Cisco PIX 525 Especificaciones Pagina 34

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 466
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 33
1-8
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 1 Getting Started
Protecting Your Network from Attack
Object Grouping
Object grouping, introduced in PIX Firewall Version 6.2, reduces the complexity of configuration and
improves scalability for large or complex networks. Object grouping lets you apply access rules to
logical groups of network objects. When you apply a PIX
Firewall command to an object group, the
command affects all network objects defined within the group. This can reduce a very large number of
access rules to a manageable number, which reduces time spent configuring and troubleshooting access
rules in large or complex networks.
Conduits
Beginning with Version 5.3, the PIX Firewall uses access lists to control connections between inside and
outside networks. Access lists are implemented with the access-list and access-group commands. These
commands are used instead of the conduit and outbound commands, which were used in earlier
versions of PIX Firewall software. In major software releases after Version 6.3, the conduit and
outbound commands are no longer supported. To migrate an obsolete PIX configuration file that
contains conduit and outbound commands to a supported configuration file that contains the equivalent
access-list commands, a tool is available to help with the conversion process:
https://cco-dev.cisco.com/cgi-bin/Support/OutputInterpreter/home.pl (online tool)
http://www.cisco.com/cgi-bin/tablebuild.pl/pix (download tool)
VLAN Support
Virtual LANs (VLANs) are used to create separate broadcast domains within a single switched network.
PIX
Firewall Version 6.3 can route traffic between these broadcast domains, while applying the firewall
policy for your network. PIX
Firewall now supports 802.1Q, which allows traffic for multiple VLANs
to be exchanged over a single physical link. With Version 6.3, you can define multiple logical interfaces
for a single physical interface, and assign different VLANs to each logical interface.
Protecting Your Network from Attack
This section describes the firewall features provided by PIX Firewall. These firewall features control
network activity associated with specific kinds of attacks. This section includes the following topics:
Unicast Reverse Path Forwarding, page 1-9
Mail Guard, page 1-9
Flood Guard, page 1-9
FragGuard and Virtual Reassembly, page 1-9
FragGuard and Virtual Reassembly, page 1-9
DNS Control, page 1-9
ActiveX Blocking, page 1-10
Java Filtering, page 1-10
URL Filtering, page 1-10
Configurable Proxy Pinging, page 1-10
Vista de pagina 33
1 2 ... 29 30 31 32 33 34 35 36 37 38 39 ... 465 466

Comentarios a estos manuales

Sin comentarios