Premium Essay

Cisco Pix

In:

Submitted By eagles07
Words 12469
Pages 50
IPSecuritas 3.x

Configuration Instructions for Cisco PIX 500 Series
(501, 506, 506E, 515, 515E, 520, 525, 535)

© Lobotomo Software June 17, 2009

Legal Disclaimer
Contents Lobotomo Software (subsequently called "Author") reserves the right not to be responsible for the topicality, correctness, completeness or quality of the information provided. Liability claims regarding damage caused by the use of any information provided, including any kind of information which is incomplete or incorrect, will therefore be rejected. All offers are not-binding and without obligation. Parts of the document or the complete publication including all offers and information might be extended, changed or partly or completely deleted by the author without separate announcement. Referrals The author is not responsible for any contents referred to or any links to pages of the World Wide Web in this document. If any damage occurs by the use of information presented there, only the author of the respective documents or pages might be liable, not the one who has referred or linked to these documents or pages. Copyright The author intended not to use any copyrighted material for the publication or, if not possible, to indicate the copyright of the respective object. The copyright for any material created by the author is reserved. Any duplication or use of such diagrams, sounds or texts in other electronic or printed publications is not permitted without the author's agreement. Legal force of this disclaimer This disclaimer is to be regarded as part of this document. If sections or individual formulations of this text are not legal or correct, the content or validity of the other parts remain uninfluenced by this fact.

Table of contents
Introduction
..........................................................................................................1 Cisco PIX VPN Setup

Similar Documents

Free Essay

Server Side Security Unit 1 Individual Project

...able to block unwanted traffic. These can help with security and keep random connection attempts form using up server and system resources (HostingHelpers, 2008). Firewalls Firewalls are very resourceful. Depending on the size of the company and users, choosing the correct firewall can be critical. There are many firewalls out there and companies that produce them both freely and paid. You can utilize small office/home office (SOHO) firewalls, single machine firewalls, medium–sized network firewalls, or Enterprise firewalls (Easttom, 2006). Medium-sized companies are usually 25 to several hundreds of users. All of these users are on a LAN in a single location. For this type of company you can utilize the Check Point Firewall-1 or Cisco PIX 515E. For Enterprise you can use the...

Words: 597 - Pages: 3

Free Essay

E-Commerce and System Design

...Unit 3 Individual Project Victoria Kane MGMT305-1301A-04 Management Information Systems March 3, 2013 American Intercontinental University Abstract The paragraphs below will detail the technicalities of an e-commerce website for Steve’s Used Appliances. Unit 3: E-Commerce and System Design When starting up an e-commerce website, the first thing to decide upon is the type of business model that will be used for the foundation of the website. The internet business model that best applies to Steve’s Used Appliances is affiliate marketing. In this model, a business pays off one or more affiliates for their marketing efforts to broaden the scope of customers. (Boris, 2011) This model will be the most helpful for a used appliance store because of the fact that appliances are not easy to sell. Having an affiliate model opens the door for other larger businesses to spread the word on this smaller business. Steve’s Used Appliances can definitely benefit from the creation of an e-commerce website. Having a website will make it possible for the company to get out information about their products and services without wasting money on postage, publicizing, or couriers. It also makes it possible for this small business to reach customers from cities farther away than they would with simple newspaper ads or commercials. An e-commerce website also provides several functions for a business. These functions are usually in reference to marketing, sales, customer support, and internal...

Words: 828 - Pages: 4

Free Essay

Deploying Application Firewall in Defense in Depth Principle

...Deploying Application Firewall in Defense in Depth Principle Abstract Information security should be a priority for businesses, especially when they are increasingly involved in electronic commerce. With the understanding that securing an operating system successfully requires taking a systematic and comprehensive approach, security practitioners have recommended a layered approach called defense-in-depth. The cost and complexity of deploying multiple security technologies has prevented many organizations from achieving their information security goal. In view of these constraints and in compliance with recent with recent corporate and industry regulations like Sarbanes-Oxley Act and Payment Card Industry Data Security Standard, businesses now deploy application firewalls as security measures. Based on the foregoing, the author has recommended the use of application firewalls as a single platform for achieving layered security through network protection, application protection and data protection. This paper commences by examining the defense in depth theory and the types of application firewall and the author concludes by citing the Institute for Computing Applications (IAC) of the Italian National Research Council (CNR) as an example of an organization which engaged application firewalls in resolving its network security problem. Research Analysis/ Body The development of Information security is of paramount importance to organizations that have online presence...

Words: 1701 - Pages: 7

Free Essay

Answer for You Use as a Guide

...Core Router for each location: Cisco 2811:  * Provides access to high speed internet (T1/T3) * Provides security features that usually come with the PIX IOS (hence MPLS/Site to Site) * Allows VLAN's at each location.  Core switches for each location:  Cisco Catalyst 3950:  * Has x2 gigabite uplink ports for a fiber connection to the Cisco core router.  * Allows VLAN's, and trunking to other Cisco compatible devices.  Lines for each location:  This depends on what your needs are. They can be a normal T1, bonded T1's or a T3 line for increased bandwidth. You may also want to have a fail over ISDN line for redundancy reasons, and depending if you have a sever farm of not, you may need additional bandwidth.  * Connection should be fiber (copper lines are more stable, but slower. Satellite is way to slow).  * Connections should be T1/T3 lines, with a failover T1/T3 or ISDN line.  Heres how the whole thing would play out (in a Cisco world at least): Global Network: * Each network should have a Cisco 2811, which will be the CPE of the network.  * Each network should have a high speed fiber connection (type of connection will be determined on bandwidth consumption, along with need for VoIP).  * Each network should have a failover line (T1/T3 or ISDN). Best practice is that both lines should be the same as the primary line.  * MPLS should be used to connect all networks together, hence a third T1/T3 connection. If MPLS...

Words: 370 - Pages: 2

Free Essay

Network & Security

...Technology : RIP, RIPV2, IGRP, EIGRP, OSPF, TCP/IP, Static and Dynamic Routing. Network Products : CISCO Routers 1700, 1800, 2500, 2600, 2800. CISCO High End Routers 3600, 3800, 7200. CISCO Switches 1900, 2950, 2950, 2960G. CISCO Campus Switches 3550XL, 4948 Core Catalyst 4503, 4507 RE, Catalyst 6500/6503/6507, Motorola Vanguard Router 342 & 6435, 3Com Core 4007/Access Switch 3300, D-Link Layer 2/3 switches 3326SR, Nortel Baystack Switches, CISCO - CSS 11500 Switch. Voice & Video : CISCO IP Phone 7900, Polycom Video Conferencing Device, Smart Call Voice Recorder. Wireless & Wi-Fi : Canopy Wireless Device (p-p/pMp), DLink Wireless (point to point), DLink Access Point, CISCO 500, 1242 AGK9 series Access Point, and CISCO Linksys Wireless/Wi-Fi Router. WAN Optimizer : Steelhead - Riverbed WAN Optimizer Security & VPN : Cisco PIX 535 & ASA Firewall, FWSM, Fortigate Firewall, Gajshield Securegate Firewall, Sonicwall Firewall NSA2400, Cisco NAC, Watchguard Firewall, ACL-Access Control List, Portwise VPN Software, NAT, PAT, VPN Client, Bluecoat Proxy SG, Bluecoat Reporter, Bluecoat AV, Juniper SSG-550M, McAfee IPS M2950, Forefront Threat Management Gateway (TMG) 2010. Ticketing System : E- Helpline, HP Open View, and Optive Live - Call Logging, Helpdesk. Monitoring Tools : Op Manager, What's UP Gold, Ethereal, PRTG Packet Sniffer, Cisco Network Assistant, Fluke OptiView XG, Network Time Machine. . Operating Systems : Windows 2008/2003/2000 (Desktop/Server)...

Words: 274 - Pages: 2

Free Essay

Cisco Systems Inc

...Cisco Systems Inc. INDIVIDUAL PROJECT REPORT Date Submitted November, 20, 2013 Table of Contents SUMMARY DESCRIPTION OF BUSINESS 0 Products and Services Offeered 0 Global Markets Currently Served 0 Corporate Structure and Leadership Resources and Competitive Position 0 COMPANY'S EXTERNAL ENVIRONMENT 0 Competitors in Top Five Countries Served 0 Marktst For Company and Rivals 0 Key Success Factors for Their Market 0 COMPANY'S COMPETITIVE POSITION 0 Competitive Position in Top Fice Countries 0 Basis for Current Competitive Position 0 Potential for Growth and Expansion 0 EXHIBITS 0 Information Sources Additional information Other Summary Description of Business Products and Services Offered Cisco offers a wide range of products and networking solutions designed for enterprises and small businesses across a variety of industries. Cisco services provide intelligent network technologies. Their products and services are made for small business, mid-size businesses, homes, and enterprises or large corporations. Cisco Systems is a leader in manufacturing network hardware used in computer networks. The company's specialty is making network connectors-routers, bridges and switches. They also design technologies and services for Internet communication. Cisco is known for network products that support more than one protocol. Protocols are standards or sets of instructions that regulate or enable a communication, data transfer or connection...

Words: 3949 - Pages: 16

Free Essay

Student

...Cisco BTS 10200 Softswitch Building Environment and Power Site Survey Document Brief The Building Environment and Power Site Survey provides essential information about the customer site for the Cisco BTS 10200 Softswitch. The Cisco BTS 10200 Softswitch is a software-based class-independent telephony switch that utilizes MGCP as the control protocol for voice. Modification History |Ver. |Date |Comment | |R332a |06/30/2002 |Initial draft for Rls.Release 3.3.2 | |R33b |10/29/2002 |Page 1 – Added electrical requirements warning. | | | |Sec. 3 – Changed upper temperature limit to 104°F (40°C) | | | |Sec. 4.1 – Clarified requirements for redundant “A” and “B” feeds. | | | |Sec. 4.2 – Clarified requirements for redundant “A” and “B” feeds. | | | |Sec. 9 – Clarified requirement for modem numbering. | |R33c |01/22/2003 |Updated headers and footers. No content changes. ...

Words: 3441 - Pages: 14

Free Essay

Cisco

...Cisco Virtualization Experience Infrastructure (VXI) Reference Architecture October 5, 2010 What You Will Learn Enterprise IT departments are pressured to control costs, improve manageability, enhance security, and speed-up the deployment of new capabilities while supporting a consistent user experience across diverse endpoints. Desktop virtualization (DV) has become a popular solution for addressing these needs. With hosted DV, the end-user’s desktop experience (operating system, applications, and associated data) is abstracted from the physical endpoint and centralized. The user’s desktop image is hosted as a virtual machine on a data center server. Users can access hosted virtual desktops from anywhere through DV appliances, smart phones, tablet computers, laptop and desktop computers, and other clients. Organizations deploying DV face many challenges, as the DV technologies potentially affect the entire IT infrastructure. To address these challenges, Cisco has developed Cisco® Virtualization Experience Infrastructure (VXI), a comprehensive architecture for desktop virtualization. Cisco VXI, which uses three existing Cisco architectures, includes designs for virtualized data centers, virtualization-aware borderless networks, and virtualized workspaces, and the critical services needed to support these architectures. Cisco VXI reduces the total cost of ownership (TCO), streamlines operations, simplifies management, and positions organizations for growth. This document describes...

Words: 5886 - Pages: 24

Free Essay

Cisco

...ii Cisco TelePresence Fundamentals Cisco TelePresence Fundamentals Tim Szigeti, Kevin McMenamy, Roland Saville, Alan Glowacki Copyright©2009 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing May 2009 Library of Congress Cataloging-in-Publication Data Cisco TelePresence fundamentals / Tim Szigeti ... [et al.]. p. cm. ISBN-13: 978-1-58705-593-5 (pbk.) ISBN-10: 1-58705-593-7 (pbk.) 1. Multimedia communications. 2. Computer conferencing. I. Szigeti, Tim. II. Title. [DNLM: 1. Cisco Systems, Inc. ] TK5105.15.C57 2009 006.7--dc22 2009013062 ISBN-13: 978-1-58705-593-5 ISBN-10: 1-58705-593-7 Warning and Disclaimer This book is designed to provide information about Cisco TelePresence. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or...

Words: 17200 - Pages: 69

Free Essay

Cisco Systems

...Story Cisco Systems Inc. is a worldwide computer networking company based out of San Jose, California. From Cisco’s beginning they as a company aimed to connect all members of the supply chain. Cisco’s initial product was the router, which contained an operating software called Internet Operating System (IOS). This product launched Cisco as a company and led to their future goal of a completely integrated supply chain. The first integration, a customer support site, came a year after the router was launched and it allowed customers to download and upgrade software as well as technical support through e-mail. This support center continued to grow through the early nineties and was eventually replaced by a customer support system on their website. The customer support system was continually added to and by 1995 it included; company and product information, technical and customer support, and most importantly it introduced the ability to sell products and services online. Cisco’s main desire behind this system was to streamline the process of customer support and allow the information to more easily utilized. In 1996, Cisco implemented another Internet application called “Networked Strategy,” this introduced online order entry and allowed the information to flow through Cisco’s supply chain. The order information was sent to Cisco’s ERP system which in turn sent it out to the various suppliers and manufacturers, allowing for a very efficient process. Cisco continued...

Words: 277 - Pages: 2

Free Essay

Netw 206 Assignment 1

...operations at hand is key to the function of the change in the university. The main purpose of the case study presented is to present the task of implementing a high definition security video surveillance system solution that can replace and magnify what already exists at DeVry University today. As mentioned, DeVry requests a high definition security system that is to require the following features: 1. PoE (Power over Ethernet), avoid any additional wiring, the mounting of power bricks or using power injectors. Conserve and confine; 2. Segment camera IP traffic from the existing network for security purposes; 3. Provide sufficient bandwidth for full HD support; 4. Support a minimum of 150 cameras; 5. Comply with the cisco hierarchical design model; 6. Integrate 1Gb uplinks; and 7. Minimize rack space. During this process, DeVry has not yet purposed a budget for this action taken for this project but as any company would, DeVry would like the most cost efficient method possible. With such a request as this, it seems almost impossible to find such a camera that can withstand everything. Almost as if it was an indestructible camera seeming almost impossible until there was some research conducted. The discovery of the D-Link DCS-7513 Full HD Day & Night WDR Outdoor Bullet Camera is a high-definition professional surveillance camera developed to be versatile to any small, medium or large establishment. This camera uses a high sensitivity 2 megapixel...

Words: 1080 - Pages: 5

Free Essay

Lan Switching

...roduct Description LAN Switching and Wireless CCNA Exploration Labs and Study Guide Allan Johnson LAN Switching and Wireless, CCNA Exploration Labs and Study Guide is designed to help you learn about and apply your knowledge of the LAN switching and wireless topics from Version 4 of the Cisco® Networking Academy® CCNA® Exploration curriculum. Each chapter contains a Study Guide section and a Labs and Activities section. Study Guide The dozens of exercises in this book help you learn the concepts and configurations crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes matching, multiple-choice, fill-in-the-blank, and open-ended questions designed to help you Review vocabulary Strengthen troubleshooting skills Boost configuration skills Reinforce concepts Research topics Packet Tracer Activities—This icon identifies exercises interspersed throughout the Study Guide section where you can practice or visualize a specific task using Packet Tracer, a powerful network simulation program developed by Cisco. Labs and Activities The Labs and Activities sections begin with a Command Reference table and include all the online curriculum labs to ensure that you have mastered the practical skills needed to succeed in this course. Hands-On Labs—This icon identifies the hands-on labs created for each chapter. Work through all the Basic, Challenge, and Troubleshooting labs as provided to gain a deep understanding...

Words: 339 - Pages: 2

Free Essay

Medium Network Design

...Universidad Interamericana, Recinto de Guayama | Diseño de una Red Mediana | | Luis Lugo 16 de enero de 2013 | Introducción En este trabajo estaré diseñando una red mediana para un colegio técnico el cual contiene pocos estudiantes. Este diseño usa conmutadores en las capas 2 y 3 proveyendo servicios a usuarios y a la misma vez seguridad para toda la red. La organización tiene alrededor de 700 usuarios y existen diferentes dominios dentro de esta red. Diseño Este diseño debe tener varios requerimientos específicos para poder completar lo que es una red mediana segura. Uno de estos requerimientos y el mayor de estos es que la red debe de proveer conectividad para tres servidores y alrededor de 700 clientes. De la misma manera, la red va a permitir que si en alguna ocasión alguno de estos equipos necesita separarse el otro, esto sea posible. En esta red otro de los requerimientos importantes es el de evitar ataques, ya que como la red va a estar comunicándose entre dos edificios, esta es más susceptible a ataques que provengan de afuera. El centro o “core” de esta red es un solo conmutador de capa 3 con interfaz de “Ethernet” este conmutador “core” le provee los servicios de índole de ambas capas (2 y 3) hacia los equipos necesarios. La red tiene 4 sub redes diferentes, una de estas es para los servidores, otra para los clientes, otra para el sistema de red inalámbrico y la última para la administración. Se diseñó un NDIS para monitorear...

Words: 1290 - Pages: 6

Premium Essay

Advantages of Cisco

...Running Head: ADVANTAGES OF CISCO Advantages of Cisco [Writer’s Name] [Institution’s Name] Advantages of Cisco Cisco ISN components are deployed at the edge of big organizationsr IP network, and enable big organizations to provide local IVR and queuing corporate services without consuming expensive bandwidth on the core IP backbone Alternatively, the ISN routes and transfers the call through the IP network, in effect turning the IP network into a giant user-controlled switch.More Efficient Call Routing and Transfers: When a call has finished receiving IVR/queuing treatment on the ISN, the call is routed to its destination without needing a bridge inside the ISN As a result a lesser number of ports are required on the ISN than on some other IVR systems As an Open, Future-Proof Architecture, the ISN performs in an open environment using common Internet technologies and methods. Scalability and Operational Simplicity: The Cisco ISN solution can be customized to solve big organizationsr communication requirements. ISN servers can easily be added to big organizationsr existing infrastructure if the communication needs of the business are growing. The ISN`s technology also simplifies operational management. It fits Big organizationsr Communication needs as the Cisco ISN has the ability to operate in a pure IP environment and it can also be integrated with big organizationsr existing telephony infrastructure through the use of voice-over-IP (VoIP) gateways. New Corporate...

Words: 674 - Pages: 3

Free Essay

Cisco Acquisition Integration

...Acquisition Integration A Cisco on Cisco Case Cisco_IT_Case_Study © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Overview Challenge Integrate the employees, operations, and department-level functions of newly acquired companies quickly and easily Solution Apply standard principles and processes for acquisition integration Results Easier integration that maximizes value of acquisition Next Steps Continue to build integration expertise throughout the company 2 Challenge Smoothly Integrate Acquired Companies 120+ companies acquired since 1993 Handle acquisitions as a normal part of business Create a consistent, repeatable, and adaptable approach to integration Develop integration expertise with consistent activities and teams Apply these standards across the company and within departments 3 Solution Standard Principles and Team Approach Standard principles Internal alignment through a consistent approach Cross-function cooperation Consistent, repeatable, and adaptable processes Continually refine practices with lessons learned Standard team approach Central integration team Cross-function teams Department teams 4 Solution Technologies for Team Collaboration Cisco MeetingPlace conference calls WebEx online meetings Cisco TelePresence E-mail Online document sharing Online project management tools 5 Results Maximized Acquisition Value Benefits for Cisco as a company: Shorter time to realize acquisition value Faster...

Words: 304 - Pages: 2