background image

Quick Start Guide

Cisco PIX 515E Security Appliance Quick Start Guide

1

Verifying the Package Contents 

2

Installing the PIX 515E Security Appliance

3

Configuring the Security Appliance

4

Common Configuration Scenarios

5

Optional Maintenance and Upgrade Procedures

Summary of Contents for PIX-515E

Page 1: ...E Security Appliance Quick Start Guide 1 Verifying the Package Contents 2 Installing the PIX 515E Security Appliance 3 Configuring the Security Appliance 4 Common Configuration Scenarios 5 Optional Maintenance and Upgrade Procedures ...

Page 2: ...remote management capabilities in an easy to deploy high performance solution About this document This document describes how to install and configure the security appliance for use in a VPN or DMZ deployment When you have completed the procedures outlined in this document the security appliance will be running a basic VPN or DMZ configuration The document provides only enough information to get t...

Page 3: ... PIX 515E PC terminal adapter 74 0495 01 Documentation Blue console cable 72 1259 01 Yellow Ethernet cable 72 1482 01 C i s c o P I X S e c u r i t y A p p l i a n c e P r o d u c t C D DO NOT INSTALL INTERFACE CARDS WITH POWER APPLIED Link FDX FDX 100 Mbps Link 100 Mbps FAILOVER PIX 515E CONSOLE 10 100 ETHERNET 1 10 100 ETHERNET 0 Failover serial cable 74 1213 01 Mounting brackets 700 01170 02 AO...

Page 4: ...is to the equipment rack Step 2 Use one of the provided yellow Ethernet cables 72 1482 01 to connect the outside 10 100 Ethernet interface Ethernet 0 to a DSL modem cable modem router or switch Step 3 Use the other provided yellow Ethernet cable 72 1482 01 to connect the inside 10 100 Ethernet interface Ethernet 1 to a switch or hub Step 4 Connect one end of the power cable to the rear of the PIX ...

Page 5: ...de interface is configured with a default DHCP address pool This configuration enables a client on the inside network to obtain a DHCP address from the security appliance in order to connect to the appliance Administrators can then configure and manage the security appliance using ASDM The outbound interface is configured to deny all inbound traffic through the outside interface This configuration...

Page 6: ...ddition to the ASDM web configuration tool you can configure the security appliance by using the command line interface For more information refer to the Cisco Security Appliance Command Line Configuration Guide and the Cisco Security Appliance Command Reference Using the Startup Wizard ASDM includes a Startup Wizard to simplify the initial configuration of your security appliance With a few steps...

Page 7: ...ction is established the LINK LED on the Ethernet 1 interface of the security appliance and the corresponding LINK LED on the switch or hub will become solid green Step 4 Launch the Startup Wizard a On the PC connected to the switch or hub launch an Internet browser b In the address field of the browser enter this URL https 192 168 1 1 Note The security appliance ships with a default IP address of...

Page 8: ...common to most DMZ implementations that use the security appliance The web server is on the DMZ interface and HTTP clients from both the inside and outside networks are able to access the web server securely In the Figure 2 an HTTP client 10 10 10 10 on the inside network initiates HTTP communications with the DMZ web server 30 30 30 30 HTTP access to the DMZ web server is provided for all clients...

Page 9: ...hat you want to make available to clients on the public network in this scenario a web server External IP addresses to be used for servers inside the DMZ Clients on the public network will use the external IP address to access the server inside the DMZ Client IP address to substitute for internal IP addresses in outgoing traffic Outgoing client traffic will appear to come from this address so that...

Page 10: ...Pools window appears allowing you to add or edit global address pools Note For most configurations global pools are added to the less secure or public interfaces 5 In the Manage Global Address Pools window a Choose the dmz interface b Click the Add button The Add Global Pool Item window appears ...

Page 11: ... Enter a unique Pool ID For this scenario the Pool ID is 200 e Click the OK button to go back to the Manage Global Address Pools window Note You can also choose Port Address Translation PAT or Port Address Translation PAT using the IP address of the interface if there are limited IP addresses available for the DMZ interface 7 In the Manage Global Address Pools window a Choose the outside interface...

Page 12: ...ick the OK button The configuration should be similar to the following 9 Confirm that the configuration values are correct then a Click the OK button b Click the Apply button in the main window Note Because there are only two public IP addresses available with one reserved for the DMZ server all traffic initiated by the inside HTTP client exits the security appliance using the outside interface IP...

Page 13: ...T is essential for small and medium businesses that have a limited number of public IP addresses available to them To configure NAT between the inside interface and the DMZ interface for the inside HTTP client complete the following steps starting from the main ASDM page 1 Click the Configuration button at the top of the ASDM window 2 Choose the NAT feature on the left side of the ASDM window 3 Cl...

Page 14: ... Dynamic radio button in the Translate Address To to section 9 Choose 200 from the Address Pools drop down menu for the appropriate Pool ID 10 Click the OK button 11 A pop up window displays asking if you want to proceed Click the Proceed button 12 On the NAT Translation Rules page verify that the displayed configuration is accurate 13 Click the Apply button to complete the configuration changes T...

Page 15: ...T feature on the left side of the ASDM window 2 Click the Translation Rules radio button Then click the Add button at the right side of the page 3 Choose the outside dmz interface from the drop down menu of interfaces 4 Enter the IP address 30 30 30 30 of the web server or click the Browse button to select the server 5 Choose 255 255 255 255 from the Mask drop down menu Then click the Static radio...

Page 16: ... table choose Add 2 In the Add Rule window a Under Action choose permit from the drop down menu to allow traffic through the security appliance b Under Source Host Network click the IP Address radio button c Choose outside from the Interface drop down menu d Enter the IP address of the Source Host Network information Use 0 0 0 0 to allow traffic originating from any host or network e Under Destina...

Page 17: ...r 80 a Click the TCP radio button under Protocol and Service b Under Source Port choose equal to from the Service drop down menu c Click the button labeled with ellipses scroll through the options and choose Any d Under Destination Port choose equal to from the Service drop down menu e Click the button labeled with ellipses scroll through the options and select HTTP ...

Page 18: ... button Note Although the destination address specified above is the private address of the DMZ web server 30 30 30 30 HTTP traffic from any host on the Internet destined for 209 165 156 11 is permitted through the security appliance The address translation 30 30 30 30 209 165 156 11 allows the traffic to be permitted h Click the Apply button in the main window The configurations should display as...

Page 19: ... a VPN connection such as the one in the above illustration requires you to configure two security appliances one on each side of the connection ASDM provides an easy to use configuration wizard to guide you quickly through the process of configuring a site to site VPN in a few simple steps Step 1 Configure the PIX security appliance at the first site Configure the security appliance at the first ...

Page 20: ...to Site VPN option connects two IPSec security gateways which can include security appliances VPN concentrators or other devices that support site to site IPSec connectivity b From the drop down menu choose outside as the enabled interface for the current VPN tunnel c Click the Next button to continue ...

Page 21: ...tion that you want to use by performing one of the following To use a pre shared key for authentication for example CisCo click the Pre Shared Key radio button and enter a pre shared key which is shared for IPSec negotiations between both security appliances Note When you configure the PIX 2 at the remote site the VPN peer is PIX 1 Be sure to enter the same Pre shared Key CisCo that you use here T...

Page 22: ...nnels between two peers To specify the IKE policy complete the following steps 1 Select the Encryption DES 3DES AES Authentication algorithms MD5 SHA and the Diffie Hellman group 1 2 5 used by the security appliance during an IKE security association Note When configuring PIX 2 enter the exact values for each of the options that you chose for PIX 1 Encryption mismatches are a common cause of VPN t...

Page 23: ...etworks Identify hosts and networks at the local site to be allowed to use this IPSec tunnel to communicate with the remote site peers The remote site peers will be specified in a later step Add or remove hosts and networks dynamically from the Selected panel by clicking on the or buttons respectively In the current scenario traffic from Network A 10 10 10 0 is encrypted by SA 1 and transmitted th...

Page 24: ... that you want to have access to the tunnel 6 Click the Next button to continue Step 6 Specify Remote Hosts and Networks Identify hosts and networks at the remote site to be allowed to use this IPSec tunnel to communicate with the local hosts and networks you identified in Step 5 Add or remove hosts and networks dynamically from the Selected panel by clicking on the or buttons respectively In the ...

Page 25: ... choosing one location from the Interface drop down menu 3 Enter the IP address and mask 4 Click Add 5 Repeat step 1 through step 5 for each host or network that you want to have access to the tunnel 6 Click the Next button to continue Note When configuring PIX 2 ensure that the values are correctly entered The remote network for PIX 1 is the local network for PIX 2 and the reverse ...

Page 26: ...n click Finish to complete the Wizard and apply the configuration changes to the security appliance Note When configuring PIX 2 enter the same values for each of the options that you selected for PIX 1 Encryption and algorithm mismatches are a common cause of VPN tunnel failures and can slow down the process This concludes the configuration process for PIX 1 ...

Page 27: ...gy such as secure remote management SSH ASDM and so on site to site VPN and remote access VPN Enabling the license requires an encryption license key If you ordered your security appliance with a DES or 3DES AES license the encryption license key comes with the security appliance If you did not order your security appliance with a DES or 3DES AES license and would like to purchase one now the encr...

Page 28: ...p 3 pix config activation key activation 5 tuple key Updates the encryption activation key by replacing the activation 4 tuple key variable with the activation key obtained with your new license The activation 5 tuple key variable is a five element hexadecimal string with one space between each element An example is 0xe02888da 0x4ba7bed6 0xf1c123ae 0xffd8624e The 0x is optional all values are assu...

Page 29: ... Locate the blue console cable from the accessory kit The blue console cable assembly consists of a null modem cable with RJ 45 connectors and a DB 9 connector Step 2 Connect the RJ 45 connector to the PIX 515E security appliance console port and connect the other end to the serial port connector on your computer See Figure 4 Step 4 hostname config configure factory default inside_ip_address addre...

Page 30: ...single port Ethernet circuit boards installed in the auxiliary assembly on the left of the unit at the rear the circuit boards are numbered top to bottom so that the top circuit board is Ethernet 2 and the bottom circuit board is Ethernet 3 99547 RJ 45 to DB 9 serial cable null modem PC terminal adapter DB 9 CONSOLE 10 100 ETHERNET 0 0 FDX Link 100 Mbps FAILOVER PIX 515 Console port RJ 45 DO NOT I...

Page 31: ...etwork cables to the interface ports Starting from the top left the connectors are Ethernet 2 Ethernet 3 Ethernet 4 and Ethernet 5 The maximum number of allowed interfaces is six with an unrestricted license Note Do not add a single port circuit board in the extra slot below the four port circuit board because the maximum number of allowed interfaces is six Step 4 Power on the unit from the switch...

Page 32: ... active unit Off Off when the unit is in standby mode If failover is not enabled this light is off NETWORK Green Flashing On when at least one network interface is passing traffic POWER ACT NETWORK 97779 97784 DO NOT INSTALL INTERFACE CARDS WITH POWER APPLIED CONSOLE 10 100 ETHERNET 0 ACT LINK LINK 100 Mbps ACT 100 Mbps FAILOVER USB 10 100 ETHERNET 1 PIX 515 10 100BaseTX ETHERNET 0 RJ 45 10 100Bas...

Page 33: ...ical resources These sections explain how to obtain technical information from Cisco Systems Cisco com You can access the most current Cisco documentation at this URL http www cisco com univercd home home htm You can access the Cisco website at this URL http www cisco com You can access international Cisco websites at this URL http www cisco com public countries_languages shtml ...

Page 34: ...t this URL http www cisco com univercd cc td doc es_inpck pdi htm You can order Cisco documentation in these ways Registered Cisco com users Cisco direct customers can order Cisco product documentation from the Ordering tool http www cisco com en US partner ordering Nonregistered Cisco com users can order documentation through a local account representative by calling Cisco Systems Corporate Headq...

Page 35: ...t_rss_feed html Reporting Security Problems in Cisco Products Cisco is committed to delivering secure products We test our products internally before we release them and we strive to correct all vulnerabilities quickly If you think that you might have identified a vulnerability in a Cisco product contact PSIRT Emergencies security alert cisco com Nonemergencies psirt cisco com Tip We encourage you...

Page 36: ...uct serial number before submitting a web or phone request for service You can access the CPI tool from the Cisco Technical Support Website by clicking the Tools Resources link under Documentation Tools Choose Cisco Product Identification Tool from the Alphabetical Index drop down list or click the Cisco Product Identification Tool link under Alerts RMAs The CPI tool offers three search options by...

Page 37: ...ant aspects of your business operation are negatively affected by inadequate performance of Cisco products You and Cisco will commit full time resources during normal business hours to resolve the situation Severity 3 S3 Operational performance of your network is impaired but most business operations remain functional You and Cisco will commit resources during normal business hours to restore serv...

Page 38: ...ow they can use technology to increase revenue streamline their business and expand services The publication identifies the challenges facing these companies and the technologies to help solve them using real world case studies and business strategies to help readers make sound technology investment decisions You can access iQ Magazine at this URL http www cisco com go iqmagazine Internet Protocol...

Page 39: ...39 ...

Page 40: ... Cisco Systems has more than 200 offices in the following countries Addresses phone numbers and fax numbers are listed on the C i s c o W e b s i t e a t w w w c i s c o c o m g o o f f i c e s Argentina Australia Austria Belgium Brazil Bulgaria Canada Chile China PRC Colombia Costa Rica Croatia Cyprus Czech Republic Denmark Dubai UAE Finland France Germany Greece Hong Kong SAR Hungary India Indon...

Page 41: ...41 ...

Page 42: ...42 ...

Reviews: