cc/td/doc/product/iaabu/pix
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Cisco PIX Firewall Version 3.0.6 Release Notes

Cisco PIX Firewall Version 3.0.6 Release Notes

February 1997

The Cisco PIX Firewall provides network firewall and translation services.

The sections that follow list the product changes.

New in This Release

The following features are new in this release:

groom Command

PIX Firewall now includes the groom command to permit traditional flash memory circuit boards to operate at peak efficiency. The firewall calls this command when flash memory is full; that is, when you try to save your configuration and insufficient memory is available to store it.

In the past, when the firewall wrote to flash memory, the flash memory appended the image to its existing memory. Eventually, the circuit board ran out of memory and caused system failure. With the groom command, the firewall stores the existing configuration in flash memory in RAM and clears the complete memory space. Then it restores the image back into flash memory.

The command syntax is:

groom

There are no options for this command.

You can either wait until you run out of memory or run it as part of your preventative maintenance schedule, either monthly or every few months, depending on how many times you change the configuration and save it to flash memory.


Note When you run the groom command, do not interrupt the system because vital information can be lost. Before running this command, save a copy of the configuration on floppy disk and ensure all other console users are not using the unit.

An example of using this command follows:

pixfirewall(config)# groom
Grooming flash. This will take a moment. DO NOT INTERRUPT.
pixfirewall(config)#

Downloading Upgrades from Cisco Connection Online (CCO)

To download upgrades from CCO:

Step 1 Use a network browser, such as Netscape Navigator to access http://www.cisco.com.

Step 2 If you are a registered CCO user, click LOGIN in the topmost graphic on the page. If you have not registered, click REGISTER and follow the steps to register.

Step 3 After you click LOGIN, a dialog box appears requesting your User Name and Password. Enter these and click OK.

Step 4 When you are ready to continue, choose Service & Support.

Step 5 On the Service & Support page, find Software Library and choose Cisco Software Images from the choices below the Software Library selection.

Step 6 On the Software Image Library page, scroll down to the Internet Products heading and choose Private Internet Exchange (PIX) Software.

Step 7 On the Cisco Private Internet Exchange (PIX) page, if you will use a MS-DOS or Windows PC to create the PIX Firewall floppy disk, click the pix306.exe self-extracting archive. If you will use a UNIX system, click the pix306.bin file option. Click Execute to continue.

Step 8 The Software Download page appears and lets you specify either a domestic or international site from which to download the file, or to send the file to a remote location by FTP or email.

If you are using UNIX, proceed to the section "If You Are Using UNIX," page 4; if you are using Windows or MS-DOS, continue with the next section.


If You Are Using Windows or MS-DOS

Step 1 Exit the network browser and start an MS-DOS shell prompt. Choose or create a directory to contain the files from the archive. Enter the name of the self-extracting archive at the DOS command prompt and press the Return key. The archive unloads three files:

A sample archive extraction follows:


C:\pix>pix306.exe
PKSFX (R)   FAST!   Self Extract Utility   Version 2.04g  02-01-93
Copr. 1989-1993 PKWARE Inc. All Rights Reserved. Shareware version
PKSFX Reg. U.S. Pat. and Tm. Off.
Searching EXE: C:/PIX/PIX306.EXE
  Inflating: SAMPLE.CFG
  Inflating: RAWRITE.EXE
  Inflating: PIX306.BIN
C:\pix>

Step 2 Locate a floppy disk, ensure it is IBM formatted, and does not contain useful files. When the PIX Firewall floppy disk is created, all the files on the floppy disk are erased.

Step 3 Enter rawrite at the command prompt and the utility prompts you for the name of the source binary file, the output device (a: or b: for a 3.5-inch floppy disk), and to then insert a formatted floppy disk. The utility then creates the PIX Firewall floppy disk.

A sample rawrite session follows:


C:\pix>rawrite
RaWrite 1.2 - Write disk file to raw floppy diskette
Enter source file name: pix306.bin
Enter destination drive: a:
Please insert a formatted diskette into drive A: and press -ENTER- :
Number of sectors per track for this disk is 18
Writing image to drive A:.  Press ^C to abort.
Track: 28  Head:  1 Sector: 16
Done.
C:\pix>

Step 4 Remove the floppy disk from the drive, place it in the PIX Firewall floppy disk drive and power cycle the unit. Alternately, if your unit has a Reset switch, use it, or you can enter the reload command from the PIX Firewall console. The PIX Firewall then boots from the new floppy disk.

If You Are Using UNIX

Step 1 Download the binary file to your local directory.

Step 2 Insert a diskette in your workstation's floppy disk drive.

Step 3 Enter the following command to copy the binary file to the floppy disk:

This command copies the binary file to the output device file with a block size of 18 bytes.


Step 4 Eject the floppy disk and insert it in the PIX Firewall floppy disk drive and power cycle the unit. Alternately, if your unit has a Reset switch, use it, or you can enter the reload command from the PIX Firewall console. The PIX Firewall then boots from the new floppy disk.



Upgrading from a Previous Version


Note If you are upgrading from version 2.x to version 3, the installation program converts your old configuration to the new version commands. However if you have Private Link, you must enter the Private Link commands separately.

Before upgrading from version 2 to version 3, save your configuration to floppy disk with the
version 2 save -f command and remove this floppy disk from your drive before proceeding.

If you want to remove version 3 to reinstall version 2, refer to the next section, "Removing Version 3 to Reinstall Version 2."

The prompts you see when you upgrade PIX Firewall from a previous version are described in this release note. They are not covered in the Cisco PIX Firewall User Guide. To upgrade, insert the upgrade disk in the PIX Firewall floppy disk drive and power cycle the unit.

These messages appear:

PIX Bios V2.7
Booting Floppy
...................................Execing flop
PIX Floppy loader version 1.12
Starting second stage loader.
..
PIX Floppy cloader version 1.0
Flash=i28F020
Reading floppy image..............................
Flash version 3.1.0.106, Floppy version 3.0.6
Installing to flash
Activation Key: 6e2e72f3 1b681128 d690bbfb 37e44fb
Do you want to enter a new activation key? [n]

Note Only enter y if you are upgrading to more connections. Before agreeing to enter an activation key, you need to have previously contacted Cisco Sales and purchased additional user licenses and obtained the activation key which you will enter next.

If you are not adding additional user licenses, enter n and your unit starts normally.

Remaining Messages

These messages appear:

Erasing flash...
Writing image into flash...
8MB RAM
mcwa i82557 Ethernet @ irq 11  MAC: 00a0.c90a.eb43
mcwa i82557 Ethernet @ irq 5  MAC: 00a0.c90a.eb4d
Flash=i28F020
           P r i v a t e     I n t e r n e t     e X c h a n g e
  -----------------------------------------------------------------------
                      ppppppp     iiiii  xxx    xxx
                      p      p      i     x      x
                      p       p     i      x    x
                      p       p     i       x  x
                      p       p     i        xx
                      p      p      i        xx
                      ppppppp       i       x  x
                      p             i      x    x
                      p             i     x      x
                      p           iiiii  xxx    xxx
  -----------------------------------------------------------------------
                         (c) Cisco Systems, Inc.
PIX Version 3.0.6
Maximum Connections:  32
Copyright (c) 1996 by Cisco Systems, Inc.
                Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
                Cisco Systems, Inc.
                170 West Tasman Drive
                San Jose, California 95134-1706
pixfirewall>

You are now ready to configure your system. Refer to the Cisco PIX Firewall User Guide for more information.

Specifying an Activation Key

If you are adding additional user licenses, enter y. The following messages appear:

Do you want to enter a new activation key? [n] y
Enter Activation Key
    Part 1 of 4: 1d13b691
    Part 2 of 4: fae588c1
    Part 3 of 4: 64d1d76a
    Part 4 of 4: ef7f773f

If you make a mistake while entering the activation key, a message appears indicating that the key is incorrect, and you are prompted to enter it again. After you enter the activation key, the messages that follow are the same as those in the previous section "Remaining Messages," page 5.

Removing Version 3 to Reinstall Version 2

The following procedure assumes that you backed up your version 2 configuration on floppy disk before installing version 3. If you did not back up your configuration, skip Step 4 and re-enter your configuration from the PIX Firewall console.

To remove PIX Firewall version 3 and reinstall version 2:


  1. Access version 3 privileged mode by entering the enable command at the command prompt.

  2. If you created a version 3 configuration, store it on floppy disk with the version 3 write floppy command.

  3. Insert your original serialized version 2 Cisco PIX Firewall system floppy disk in your PIX Firewall and enter the version 3 reload command or power cycle your unit. If you upgraded version 3 for additional session licenses, the additional session licenses will not work in version 2. Version 2 requires a separate upgrade to obtain additional session licenses that you can obtain from Cisco Sales.

  4. After you boot your unit with the version 2 system floppy disk, remove the floppy disk and insert the backup copy you made of your version 2 configuration. Restart your PIX Firewall by entering the version 2 reboot command.

You can now use your PIX Firewall in version 2.

New auth-user Command Options

The syntax of the auth-user, clear auth-user, and no auth-user commands have changed to allow different authentication servers for incoming or outbound connections. The new command syntax is:

auth-user inside|outside type ip_address netmask
clear auth-user inside|outside type ip_address netmask
no auth-user inside|outside type ip_address netmask

The inside parameter indicates that the connection originated from the inside of the PIX Firewall. The outside parameter indicates that the connection is from the outside. As described in the Cisco PIX Firewall User Guide, type is radius or tacacs+, ip_address is the address to which or from which authentication is performed, and netmask is the network mask of the IP address.

New mtu Command

The new mtu commands lets you specify the MTU (Maximum Transmission Unit) value for the specified network interface. For Ethernet interfaces, the default MTU, 1550 bytes in a block, is sufficient for most applications. For Token Ring, you may need to specify different values to correspond to the needs at your site. The default value for the mtu command depends on the type of network interface specified in the interface command; 1500 bytes for Ethernet, 8192 bytes for Token Ring. The minimum value for bytes is 64 and the maximum is 65535 bytes.

According to RFC 1191 [Mogul and Deering 1990], each type of network interface has a different recommended value. The RFC recommends 1500 bytes for Ethernet, 17914 for 16Mbps Token Ring, and 4464 for 4Mbps Token Ring.

The syntax of the mtu commands are:

mtu inside|outside bytes
no mtu [inside|outside]
show mtu [inside|outside]

The inside and outside parameters let you indicate the network interface for which you are setting the block size. The no mtu command resets the MTU block size to the default. The show mtu command displays the current block size. The minimum block size is 64 bytes, the maximum is 65535 bytes, and entering a value of zero causes an error message to display.

conduit Command Description

The description of the conduit command contains incorrect information. On page 4-20 of the Cisco PIX Firewall User Guide, the paragraph before the example and the example itself describe the version 2.7 conduit command and not the version 3 command.

The text should read:

If a conduit is specified as the example that follows, host 192.168.2.2 can access the inside host that is mapped to the global address 192.168.1.1 on any TCP port:

conduit 192.168.1.1 0 tcp 192.168.2.2 255.255.255.255

When the port is specified as zero, all ports of the specified protocol can be accessed. The same syntax applies for UDP.

See also: no conduit, show conduit.

Example

The following pair of commands enables only SMTP communication between the UNIX gateway host with IP address 10.10.25.10 and an SMTP server on the inside network with IP address 192.168.1.49:

pixfirewall(config)# static 10.10.26.147 192.168.1.49 255.255.255.255
pixfirewall(config)# conduit 10.10.26.147 25 tcp 10.10.25.10 255.255.255.255

To remove the last conduit, enter the no conduit command:

pixfirewall(config)# no conduit 10.10.26.147 25 tcp 10.10.25.10

Failover with Token Ring Restriction

For firewalls containing a Token Ring interface card, if the card, cable, or hub fails, the firewall only detects the failure after 30 seconds. Once this duration elapses, failover proceeds normally.

interface ethernet Command Options

The interface ethernet command format follows:

interface ethernet inside|outside 10baseT|100baseTX|auto|aui|bnc

inside

Network interface for inside PIX Firewall network.
outside Network interface for outside the PIX Firewall.
10baseT Sets 10 megabit Ethernet and half duplex communications.
100baseTX Sets 100 megabit Ethernet and half duplex communications.
auto Automatically determines networking speed and sets full duplex communications.
aui Sets 10 megabit Ethernet half duplex communications for an AUI cable interface.
bnc Sets 10 megabit Ethernet half duplex communications for a BNC cable interface.

The aui and bnc options are not described in the interface ethernet command description in the Cisco PIX Firewall User Guide (Document Number 78-3728-01).


Note The aui and bnc options will be obsoleted in a future release.

HTML Management Interface Fix

The PIX Firewall HTML management interface now works with Microsoft Internet Explorer.

IP Fragmenting Restriction

IP does not reassemble fragmented packets destined for the PIX Firewall interface.

Private Link Description

The link command description in the Cisco PIX Firewall User Guide states that you can have 64 Private Links. This number should be 256 Private Links.

route Command Description

The route command description in the Cisco PIX Firewall User Guide contains an error in the first line of the example at the bottom of page 4-70. The third command parameter is the gateway IP address.

SNMP MIB Notes

PIX Firewall does not support browsing of the Cisco SYLOG MIB (Management Information Base). The only MIBs you can browse are the System, Interfaces, and SNMP groups of MIB-II.

To receive security and failover SNMP traps from the PIX Firewall, compile the Cisco SYSLOG MIB into your SNMP management application.

If you do not compile the Cisco SYSLOG MIB into your management application, you will only receive MIB-II traps for link up or down, and cold or warm start from the PIX Firewall.

static Command Description

The example for the static command on page 4-111 of the Cisco PIX Firewall User Guide does not provide an example. The example should read:

pixfirewall(config)# static 128.192.251.11 10.1.1.1

The first parameter is a global IP address and the second is a local IP address.

Token Ring Restrictions

Cisco Connection Online

Cisco Connection Online (CCO), formerly Cisco Information Online (CIO), is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional content and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously--a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.



hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1997 © Cisco Systems Inc.