
2-18
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 2 Establishing Connectivity
Configuring the PIX Firewall for Routing
• Redistribution of routes between non-OSPF routing protocols
• Policy Routing
A maximum of two OSPF processes are allowed and PIX Firewall will only allow redistribution between
these OSPF processes.
Any topology in which the same router is connected to two different interfaces of the PIX Firewall is not
supported.
Note When you configure OSPF on either IOS or the PIX Firewall using the default-information originate
command with the always keyword and a route-map with match clauses, there must be a route to match
in the routing table. If there is no match, then the route is not redistributed. If a system is configured with
the always keyword, it will not install a default route from another system. Also, do not configure a
default route with the IP address of a PIX Firewall interface as a gateway.
Configuring OSPF on the PIX Firewall
This section describes how to configure the PIX Firewall when using OSPF. It includes the following
topics:
• Using OSPF in Public Networks, page 2-18
• Using OSPF in Private and Public Networks, page 2-20
Using OSPF in Public Networks
Figure 2-3 illustrates an implementation of PIX Firewall using OSPF in public and private networks.
Figure 2-3 Using OSPF with PIX Firewall Version 6.3
83961
PIX Firewall
Version 6.3 or higher
DMZ
Intranet
Router2
Router1
Router3
OSPF
OSPFOSPF
Internet
This example illustrates the PIX Firewall as an ABR, configured to filter Type 3 LSAs, with NAT
enabled on the inside interface, NAT disabled on the DMZ, and all interfaces running OSPF. Router1 is
a locally controlled ASBR running OSPF and Border Gateway Protocol (BGP).
Note If NAT is enabled, but OSPF is running only in public areas, the only special configuration required is
to configure static routes for the private networks protected by the PIX Firewall.
Comentarios a estos manuales