PDM version 2.0 and higher releases include a Startup Wizard for initial configuration. Follow these steps to load PDM and use the Startup Wizard:

Step 1 Use an Ethernet cable to connect your PC to the inside port (Ethernet 1) on the rear panel of the PIX Firewall.

Step 2 Configure your PC to use DHCP (to receive an IP address automatically from the PIX Firewall) or assign a static IP address to your PC by selecting an address out of the 192.168.1.0 network.

Note The inside interface of the PIX Firewall is assigned 192.168.1.1, so choose a different IP address.

Step 3 Check the ACT LED on the rear panel of the PIX Firewall (see Table 2 on page 6) to verify that your PC has basic connectivity to the inside port (Ethernet 1). When connectivity occurs, the ACT LED next to the port lights up solid green.

Step 4 To access the Startup Wizard, use a PC connected to the inside port and enter the URL https://192.168.1.1/startup.html into your browser.

Note It is very important to enter the “s” in “https://192.168.1.1,” which indicates

asecure connection. If you enter “http://192.168.1.1” without the “s” in “https,” you cannot access the PIX Firewall.

Step 5 Accept the certificates and follow the instructions in the Startup Wizard. For online help, click the Help button at the bottom of the Startup Wizard window.

9

Page 9
Image 9
Cisco Systems PIX 506E quick start

PIX 506, PIX 506E specifications

Cisco Systems PIX 506E and PIX 506 are part of the Cisco PIX (Private Internet Exchange) firewall series, which was popular in the late 1990s and early 2000s. These firewalls are designed to provide advanced security for small to medium-sized businesses by ensuring secure communication across the internet and internal networks. The PIX 506E and PIX 506 are robust solutions that enable organizations to safeguard their networks from unauthorized access and threats.

One of the main features of the PIX 506E and PIX 506 is their stateful inspection firewall capability. This technology allows the device to track active connections and make intelligent decisions about which packets to allow or deny based on the state of the connection. This level of inspection adds an essential layer of security, as it helps prevent malicious traffic from entering the network while allowing legitimate traffic through.

The PIX 506E offers several improvements over the earlier 506 model, including enhanced performance and additional memory capacity. Both models provide services such as Network Address Translation (NAT), which allows multiple devices on a local network to share a single public IP address. This feature not only conserves the limited pool of IPv4 addresses but also adds a layer of security by hiding the internal IP addresses from external entities.

Adding to its functionality, the PIX firewalls include built-in Virtual Private Network (VPN) support. The VPN capabilities enable secure remote access for employees, allowing them to connect to the corporate network safely from various locations. The support for both IPsec and L2TP protocols ensures compatibility with a range of devices and clients, making it easier for businesses to implement secure remote access solutions.

The PIX 506E and PIX 506 are also equipped with user-friendly management interfaces, allowing network administrators to effectively monitor and configure their security settings. These interfaces support various management methods, including command-line interface (CLI) access and GUI-based management tools, making it easier to manage configuration and access policies.

In summary, the Cisco Systems PIX 506E and PIX 506 firewalls provide essential features for securing small to medium-sized networks. Their stateful inspection firewall capabilities, NAT support, and VPN access create a comprehensive security solution. With user-friendly management interfaces, Cisco's PIX series remains a significant choice for organizations looking to enhance their network security during its time in the market. These models laid the foundation for more advanced firewall technologies that would follow and continue to influence network security strategies today.