cc/td/doc/product/iaabu/pix
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

PIX Firewall Series Version 4.0.6 Release Notes

PIX Firewall Series Version 4.0.6 Release Notes

August 5, 1997

Cisco's PIX Firewall provides firewall and network translation services.

The following topics are covered in these release notes:


Note PIX Firewall now encrypts passwords in the configuration when you use a write command to view or store the configuration. If you change a PIX Firewall password, write the new password down and store it in accordance with your site's security policy.

Version 4.0.6 Features

Version 4.0.6 contains the following features:

Bug Fixes

The following bugs were fixed in version 4.0.6:

Future Warning

PIX Firewall version 4.1 will obsolete the lnko, lnkopath, and show actkey commands.

Usage Notes

The following usage notes apply to all PIX Firewall version 4 releases:

In version 4, single IP addresses specified in the global command indicate port address translation. To specify a network global, enter it as 10.1.1.1-10.1.1.254. In version 3, after a network global statement was entered, it was converted in the configuration to the dash form (10.1.1.1-10.1.1254). Therefore, there are no conversion issues with this command.

Step 1 Use the show config command to view the encrypted form of the privileged mode password. You must enter the text representation of the encrypted password in version 3 to access privileged mode.

Step 2 Remove the aaa commands from your configuration.

Step 3 Reload version 3 software.

Step 4 Add the appropriate auth commands back in.

Documentation Corrections

The following corrections apply to the PIX Firewall Series Configuration Guide, Chapter 3, "Command Reference."

age Command

The minimum duration is 1 minute.

alias Command

In the second to the last sentence on the page, the sentence should read: The packet goes to the PIX Firewall with SRC=192.9.200.123 and DST=192.168.1.33.

clear telnet Command

The ip_address and netmask parameters are optional. This command is the same as the no telnet command.

conduit Command

The ip_address parameter should state that this is an outside IP address.

link Command

The md5 parameter is optional, not required as shown in the syntax.

mailhost Command

All mail hosts that you create with the mailhost command must be on the inside network.

nat Command

The max_conns parameter applies to all TCP connections, not just mail connections as indicated.

When you use the nat 0 0 command, the NIC-registered addresses you want visible on the outside must be identified with the static and conduit commands as shown in the following example. This example makes inside host 207.31.17.1 visible on the outside for FTP access to the outside 192.159.1.0 network:

nat 0 0
static 207.31.17.1 207.31.17.1
conduit 207.31.17.1 ftp tcp 192.159.1.0 255.255.255.0

no alias Command

This command requires that you specify both the inside and outside IP addresses to delete an alias entry.

no http Command

The netmask parameter is optional.

no link Command

You can use the md5 option instead of the key-id and key parameters to disable use of the MD5 encryption protocol for the remote IP address.

The example for this command is:

no link 192.168.0.42 1 beebee
no link 192.168.0.50 md5

no nat Command

The ip_address parameter is optional.

no telnet Command

The ip_address and netmask parameters are optional.

outbound Command

The java option is shown as a separate parameter from port. This description should state that java is an alternate name for port 80 (web access) that provides more control over web access. The java keyword lets you filter out Java applets while still permitting web access.

The correct syntax for the outbound command is:

outbound num permit | deny ip_address [netmask] [java | [port[-port]]]

The following example enables web access at port 80, but filters out Java applets:

outbound 1 permit 192.168.42.54 255.255.255.255 80
outbound 1 deny 192.168.42.54 255.255.255.255 java
apply 1 outgoing_src

To disable web access, use the outbound ... deny ... 80 command.

radius-server host Command and tacacs-server host Command

The total number of RADIUS and TACACS+ servers allowed is 16.

show alias Command

The example should be:

show alias
alias 10.2.3.0 10.4.5.0 255.255.255.0

show who Command and who Command

The show who and who commands only show Telnet console sessions, not serial port console sessions or HTTP management interface sessions.

show xlate Command

Line 2 of the example should read:

name 192.150.49.12 server_12

Also, a "slot" is a global IP address to which one or more connections are associated. If Port Address Translation (PAT) is occurring, a slot is a single port.

timeout Command

The xlate duration must be at least 5 minutes, the conn duration must be at least 5 minutes, the udp duration must be at least 1 minute, the rpc duration must be at least 1 minute, the h323 duration must be at least 5 minutes, and the uauth duration must be shorter than the xlate duration and at least 2 minutes.

Version 4.0.5 Features

PIX Firewall version 4.0.5 contains the following features:

established udp|tcp [[port]-port] permit[to|from] [udp|tcp] [[port]-port]
The new features let you narrow the hole that the established command opens for multimedia applications. The port options let you specify the TCP or UDP port and whether connections can be started to or from a specified port. An example is:

Bug Fixes

The following bugs were fixed in version 4.0.5:

Version 4.0.4 Features

PIX Firewall version 4.0.4 introduced the features described in the sections that follow.

aaa authentication except Option

The except option lets you create an exception to a previously set authentication range. This option is an unsupported early field test feature. The following example authenticates every outbound connection except those originating at host 10.1.42.1:

aaa authentication any out 0 0 tacacs+
aaa authentication except out 10.1.42.1 255.255.255.255 tacacs+

alias Command

Up to 256 alias statements are now permitted.

outbound except Option

The except option replaces the deny or permit options and lets you create an exception to a previously set outbound definition. This option is an unsupported early field test feature. The following example disables all outbound web traffic except to destination host 204.31.17.2:

outbound 11 deny 0 0 80
outbound 11 except 204.31.17.2 255.255.255.255 80
apply 11 outgoing_dest

Refer to the "Usage Notes" section for additional information on the use of this command.

URL Logging

URL logging now displays the user name from user authentication.

Bug Fixes

The following bugs were fixed in version 4.0.4:

This error occurred if the SYSLOG host is an outside host to which access fails. The SYSLOG host is only supported for use on the inside network. The message that replaced the old message is:
The inside SYSLOG host must be active while the PIX Firewall is operational. [CSCdj11794]

Version 4.0.3 Features

PIX Firewall version 4.0.3 consists of all the features of version 4.0 described in your documentation set plus the following:

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.

If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.



hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1997 © Cisco Systems Inc.