsing means doing an snmpget or snmpwalk of the MIB tree from the management station to determine values.
The Cisco Firewall MIB and Cisco Memory Pool MIB are available.
PIX Firewall does not support the following in the Cisco Firewall MIB:
Traps are different than browsing; they are unsolicited "comments" from the managed device to the management station for certain events, such as link up, link down, syslog event generated, and so on.
Two mechanisms work with SNMP, PIX Firewall responds to an SNMP request from a management station and the PIX Firewall sends a trap, which is an event notification. PIX Firewall supports two types of traps, generic and syslog traps.
Follow these steps to receive requests and send traps from the PIX Firewall to an SNMP management station:
Step 2 Set the snmp-server options for location, contact, and the community password as required.
If you only want to send the cold start, link up, and link down generic traps, no further configuration is required.
If you only want to receive SNMP requests, no further configuration is required.
Step 3 Add an snmp-server enable traps command statement.
Step 4 Set the logging level with the logging history command; for example:
logging history debugging
Cisco recommends that you use the debugging level during initial set up and during testing. Thereafter, set the level from debugging to a lower value for production use.
(The logging history command sets the severity level for SNMP syslog messages.)
Step 5 Start sending syslog traps to the management station with the logging on command.
Step 6 To disable sending syslog traps, use the no logging on command or the no snmp-server enable traps command.
To receive security and failover SNMP traps from the PIX Firewall, compile the Cisco SMI MIB and the Cisco syslog MIB into your SNMP management application. If you do not compile the Cisco syslog MIB into your application, you only receive MIB-II traps for link up or down, and firewall cold start.
You can get the Cisco MIB files on the Web from the following sites:
Follow these steps to compile Cisco syslog MIB files into your browser using CiscoWorks for Windows (SNMPc):
Step 2 Start SNMPc.
Step 3 Click Config>Compile MIB.
Step 4 Scroll to the bottom of the list, and click the last entry.
Step 5 Click Add.
Step 6 Find the file CISCO-FIREWALL-MIB.my and click OK.
Step 7 Scroll to the bottom of the list, and click the last entry.
Step 8 Click Add.
Step 9 Find the file CISCO-MEMORY-POOL-MIB.my and click OK.
Step 10 Scroll to the bottom of the list, and click the last entry.
Step 11 Click Add.
Step 12 Find the file CISCO-SMI.my and click OK.
Step 13 Scroll to the bottom of the list, and click the last entry.
Step 14 Click Add.
Step 15 Find the file CISCO-SYSLOG-MIB.my and click OK.
Step 16 Click Load All.
Step 17 If there are no errors, restart SNMPc.
These instructions are only for SNMPc (CiscoWorks for Windows).
The Cisco Firewall and Memory Pool MIBs let you poll failover and system status.
This section contains the following topics:
In the tables that follow in each section, the meaning of each returned value is shown in parentheses.
GetNext(ip.ipAddrTable.ipAddrEntry.ipAdEntAddr.127.0.0.1)
The SNMP failover status lets you determine whether failover is enabled and which unit is active. The Cisco Firewall MIB indicates failover status by two rows in the cfwHardwareStatusTable object. From the PIX Firewall command line, you can view failover status with the show failover command. You can access the object table from the following path:
.iso.org.dod.internet.private.enterprises.cisco.ciscoMgmt.ciscoFirewallMIB. ciscoFirewallMIBObjects.cfwSystem.cfwStatus.cfwHardwareStatusTable
Table 3-2 lists which objects provide failover information.
| Object | Object Type | Row 1: Returned if Failover is Disabled | Row 1: Returned if Failover is Enabled | Row 2: Returned if Failover is Enabled |
|---|---|---|---|---|
cfwHardwareType | Hardware | 6 (If Primary unit) | 6 (If Primary unit) | 7 (If Secondary unit) |
cfwHardwareInformation | SnmpAdminString | blank | blank | blank |
cfwHardwareStatusValue | HardwareStatus | 0 (Not used) | active or 9 (If Active unit) or standby or 10 (If Standby unit) | active or 9 (If Active unit) or standby or 10 (If Standby unit) |
cfwHardwareStatusDetail | SnmpAdminString | Failover Off | blank | blank |
In the HP OpenView Browse MIB application's "MIB values" window, if failover is disabled, a sample MIB query yields the following information:
cfwHardwareInformation.6 : cfwHardwareInformation.7 : cfwHardwareStatusValue.6 :0 cfwHardwareStatusValue.7 :0 cfwHardwareStatusDetail.6 :Failover Off cfwHardwareStatusDetail.7 :Failover Off
From this listing, the table index, cfwHardwareType, appears as either .6 or .7 appended to the end of each of the subsequent objects. The cfwHardwareInformation field is blank, the cfwHardwareStatusValue is 0, and the cfwHardwareStatusDetail contains Failover Off, which indicates the failover status.
When failover is enabled, a sample MIB query yields the following information:
cfwHardwareInformation.6 : cfwHardwareInformation.7 : cfwHardwareStatusValue.6 : active cfwHardwareStatusValue.7 : standby cfwHardwareStatusDetail.6 : cfwHardwareStatusDetail.7 :
In this listing, only the cfwHardwareStatusValue contains values, either active or standby to indicate the status of each unit.
You can determine how much free memory is available with the Cisco Memory Pool MIB. From the PIX Firewall command line, memory usage is viewed with the show memory command. The following is sample output from the show memory command:
show memory 16777216 bytes total, 5595136 bytes free
You can access the MIB objects from the following path:
.iso.org.dod.internet.private.enterprises.cisco.ciscoMgmt.ciscoMemoryPoolMIB. ciscoMemoryPoolObjects.ciscoMemoryPoolTable
Table 3-3 lists which objects provide memory usage information.
| Object | Object Type | Returned Value |
|---|---|---|
ciscoMemoryPoolType | CiscoMemoryPoolTypes | 1 (Processor memory) |
ciscoMemoryPoolName | DisplayString | PIX system memory |
ciscoMemoryPoolAlternate | Integer32 | 0 (No alternate memory pool) |
ciscoMemoryPoolValid | TruthValue | true (Means that the values of the remaining objects are valid) |
ciscoMemoryPoolUsed | Gauge32 | integer (Number of bytes currently in usethe total bytes minus the free bytes) |
ciscoMemoryPoolFree | Gauge32 | integer (Number of bytes currently free) |
ciscoMemoryPoolLargestFree | Gauge32 | 0 (Information not available) |
In the HP OpenView Browse MIB application's "MIB values" window a sample MIB query yields the following information:
ciscoMemoryPoolName.1 :PIX system memory ciscoMemoryPoolAlternate.1 :0 ciscoMemoryPoolValid.1 :true ciscoMemoryPoolUsed.1 :12312576 ciscoMemoryPoolFree.1 :54796288 ciscoMemoryPoolLargestFree.1 :0
From this listing, the table index, ciscoMemoryPoolName, appears as the .1 value at the end of each subsequent object value. The ciscoMemoryPoolUsed object lists the number of bytes currently in use, 12312576, and the ciscoMemoryPoolFree object lists the number of bytes currently free 54796288. The other objects always list the values described in Table 3-3.
You can view the number of connections in use from the cfwConnectionStatTable in the Cisco Firewall MIB. From the PIX Firewall command line, you can view the connection count with the show conn command. The following is sample output from the show conn command to demonstrate where the information in cfwConnectionStatTable originates:
show conn 15 in use, 88 most used
The cfwConnectionStatTable object table can be accessed from the following path:
.iso.org.dod.internet.private.enterprises.cisco.ciscoMgmt.ciscoFirewallMIB. ciscoFirewallMIBObjects.cfwSystem.cfwStatistics.cfwConnectionStatTable
Table 3-4 lists which objects provide connection count information.
| Object | Object Type | Row 1: Returned Value | Row 2: Returned Value |
|---|---|---|---|
cfwConnectionStatService | Services | 40 (IP protocol) | 40 (IP protocol) |
cfwConnectionStatType | ConnectionStat | 6 (Current connections in use) | 7 (High) |
cfwConnectionStatDescription | SnmpAdminString | number of connections currently in use by the entire firewall | highest number of connections in use at any one time since system startup |
cfwConnectionStatCount | Counter32 | 0 (Not used) | 0 (Not used) |
cfwConnectionStatValue | Gauge32 | integer (In use number) | integer (Most used number) |
In the HP OpenView Browse MIB application's "MIB values" window a sample MIB query yields the following information:
cfwConnectionStatDescription.40.6 :number of connections currently in use by the entire firewall cfwConnectionStatDescription.40.7 :highest number of connections in use at any one time since system startup cfwConnectionStatCount.40.6 :0 cfwConnectionStatCount.40.7 :0 cfwConnectionStatValue.40.6 :15 cfwConnectionStatValue.40.7 :88
From this listing, the table index, cfwConnectionStatService, appears as the .40 appended to each subsequent object and the table index, cfwConnectionStatType, appears as either .6 to indicate the number of connections in use or .7 to indicate the most used number of connections. The cfwConnectionStatValue object then lists the connection count. The cfwConnectionStatCount object always returns 0 (zero).
You can view the system buffer usage from the Cisco Firewall MIB in multiple rows of the cfwBufferStatsTable. The system buffer usage provides an early warning of the PIX Firewall reaching the limit of its capacity. On the command line, you can view this information with the show blocks command. The following is sample output from the show blocks command to demonstrate how cfwBufferStatsTable is populated:
show blocksSIZE MAX LOW CNT4 1600 1600 160080 100 97 97256 80 79 791550 780 402 40465536 8 8 8
You can view cfwBufferStatsTable at the following path:
.iso.org.dod.internet.private.enterprises.cisco.ciscoMgmt.ciscoFirewallMIB. ciscoFirewallMIBObjects.cfwSystem.cfwStatistics.cfwBufferStatsTable
Table 3-5 lists the objects required to view the system block usage.
| Object | Object Type | First Row: Returned Value | Next Row: Returned Value | Next Row: Returned Value |
|---|---|---|---|---|
cfwBufferStatSize | Unsigned32 | integer (SIZE value; for example, 4 for a 4-byte block) | integer (SIZE value; for example, 4 for a 4-byte block) | integer (SIZE value; for example, 4 for a 4-byte block) |
cfwBufferStatType | ResourceStatistics | 3 (MAX) | 5 (LOW) | 8 (CNT) |
cfwBufferStatInformation | SnmpAdminString | maximum number of allocated integer byte blocks (integer is the number of bytes in a block) | fewest integer byte blocks available since system startup (integer is the number of bytes in a block) | current number of available integer byte blocks (integer is the number of bytes in a block) |
cfwBufferStatValue | Gauge32 | integer (MAX number) | integer (LOW number) | integer (CNT number) |
![]() |
Note The three rows repeat for every block size listed in the output of the show blocks command. |
In the HP OpenView Browse MIB application's "MIB values" window a sample MIB query yields the following information:
cfwBufferStatInformation.4.3 :maximum number of allocated 4 byte blocks cfwBufferStatInformation.4.5 :fewest 4 byte blocks available since system startup cfwBufferStatInformation.4.8 :current number of available 4 byte blocks cfwBufferStatInformation.80.3 :maximum number of allocated 80 byte blocks cfwBufferStatInformation.80.5 fewest 80 byte blocks available since system startup cfwBufferStatInformation.80.8 :current number of available 80 byte blocks cfwBufferStatInformation.256.3 :maximum number of allocated 256 byte blocks cfwBufferStatInformation.256.5 :fewest 256 byte blocks available since system startup cfwBufferStatInformation.256.8 :current number of available 256 byte blocks cfwBufferStatInformation.1550.3 :maximum number of allocated 1550 byte blocks cfwBufferStatInformation.1550.5 :fewest 1550 byte blocks available since system startup cfwBufferStatInformation.1550.8 :current number of available 1550 byte blocks cfwBufferStatValue.4.3: 1600 cfwBufferStatValue.4.5: 1600 cfwBufferStatValue.4.8: 1600 cfwBufferStatValue.80.3: 400 cfwBufferStatValue.80.5: 396 cfwBufferStatValue.80.8: 400 cfwBufferStatValue.256.3: 1000 cfwBufferStatValue.256.5: 997 cfwBufferStatValue.256.8: 999 cfwBufferStatValue.1550.3: 1444 cfwBufferStatValue.1550.5: 928 cfwBufferStatValue.1550.8: 932
From this listing, the first table index, cfwBufferStatSize, appears as first number appended to the end of each object, such as .4 or .256. The other table index, cfwBufferStatType, appears as .3, .5, or .8 after the first index. For each block size, the cfwBufferStatInformation object identifies the type of value and the cfwBufferStatValue object identifies the number of bytes for each value.
SSH (Secure Shell) is an application running on top of a reliable transport layer, such as TCP/IP that provides strong authentication and encryption capabilities. PIX Firewall supports the SSH remote shell functionality as provided in SSH version 1. SSH version 1 also works with Cisco IOS software devices. Up to five SSH clients are allowed simultaneous access to the PIX Firewall console.
![]() |
Note You must generate an RSA key-pair for the PIX Firewall before clients can connect to the PIX Firewall console. To use SSH, your PIX Firewall must have a DES or 3DES activation key. |
The current method of remotely configuring a PIX Firewall unit involves initiating a Telnet connection to the PIX Firewall to start a shell session and then entering configuration mode. This connection method can only provide as much security as Telnet provides, which is only provided as lower-layer encryption (for example, IPSec) and application security (username/password authentication at the remote host). The PIX Firewall SSH implementation provides a secure remote shell session without IPSec, and only functions as a server, which means the PIX Firewall cannot initiate SSH connections.
For more information, refer to the aaa and ssh command pages in "Command Reference."
The following sites let you download an SSH v1.x client. Because SSH version 1.x and v2 are entirely different protocols and are not compatible, be sure you download a client that supports SSH v1.x.
![]() |
Note You must download TTSSH to use Tera Term Pro with SSH. TTSSH provides a Zip file you copy to your system. Extract the zipped files into the same folder that you installed Tera Term Pro. For a Windows 95 system, by default, this would be the C:\Program Files\Ttempro folder. |
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Aug 31 21:00:30 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.