Ease of configuration and maintenance

149

9.2.2.7 High-speed access

For those with ultra-high-capacity lines, such as fractional or full DS3s T3s, the PIX, with its two 100-megabit Ethernet cards, can easily handle a significant amount of Internet traffic. Although we wouldnt recommend piping a T3s full load of traffic through only one machine, the fact that the capacity is there is quite a benefit.

9.2.2.8 Links

By using an additional card that comes separately, the PIX firewall can be used to create an encrypted channel between itself and another such unit somewhere out on the public side of the PIX. This private link encryption feature gives the PIX firewall its most tremendous benefit: it lets organizations link private Internets securely using the public networks, with very simple configuration. Thats what this book is all about. One slight disadvantage is that the PIX firewall supports only IP traffic. We suppose this could be considered an advantage as well.

9.2.3 Limitations of the PIX Firewall

Even though the PIX is a nearly complete solution to the development of a virtually private network, it does have some drawbacks in terms of maintenance, network address translation limits, and price.

9.2.3.1 Hardware solution

Hardware can be tricky if mismanaged, difficult to debug if misconfigured, and hard to replace quickly if broken. Hardware like the PIX is provided by only one vendor, and you cant be sure what will happen to the vendor in the future.

9.2.3.2 Dynamic address use

There is a limited pool of addresses that the PIX can assign to hosts on your internal network that want to communicate with the outside. Cisco sells a few different varieties of the product, allowing for 32, 256, or 1024 sessions simultaneously. Remember that one user could be using many different sessions at once, so there is a definite limit on how much a PIX can handle when its connected to a huge network.

9.2.3.3 Budgetary considerations

A whole squadron of Cisco PIX units might be prohibitively expensive to widely distribute across your network. The PIX firewall has a suggested retail price in the tens of thousands of dollars, and the encryption cards required to create VPN tunnels go for a few thousand each.

9.2.3.4 Maintenance

As with any new equipment, you have to consider the need for ongoing maintenance and growth. The PIX firewall, which may be initially easy to configure, could grow to have a complex configuration even if there are no other firewalls providing a similar function. The persons in charge of coordinating network activity need to establish a plan for how traffic needs to be restricted, and to which networks these restrictions apply. Subtle mistakes in the configuration could lead to potentially large security holes. 150

9.3 Configuring the PIX as a Gateway

The PIX firewall comes standard with two switchable 10100 Megabit Ethernet cards, a serial console port, a failover control card, some required cabling and mounting parts, and possibly a secure encryption card, depending on the bundle purchased. In this section we will set up a PIX unit right out of the box, configure it for basic operation, and set up an average firewall. Beyond that, we will illustrate the setup of multiple PIX units so that they may link to one another across the Internet, thus creating a VPN. In this section, we show you how to connect to the PIX so you can configure it, how to set up your firewall on the PIX, and how to do some initial testing. Configuration of the PIX doesnt affect configuration of any other hosts on the inner or outer networks, which you can still set up using traditional rules. The configuration examples in this chapter were set up using the 4.1.6 version of the PIX operating software.

9.3.1 Connecting to the PIX

Example 9-1 shows the PIX boot screen, which is sent to the console port when the unit powers on. A serial console cable, supplied with the unit, must be attached to a personal computer, and the terminal software must be configured as follows before any commands may be input into the system: • 9600 baud • 8 bits, no parity, 1 stop bit To confirm that the connections are made properly and that the terminal software is set up right, simply booting the PIX firewall should produce the output seen in Example 9-1 . Example 9-1. PIX Console Startup Screen Copyright c 1996-1998 by Cisco Systems, Inc. Restricted Rights Legend Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph c of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph c 1 ii of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013. Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 Type ? for help armadillo 0

9.3.2 A Sample Configuration

The configuration of the firewall is pretty straightforward. Given our test scenario featured in Figure 9-2 , we have developed a configuration that meets those requirements. Here are the configuration parameters we entered into our PIX: