
2-25
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 2 Establishing Connectivity
Basic Configuration Examples
Also try the following to fix unsuccessful pings:
a. Verify the physical connectivity of the affected interface(s). If there are switches or hubs between
the hosts and the PIX Firewall, verify that all the links are working. You can try connecting a host
directly to the PIX
Firewall using a crossover cable.
b. Make sure you have a default route command statement for the outside interface. For example:
route outside 0 0 209.165.201.2 1
c. Use the show access-list command to ensure that you have access-list command statements in your
configuration to permit ICMP. Add these commands if they are not present.
d. Except for the outside interface, make sure that the host or router on each interface has the
PIX
Firewall as its default gateway. If so, set the host’s default gateway to the router and set the
router’s default route to the PIX
Firewall.
If there is a single router between the host and the PIX Firewall, a default route on the router should
be unnecessary. However, you might want to try clearing the ARP cache of the router. If there are
multiple routers, you might need to set a default route on any router on the path from the
PIX
Firewall to the host.
e. Check to see if there is a router between the host and the PIX Firewall. If so, make sure the default
route on the router points to the PIX
Firewall interface. If there is a hub between the host and the
PIX
Firewall, make sure that the hub does not have a routing module. If there is a routing module,
configure its default route to point to the PIX
Firewall.
Saving Your Configuration
When you complete entering commands in the configuration, save it to Flash memory with the
write
memory command.
Then use the reload command to reboot the PIX Firewall. When you reboot, all traffic through the
PIX
Firewall stops. Once the PIX Firewall unit is again available, connections can restart. After you
enter the reload command, PIX
Firewall prompts you to confirm that you want to continue. Enter y and
the reboot occurs.
You are now done configuring the PIX Firewall. This basic configuration lets protected network users
start connections, but prevents users on unprotected networks from accessing (or attacking) protected
hosts.
Use the write terminal command to view your current configuration.
Basic Configuration Examples
This section illustrates and describes a number of common ways to implement the PIX Firewall. It
includes the following topics:
• Two Interfaces Without NAT or PAT, page 2-26
• Two Interfaces with NAT and PAT, page 2-28
• Three Interfaces Without NAT or PAT, page 2-30
• Three Interfaces with NAT and PAT, page 2-32
Commentaires sur ces manuels