cc/td/doc/product/iaabu/pix/pix_v41
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Command Reference

Command Reference


Note Before using this chapter, read Chapter 2, "Configuring the PIX Firewall" for important information about configuring, command line editing, and dependencies.

Also read the current PIX Firewall release notes for the latest information about new features, command changes, and usage notes.

Note Because many command lines are long, command line prompts are only shown in examples if they are required for understanding the context. Of the command line prompts shown, most do not have the history reference number in the prompt because the numeric value at the end of the prompt changes with each command.

Terminology

Table 3-1 defines terminology used when describing commands and options affected by the third interface feature:


Table 3-1: Terminology
Term Description
if_name The internal or external network interface name. If your PIX Firewall contains two interface boards, if_name is either inside or outside.

Any syntax descriptions in this book that contain if_name have the same properties as if_name described here.

You can optionally specify an interface name for the following commands: alias, apply, conduit, global, mailhost, nat, and static. For each of these commands, the interface name must be enclosed in parentheses.

For any command that previously accepted an interface name, you must specify an interface name and you can alternately specify the name of an additional interface. These commands are: arp, ip address, mtu, ping, rip, and route. Note that for these commands, the interface name must not be enclosed in parentheses.

internal network The most relatively secure interface. If your PIX Firewall contains two interface boards, the internal network is the inside network. If your PIX Firewall has three or more interface boards, provide a name for the internal network and set its security level with the nameif command.
external network The relatively least secure interfaces. If your PIX Firewall has two interface boards, the external network is the outside network. If your PIX Firewall has three or more interface boards, provide a name for the external network(s) with the nameif command.
IP addresses IP addresses are primarily one of four values:
If the alias command is in use, an inbound message from foreign_ip, the source address, foreign_ip is translated to dnat_ip by PIX Firewall. In an outbound message destined to dnat_ip, it will be untranslated to foreign_ip. In SYSLOG messages, this address is referenced as faddr.

Note: In this guide, the use of "address" and "IP address" are used synonymously.

When you create an internal network, we recommend that you use one of the following address groups reserved by the Network Working Group (RFC 1918) for use with private network addressing:

  • Class A: 10.1.1.1 to 10.254.254.254

  • Class B: 172.16.1.1 to 172.31.254.254

  • Class C: 192.168.1.1 to 192.168.254.254

aaa

Enable, disable, or view TACACS+ or RADIUS user authentication and authorization.

(Configuration mode.)

aaa authentication service inbound|outbound local_ip mask tacacs+|radius

no aaa authentication [service inbound|outbound local_ip mask tacacs+|radius]

aaa authentication except inbound|outbound local_ip mask tacacs+|radius

no aaa authentication except [inbound|outbound local_ip mask tacacs+|radius]

aaa authorization service inbound| outbound local_ip mask

no aaa authorization [service inbound| outbound local_ip mask]

show aaa
Syntax Description
service The application that will be used to provide authentication. Use any, ftp, http, or telnet. The any value specifies FTP, HTTP, or Telnet. (HTTP is the web and only applies to web browsers that can prompt for a user name and password.)

If the authentication or authorization server is authenticating services other than FTP, HTTP, or Telnet, using any will not permit those services to authenticate in the firewall. The firewall only knows how to communicate with FTP, HTTP, and Telnet for authentication and authorization.

Only set this parameter to a service other than any if the authentication or authorization server is set the same way. Unless you want to temporarily restrict access to a specific service, setting a service in this command can increase system administration work and may cause all connections to fail if the authentication or authorization server is authenticating one service and you set this command to another.

except Create an exception to a previously specified set of services.
inbound Authenticate or authorize inbound connections.
outbound Authenticate or authorize outbound connections.
local_ip An inside host. On inbound connections, local_ip is the inside host to which access is sought. On outbound connections, local_ip is the inside host from which a connection originates.

In most cases, set this address to 0 (same as 0.0.0.0) so that the aaa command lets the authentication server decide which hosts are authenticated.

If you set the IP address in aaa, you have to ensure that it is the same in the nat, static, or mailhost commands (if used).

mask Network mask of source_ip. Always specify a specific mask value. Use 0 if the IP address is 0.
tacacs+ (aaa authentication only.) Authenticate using Terminal Access Controller Access Control System (TACACS+).
radius (aaa authentication only.) Authenticate using Remote Authentication Dial-In User Service (RADIUS).
Usage Guidelines

The aaa command lets you specify that user login credentials be requested for either inbound or outbound connections. This command works with either TACACS+ or RADIUS authentication.


Note RADIUS can only be used for authentication and not authorization.

The PIX Firewall interacts with FTP, HTTP (web access), and Telnet to display the credentials prompts for logging into the network or logging in to exit the network. You can specify that only a single service be authenticated, but this must agree with the authentication server to ensure that both the firewall and server agree. You can also specify which inside IP address can start outbound connections or to which inside IP address inbound connections are targeted; however, this too must agree with the configuration of the authentication server. Refer to for more information on the command options.

The no aaa authentication command disables user authentication. The show aaa authentication command displays the aaa authentication statements in the configuration.


Note The aaa command is not intended to mandate your security policy. The authentication and authorization servers determine whether a user can or cannot access the system, what services can be accessed, and what IP addresses the user can access.

Note When the aaa command is enabled, before users can access MS-IIS sites, they must visit other sites to be authenticated before the MS-IIS sites can be accessed.

The aaa authorization command authorizes users' access to services. Only use this command after the aaa authentication command, which determines whether users are authenticated with TACACS+.

You cannot authorize FTP using a web browser's FTP; for example, ftp://ftp.xxx.com, and expect the World Wide Web HTTP authentication screen to display. To enable authorization for web use, but not FTP, use these commands:

aaa authorization http outbound source_ip netmask
aaa authorization telnet outbound source_ip netmask

FTP authorization is only supported for command line FTP clients or ws_ftp (a Windows GUI-based FTP client).

The no aaa authorization command disables user authorization. The show aaa authorization command displays aaa commands in the configuration.

Example

The following example specifies that IP addresses 10.0.0.1 through 10.0.0.254 can originate outbound connections and then enables user authentication so that those addresses must enter user credentials to exit the firewall. In this example, the first aaa authentication command permits authentication on FTP, HTTP, or Telnet depending on what the authentication server handles. The second aaa authentication command lets host 10.0.0.42 start outbound connections without being authenticated.

nat 1 10.0.0.0 255.255.255.0
aaa authentication any outbound 0 0 tacacs+
aaa authentication except outb 10.0.0.42 255.255.255.255 tacacs+ 

The next example permits inbound access to any IP address in the range of 204.31.17.1 through 204.31.17.254. All services are permitted by the conduit command and the aaa authentication command permits authentication on FTP, HTTP, or Telnet depending on what the authentication server handles.

static (inside, outside) 204.31.17.0 10.16.1.0 10 60
conduit (inside, outside) 204.31.17.0 0 tcp 10.16.1.0 255.255.255.0
aaa authentication any inbound 0 0 tacacs+

This example demonstrates the show aaa command:

show aaa
aaa authentication any outbound 204.31.17.42 255.255.255.255 tacacs+
aaa authorization any outbound 204.31.17.42 255.255.255.255

The following example demonstrates the use of the aaa authorization command:

aaa authorization any inbound 204.31.17.0 255.255.255.255
Authentication and Authorization Notes

  1. The aaa command can only be used with the inside and outside interfaces. All inbound connections are on the outside interface; all outbound connections are on the inside interface.

  2. Use of the aaa authorization command requires a previous use of the aaa authentication command; however, use of the aaa authentication command does not require use of an
    aaa authorization command.

  3. For outside connections, a challenge prompt appears during FTP or Telnet sessions as defined by the type of authentication server.

  4. For outbound connections, first use the nat command to determine which IP addresses can access the firewall. For inbound connections, first use the static and conduit commands to determine which inside IP addresses can be accessed through the firewall from the outside network.

  5. When a host is configured for authentication, all users on the host have to use a web browser or Telnet first before performing any other networking activity, such as accessing mail or a news reader. The reason for this is that they must first establish their authentication credentials and programs such as mail agents and newsreaders do not have authentication challenge prompts.

  6. The PIX Firewall only accepts 7-bit characters during authentication. After authentication, the client and server can negotiate for 8-bits if required. During authentication, the PIX Firewall only negotiates Go-Ahead, Echo, and NVT (network virtual terminal).

  7. You can have up to 64 simultaneous authentication or authorization sessions. Up to 256 items are permitted in each list of authentication or authorization addresses. Up to 256 TACACS+ or RADIUS servers are permitted. When a user logs in, the servers are accessed top to bottom, until a server responds.

  8. For each IP address, one aaa authentication command is permitted for inbound connections and one for outbound connections. Also, for an IP address, one aaa authorization command is permitted. If you want to authorize more than one service with aaa authorization, use the any parameter for the service type.

  9. The PIX Firewall permits only one authentication type per network. For example, if one network connects through the PIX Firewall using TACACS+ for authentication, another network connecting through the PIX Firewall can authenticate with RADIUS, but one network cannot authenticate with both TACACS+ and RADIUS.

  10. The PIX Firewall permits a user up to five chances to log in with Telnet and then if the user name or password still fails, the PIX Firewall drops the connection. If a user enters an incorrect password in FTP or HTTP, the connection is dropped immediately.

  11. The PIX Firewall supports up to 127 characters in the user name and up to 63 in the password.

  12. For the TACACS+ server, if you do not specify a key to the tacacs-server command, no encryption occurs.

  13. Network browsers such as Netscape Navigator do not present a challenge value during authentication; therefore, only password authentication can be used from a network browser.

  14. Some FTP graphical user interfaces (GUIs) do not display challenge values.

  15. The PIX Firewall does not support at signs (@) in an authentication user name or password. (See note 17 for more information.)

  16. If the user name or password on the authentication database differs from the user name or password on the remote host to which you are using FTP to access, enter the user name and password in these formats:
    authentication_user_name@remote_system_user_name
   authentication_password@remote_system_password

  1. If you daisy-chain PIX Firewall units, Telnet authentication works in the same way as a single unit, but FTP and HTTP authentication have additional complexity for users because they have to enter each password and user name as shown in note 15 with an additional at (@) sign and password or user name for each daisy-chained system. Users could exceed the 63-character password limit depending on how many units are daisy-chained and password length.

See also: radius-server, tacacs-server.


alias

Administer overlapping addresses with dual NAT. (Configuration mode.)

alias [(if_name)] dnat_ip foreign_ip [netmask]

no alias [[(if_name)] dnat_ip foreign_ip [netmask]]

show alias
Syntax Description
if_name The internal network interface name in which the foreign_ip overlaps.
dnat_ip An IP address on the internal network that provides an alternate IP address for the external address that is the same as an address on the internal network.
foreign_ip IP address on the external network that has the same address as a host on the internal network.
netmask Network mask applied to both IP addresses.
Usage Guidelines

The alias command translates one address into another. Use this command to prevent conflicts when you have IP addresses on a network that are the same as those on the Internet or another intranet. The no alias command disables a previously set alias statement. The show alias command displays alias statements in the configuration. Refer to for more information on the command options.

The alias command automatically interacts with DNS servers on your network to ensure that domain name access to the aliased IP address is handled transparently.

You can specify a net alias by using network addresses for the foreign_ip and dnat_ip IP addresses. For example, alias 10.1.1.0 204.31.17.0 255.255.255.0 creates aliases for each IP address between 204.31.17.1 and 204.31.17.254.

Example

In this example, an inside network uses IP address 192.9.200.33, which on the Internet belongs to oaks.com. When inside clients try to access oaks.com, the packets do not go to the firewall because the client thinks 192.9.200.33 is on the local inside network. To correct this, a net alias is created as follows:

alias (inside) 192.168.1.0 192.9.200.0
show alias
alias 192.168.1.0 192.9.200.0 255.255.255.0

When client 192.9.200.123 connects to oaks.com, the DNS response is 192.168.1.33. If the PIX Firewall uses 204.31.17.1 through 204.31.17.254 as the global pool IP addresses, the packet goes to the PIX Firewall with SRC=192.9.200.123 and DST=192.168.1.33. The PIX Firewall translates it to SRC=204.31.17.254 and DST=192.9.200.33 on the outside.

apply

Apply, delete, or show outbound access list to IP address. (Configuration mode.)

apply [(if_name)] outbound_id outgoing_src|outgoing_dest

clear apply

no apply [[(if_name)] outbound_id outgoing_src|outgoing_dest]

show apply [(if_name)] [outbound_id outgoing_src|outgoing_dest]
Syntax Description
if_name The internal network interface originating the connection.
outbound_id An outbound access list identification number previously created with the outbound command.
outgoing_src Deny or permit an internal IP address the ability to start outbound connections using the service(s) specified in the outbound command.
outgoing_dest Deny or permit access to an external IP address using the service(s) specified in the outbound command.
Usage Guidelines

The apply command determines what an outbound command statement is denying or permitting. If you set outgoing_src, you can permit or deny outbound connection access to an IP address. If you set outgoing_dest, you can permit or deny access to an outside IP address. Refer to for more information on the command options.

The clear apply and no apply commands are identical and disable a previous use of the apply command in the configuration. The show apply command displays the apply statements in the configuration.

Outbound lists have no effect on conduits which operate on inbound connections.

See also: outbound.

Example

The following commands prevent inside host 192.168.1.49 from accessing the World Wide Web (port 80).

outbound 11 deny 192.168.1.49 255.255.255.255 80
apply (inside) 11 outgoing_src

The following commands illustrate use of the show and clear forms of the command:

show apply
apply (inside) 11 outgoing_src
clear apply (inside) 11 outgoing_src

If your employees are spending too much time examining GIF images on a particular site with two web servers, you can use outgoing_dest to restrict this access:

outbound 12 deny 192.168.146.201 255.255.255.255 80
outbound 12 deny 192.168.146.202 255.255.255.255 80
apply (inside) 12 outgoing_dest

arp

Change or view the PIX Firewall's ARP cache, and set the timeout value. (Configuration mode.)

arp [if_name] ip_address mac_address [alias]

clear arp

no arp [[if_name] ip_address]

show arp [if_name] [ip_address mac_address alias]

arp timeout seconds

no arp timeout

show arp timeout
Syntax Description
if_name The internal or external interface name specified by the nameif command.
ip_address IP address for the ARP table entry.
mac_address Hardware MAC address for the ARP table entry; for example, 00:a0:c9:0a:eb:4d.
alias Make this entry permanent. Alias entries do not time out and are automatically stored in the configuration when you use the write command to store the configuration.
seconds (arp timeout only.) Duration that an ARP entry can exist in the ARP table before being cleared.
Usage Guidelines

The arp command adds an entry to the PIX Firewall ARP cache. ARP is a low-level TCP/IP protocol that resolves a node's physical address from its IP address through an ARP request asking the node with a particular IP address to send back its physical address. The presence of entries in the ARP cache indicates that the PIX Firewall has network connectivity.

Use the arp command to add an entry for new hosts you add on your network or when you swap an existing host for another. Alternatively, you can wait for the duration specified with the arp timeout command to expire and the ARP table rebuilds itself automatically with the new host information.

The clear arp and no arp commands are identical and delete an entry from the ARP table. The show arp command lists the entries in the ARP table.

The arp timeout command sets the duration that an ARP entry can stay in the PIX Firewall ARP table before expiring. The timer is known as the ARP persistence timer. The default value is
14,400 seconds (4 hours).

The no arp timeout command sets the timer to its default value. The show arp timeout command displays its current value.

Example
arp inside 192.168.0.42 00:a0:c9:0a:eb:4d
arp outside 192.168.0.43 00:a0:c9:0a:fc:5e alias
show arp
                                                       outside 192.168.0.43 00:a0:c9:0a:eb:4d alias
                                                      inside 192.168.0.42 00:a0:c9:0a:fc:5e

clear arp inside 192.168.0.42

arp timeout 42
show arp timeout
arp timeout 42 seconds

no arp timeout
show arp timeout
arp timeout 14400 seconds

conduit

Add, delete, or show conduits through firewall for incoming connections. (Configuration mode.)

conduit [(internal_if_name, external_if_name)] global_ip port[-port] protocol foreign_ip [netmask]

no conduit [[(internal_if_name, external_if_name)] global_ip port[-port] protocol foreign_ip [netmask]]

show conduit
Syntax Description
internal_if_name The internal network interface name where the static command's local_ip address resides.
external_if_name The external network interface name where the conduit command's foreign_ip resides.
global_ip A global IP address previously defined by the static command.
port[-port] Service(s) you permit to be used while accessing global_ip. Specify services by the port that handles it, such as 25 for SMTP, 80 for HTTP, and so on. 0 means any port. The port values are defined in RFC 1700. Permitted literal names are: dns, esp, ftp, h323, http, ident, nntp, ntp, pop2, pop3, pptp, rpc, smtp, snmp, snmptrap, sqlnet, tcp, telnet, tftp, and udp. Note that you can specify literals in port ranges; for example, ftp-h323. You can also specify numbers.
protocol Specifies the protocol for the connection. Possible values are esp, udp, tcp, and gre. You can also use pptp instead of gre but when you list the configuration or use the show conduit command, pptp is shown as gre.
foreign_ip An external IP address (host or network) that can access the global_ip. You can specify 0.0.0.0 or 0 for any host.
netmask Network mask of foreign_ip. If you use 0 for foreign_ip, use 0 for the netmask; otherwise, enter the netmask appropriate to foreign_ip.
Usage Guidelines

The conduit command works with a static statement to specify the following:

Together, a static and conduit statement pair create an exception to the PIX Firewall Adaptive Security mechanism by permitting connections from one firewall network interface to access hosts on another. static statements must be entered in the configuration before conduit statements. If you attempt to enter a conduit before entering a static statement, the message "Cannot locate the xlate" appears. Refer to for more information on the command options.

You can have up to 8,000 conduits; however, you must have 2 MB flash memory to store the configuration. For 512K flash memory, do not exceed 4,096 conduits.

Use of the conduit command with PPTP protocol, which is a subset of the GRE protocol, requires that you create two conduit statements, both for port 1723, and one for TCP and the other for PPTP. For example:

conduit (inside, outside) global_ip 1723 tcp foreign_ip mask
conduit (inside, outside) global_ip 0 gre foreign_ip mask

Conduits with a port value of 0 count as a single conduit, as do port values in a range such as 1234-2234. You can assign up to 65,535 access ports for a single conduit.

You can remove a conduit with the no conduit command. Use the show conduit command to view the conduit statements in the configuration.

You can create conduits for net statics with a single static statement. An example follows:

static (inside, outside) 204.31.17.0 10.1.1.0
conduit (inside, outside) 204.31.17.0 0 tcp 0 0

This static statement creates the potential for up to 254 statics. The conduit statement specifies that inside hosts 204.31.17.1 through 204.17.31.254 can be accessed by any host on the outside using any TCP service.

In addition, you can overlay host statics on top of a net static range to further refine what an individual host can access:

static (inside, outside) 204.31.17.0 10.1.1.0
conduit (inside, outside) 204.31.17.0 ftp tcp 1.2.3.0 0
static (inside, outside) 203.31.17.3 10.1.1.3
conduit (inside, outside) 204.31.17.3 h323 udp 1.2.3.3 255.255.255.255

In this case, the host at 1.2.3.3 has InternetPhone access in addition to its blanket FTP access.

If a conduit is specified as in the example that follows, host 192.168.2.2 can access the inside host that is mapped to the global address 192.168.1.1 on any TCP port:

conduit (inside, outside) 192.168.1.1 0 tcp 192.168.2.2 255.255.255.255

When the port is specified as zero, all ports of the specified protocol can be accessed. The same syntax applies for UDP.

If you create a conduit with a port range and then delete one port within the range, the configuration transparently creates two conduit statements. The first statement contains the range of ports up to the port you deleted and the second contains the ports from the deleted port to the end of the range.

Examples

The following pair of commands enables only SMTP communication between the UNIX gateway host with IP address 10.10.25.10 and an SMTP server on the inside network with IP address 192.168.1.49:

static (inside, outside) 10.10.26.147 192.168.1.49 255.255.255.255
conduit (inside, outside) 10.10.26.147 25 tcp 10.10.25.10 255.255.255.255

To remove the last conduit, enter the no conduit command:

no conduit 10.10.26.147 25 tcp 10.10.25.10

You can delete one port from a range and the configuration creates two new statements:

conduit (inside, outside) 10.0.42.1 1025-1050 udp 192.168.20.34 255.255.255.255
no conduit 10.0.42.1 1040
show conduit 10.0.42.1
conduit 10.0.42.1 1025-1039 udp 192.168.20.34 255.255.255.255
conduit 10.0.42.1 1041-1050 udp 192.168.20.34 255.255.255.255

The next example lets network 10.1.1.0 on the inside receive H323 InternetPhone calls and allows the outside network 204.30.242.0 to connect inbound via the IDENT (tcp/113) protocol:

static (inside, outside) 204.31.17.0 10.1.1.0
conduit (inside, outside) 204.31.17.0 h323 tcp 0.0.0.0 0.0.0.0
conduit (inside, outside) 204.31.17.0 113 tcp 204.30.242.0 255.255.255.0

The next example lets one FTP server on the inside, 10.1.1.3, be accessed as 204.31.17.3 by the network 260.44.224.x on the outside:

static (inside, outside) 204.31.17.3 10.1.1.3
conduit (inside, outside) 204.31.17.3 ftp tcp 260.44.224.0 255.255.255.0

The next example lets one web server on the inside, 10.1.1.4, be accessed as 204.31.17.4 by the whole outside Internet:

static (inside, outside) 204.31.17.4 10.1.1.4
conduit (inside, outside) 204.31.17.4 80 tcp 0 0

The next example lets you give everyone FTP and InternetPhone access:

static (inside, outside) 1.2.3.0 10.1.1.0
conduit (inside, outside) 1.2.3.0 ftp tcp 0 0
conduit (inside, outside) 1.2.3.0 h323 udp 0 0

configure

Merge current configuration with that on floppy or flash, start configuration mode, or view current configuration. (Privileged mode.)

configure net [[server_ip]:[filename]]

configure floppy

configure memory

configure terminal

show configure
Syntax Description
server_ip Merges the current configuration with that available across the network at, which is defined with the tftp-server command.
filename A filename you specify to qualify the location of the configuration file on the TFTP server named in server_ip. If you set a filename with the tftp-server command, do not specify it in the configure command; instead just use a colon ( : ) without a filename.
floppy Merges the current configuration with that on floppy disk.
memory Merges the current configuration with that in flash memory.
terminal Starts configuration mode to enter configuration commands from a terminal.
Usage Guidelines

The configure net command merges the current running configuration with a configuration stored at the IP address you specify and from the file you name. If you specify both the IP address and path name in the tftp-server command, you can specify :filename as simply a colon ( : ); for example:

	configure net :

Use the write net command to store the configuration in the file.

The configure floppy command merges the current running configuration with the configuration stored on floppy disk. This command assumes that the floppy disk was previously created by the write floppy command.

The configure memory command merges the configuration in flash memory into the current configuration in RAM.

The configure terminal command starts configuration mode. Exit configuration mode by pressing ^z. After exiting configuration mode, use write memory to store your changes in flash memory or write floppy to store the configuration on floppy disk. Use the write terminal command to display the current configuration.

The show configure command lists the contents of the configuration in flash memory.

Each statement from floppy disk (with configure floppy) or flash memory (with configure memory) is read into the current configuration and evaluated in the same way as commands entered from a keyboard with these rules:

Example
configure net 10.1.1.1:/tftp/config/pixconfig

configure floppy
configure memory
pixfirewall> enable
password: *****
pixfirewall# configure terminal
show config
:  Saved
... config commands ...
:  End

debug trace

Enable or disable ICMP trace mode. (Configuration mode.)

debug trace on

no debug trace

show debug
Syntax Description
on Enable ICMP (Internet Control Message Protocol) tracing for pinging between the internal and external networks.
Usage Guidelines

The debug command lets you trace ping requests through the PIX Firewall. Use this command during troubleshooting when pings between the internal and external networks do not work. The no debug trace command disables ICMP trace mode. The show debug command displays the current state of tracing.


Note Use of this command can cause severe problems on busy networks. Only use this command for debugging network connections.
Example

The following example turns on this command:

debug trace on

When you ping a host from the internal network to the external network, trace output displays on the console indicating the direction of the ping and whether a response is detected, as shown in the following example output:

Inbound ICMP Echo Request (10.0.0.1) 10.0.0.1 <- 204.31.17.2
...

disable

Exit privileged mode and return to unprivileged mode. (Privileged mode.)

disable
Usage Guidelines

The disable command exits privileged mode and returns you to unprivileged mode. Use the enable command to return to privileged mode.

Example
pixfirewall# disable
pixfirewall>

enable

Start privileged mode. (Unprivileged mode.)

enable
Usage Guidelines

The enable command starts privileged mode. The PIX Firewall prompts you for your privileged mode password. The default password is no password. Use disable to exit privileged mode. Use enable password to change the password.

Example
pixfirewall> enable
Password: 
pixfirewall# configure terminal
pixfirewall(config)#

enable password

Set the privileged mode password. (Privileged mode.)

enable password password

show enable password
Syntax Description
password A case-sensitive password of up to 16 alphanumeric characters.
Usage Guidelines

The enable password command changes the privileged mode password, for which you are prompted after you enter the enable command. When the PIX Firewall starts and you enter privileged mode, the password prompt appears. There is not a default password (press the Return key at the Password prompt). The show enable password command lists the encrypted form of the password.


Note Write down the new password and store it in a manner consistent with your site's security policy. Once you change this password, you cannot view it again. Also, ensure that all who access the PIX Firewall console are given this password.

Use the passwd command to set the password for HTTP and Telnet access to the PIX Firewall console. The default passwd value is cisco.

See also: passwd.

Example
pixfirewall> enable
Password:
pixfirewall# enable password w0ttal1fe
pixfirewall# configure terminal
write terminal
Building configuration...
: Saved
:
PIX Version 4.0.n.n
enable password 2oifudsaoid.9ff encrypted
passwd 2jkifsldkaj.23 encrypted
hostname pixfirewall
...

established

Allow, disallow, or view return connections based on established connections. (Configuration mode.)

established protocol [port[-port]] permit[to|from] [protocol] [port[-port]]

no established [protocol [port[-port]] permit[to|from] [protocol] [port[-port]]]

show established
Syntax Description
protocol IP protocol type of udp or tcp.
port[-port] IP protocol service or port number. Do not use the udp, tcp, or esp literals in the port range. Permitted literal names are: dns, ftp, h323, http, ident, nntp, ntp, pop2, pop3, rpc, smtp, snmp, snmptrap, sqlnet, telnet, and tftp. Note that you can specify literals in port ranges; for example, ftp-h323.
permitto Permit inbound connections to the specified port or protocol.
permitfrom Permit inbound connections from the specified port or protocol.
Usage Guidelines

The established command lets you debug an application that requires multiple TCP or UDP port connections. This command is only recommended for use with WEB Theatre VXtreme and Microsoft NetShow. The PIX Firewall supports other multimedia applications without the need for the established command. These applications include RealAudio, VDO, Xing, VocalTec, H323, and CuSeeMe. The PIX Firewall supports these applications using its enhanced multimedia Adaptive Security algorithm which does not in any way compromise security.

The port after permitto pertains to the local ports. The port after permitfrom pertains to the foreign ports. The port after established tcp|udp is the connection that must exist before the returning packets are allowed in.

While this command is running, all UDP or TCP traffic is permitted between the client and server for the current TCP connection. This command only allows the host to which the inside client is connected to deliver UDP data or make high TCP port connections back to the client.

The no established command disables the feature. The show established command shows the established commands in the configuration.

The established command itself does not produce either console or SYSLOG output while running.

Example

The following example occurs when a local host 10.1.1.1 starts a TCP connection from port 2020 to a foreign host 204.31.17.1. The example allows packets from the foreign host 204.31.17.1 of port 4242 back to local host 10.1.1.1 on port 5454:

established tcp 2020 permitto tcp 5454 permitfrom tcp 4242

The next example allows packets from foreign host 204.31.17.1 on any port back to local host 10.1.1.1 on port 5454:

established tcp 2020 permitto tcp 5454

The next example allows packets from foreign host 204.31.17.1, port 4242 back to local host 10.1.1.1 on port 2020:

established tcp P permitfrom tcp D

failover

Change or view access to the optional failover feature. (Configuration mode.)

failover [active]

no failover active

show failover
Syntax Description
active Make a PIX Firewall the active unit. Use this command when you need to force control of the connection back to the unit you are accessing, such as when you want to switch control back from a unit after you have fixed a problem and want to restore service to the primary unit. Either enter no failover active on the secondary unit to switch service to the primary or failover active on the primary unit.
Usage Guidelines

Use the failover command without an argument after you connect the optional failover cable between your primary firewall and a secondary firewall. The default configuration has failover enabled. Enter no failover in the configuration file for the PIX Firewall if you will not be using the failover feature. Use the show failover command to verify the status of the connection and to determine which unit is active.

Failover works by passing control to the secondary unit should the primary unit fail. For Ethernet, failover detection should occur within 15 seconds.


Note Assign different host names to each PIX Firewall (with the hostname command).

Refer to "Configuring Failover" in Chapter 2 for configuration information.

The failover feature causes the PIX Firewall to ARP for itself every 15 seconds. If this adversely affects your ARP table, you can disable it with the no failover command.

Example

The following output shows that failover is enabled, and that the primary unit state is active:

show failover
	Failover On
		                                    This host: Primary - Active
                                    		Other host: Secondary - Standby
		                                   Cable status: 0x0 - Normal
                                                                         Outside Interface
			                                                                                           this host: 	Rx cnt 683 	Uptime 720
			                                                                                            other host: 	Rx cnt 3 	Uptime 0
		                                   Inside Interface
			                                                                                            this host: 	Rx cnt 623 	Uptime 720
			                                                                                           other host: 	Rx cnt 3 	Uptime 0
show failover
	Failover On
		                                   This host: Secondary - Standby
		                                   Other host: Primary - Active
		                                   Cable status: 0x0 - Normal
		                                   Outside Interface
			                                                                                            this host: 		Rx cnt 683	 	Uptime 720
			                                                                                            other host:	 	Rx cnt 3	 	Uptime 0
		                                   Inside Interface
			                                                                                            this host: 		Rx cnt 683	 	Uptime 720
			                                                                                            other host: 		Rx cnt 3	 	Uptime 0

global

Create or delete entries from a pool of global addresses. (Configuration mode.)

global [(if_name)] nat_id_set global_ip[-global_ip]

no global [[(if_name)] nat_id_set global_ip[-global_ip]]

show global
Syntax Description
if_name The external network interface name where you use these global addresses.
nat_id_set You can specify up to 256 unique ID values, which is a single nat group ID.

The valid ID numbers can be any positive number up to 2,147,483,647. If there is a single network on the inside of the PIX Firewall, set nat_id_set to 1.

global_ip One or more global IP addresses that the PIX Firewall shares among its connections.
If the external network is connected to the Internet, each global IP address must be registered with the Network Information Center (NIC). You can specify a range of IP addresses by separating the addresses with a dash (-). You can have up to 16,384 global IP addresses.

If you specify a single IP address, port address translation (PAT) occurs on that address, which permits a single IP address the ability to support up to 64,000 internal hosts,
16,384 simultaneously.

Usage Guidelines

The global command defines a pool of global addresses. The global addresses in the pool provide an IP address for each outbound connection, and for those inbound connections resulting from outbound connections. Always use the nat command before the global command to specify which internal addresses are being translated. Put the nat ID number in the global command to define which nat statement can access the global addresses in the pool.

For example, a nat statement is created to permit hosts 10.1.1.1 through 10.1.1.254 to start outbound connections. The nat ID, 1, is added to the global statement to permit the inside hosts access to the pool of global addresses, 204.31.17.1 through 204.31.17.254:

nat (inside) 1 10.1.1.0 255.255.255.0 20 20
global (outside) 1 204.31.17.1-204.31.17.254

Use the no global command to remove access to a nat ID, or to a PAT address or address range within a nat ID. Use the show global command to view the global statements in the configuration.


Note If you are using port address translation, specify a single IP address; otherwise, you must specify a range of two or more IP addresses, such as 10.10.26.1-10.10.26.3.

The PIX Firewall uses the global addresses to assign a virtual IP address to a connection. When the translation times out (defined by the timeout command), the global address returns to the available pool. If the outside network connects with the Internet, each IP address you specify as a global address must be registered with the NIC.

The PIX Firewall allocates global IP addresses from the pool by starting at the end of the range you specify and working backward.

If you are using global networks that are disjoint from the outside network address, be certain that the networking equipment and computers have a routing table entry for the global network with a next hop of the outside interface of the PIX Firewall.

With the port address translation (PAT) feature, you can have multiple outbound sessions appear to originate from a single IP address. This feature is valuable when an Internet service provider cannot allocate enough unique IP addresses for your outbound connections. The IP addresses you specify for port address translation cannot be in another global address pool.


Note Do not use port address translation when multimedia applications need to be run through the firewall. Multimedia applications need access to specific ports and can conflict with port mappings provided by PAT.

Ports are service specifiers inside a UDP or TCP packet. With port address translation enabled, the firewall chooses a unique port number for each outbound connection, thereby permitting many connections to use a single IP address.

Example

The following example declares two global pool ranges and a port address translation address. Then the user changes their mind and deletes the second global pool range from 204.31.17.54-204.31.17.55. The show global command displays the global statements in the configuration. Then the nat command permits all inside users to start connections to the outside network. The outbound command permits web access (on the HTTP port) for everyone, but denies it to the host with IP address 10.0.0.42 that contains someone who overuses the web. The apply command specifies that the outbound command works with inside users' ability to start connections to the outside.

nat (inside) 1 0 0
global (outside) 1 204.31.17.1-204.31.17.10
global (outside) 1 204.31.17.42
Global 204.31.17.42 will be Port Address Translated
global (outside) 1 204.31.17.54-204.31.17.55
no global (outside) 1 204.31.17.54-204.31.17.55
show global
global (outside) 1 204.31.17.1-204.31.17.10
global (outside) 1 204.31.17.42-204.31.17.42

outbound 1 permit 0 0 http
outbound 1 deny 10.0.0.42 255.255.255.255 http
apply (inside) 1 outgoing_src

groom

Refresh flash memory. (Privileged mode.)

groom
Usage Guidelines

The groom command lets traditional flash memory circuit boards to operate at peak efficiency. The
PIX Firewall automatically calls this command when flash memory is full; that is, when you try to save your configuration and insufficient memory is available to store it.

In the past, when the firewall wrote to flash memory, the flash memory appended the image to its existing memory. Eventually, the circuit board ran out of memory and caused system failure. With the groom command, the firewall stores the existing configuration in flash memory in RAM and clears the complete memory space. Then it restores the image back into flash memory.

You can either wait until you run out of memory or run it as part of your preventative maintenance schedule, either monthly or every few months, depending on how many times you change the configuration and save it to flash memory.


Note When you run the groom command, do not interrupt the system because vital information can be lost. Before running this command, save a copy of the configuration on floppy disk and ensure all other console users are not using the unit.
Example
groom
Grooming flash. This will take a moment. DO NOT INTERRUPT.

help

Display help information. (Unprivileged mode.)

help

?
Usage Guidelines

The help or ? command displays help information about all commands. You can view help for an individual command by entering the command name followed by a question mark or just the command name and pressing the Enter key.

If the pager command is enabled and when 24 lines display, the listing pauses, and the following prompt appears:

<--- More --->

The More prompt uses syntax similar to the UNIX more command:

Example
age ?
age 

Help information is available on the core commands (not the show, no, or clear commands) by entering ? at the command prompt:

?
aaa	Set Authentication and Authorization parameters

...

history

View the last 10 command lines you entered. (Privileged mode.)

history

no history

show history
Usage Guidelines

The history (or show history) command lists the last 10 command lines you entered. The no history command disables command history.

If you are using a VT100-compatible terminal, such as HyperTerminal with Windows 95 or Windows NT, the up and down arrow keys have the same effect as ^p and ^n. In addition, the left arrow key works as a backspace.

You can use the following commands to edit or view previously entered commands:

The command line history consists of 10 lines in a circular buffer. When you enter the 11th command, it replaces the first entered and so on. When you are at the first line in the history and enter ^n, the 10th line appears.

The history command does not count in the command storage area.

Example
pixfirewall(config)0# history
0: configure term
1: static (inside, outside) 1.2.3.4 10.0.0.1
2: static (inside, outside) 1.2.3.3 10.0.0.2
3: conduit (inside, outside) 1.2.3.3 0 tcp 0 0
4: conduit (inside, outside) 1.2.3.3 1 tcp 0 0
5: conduit (inside, outside) 1.2.3.4 2 tcp 0 0
6: pager
7: nat (inside) 1 1.2.3.5
8: nat (perimeter) 2 1.2.3.6
9: global (outside) 1 1.3.4.1-1.3.4.254
pixfirewall(config)0# !5
pixfirewall(config)5# conduit (inside, outside) 1.2.3.4 2 tcp 0 0



hostname

Change the host name in the PIX Firewall command line prompt. (Configuration mode.)

hostname newname
Syntax Description
newname New host name for the PIX Firewall prompt. This name can be up to 17 alphanumeric characters and mixed case.
Usage Guidelines

The hostname command changes the host name label on prompts. The default host name is pixfirewall. If you have the optional failover feature, assign host names to both the PIX Firewall units. Then if a failure occurs and you Telnet to the IP address, the host name in the prompt verifies that the secondary unit is functioning.

Example
hostname spinner
spinner(config)# hostname pixfirewall

interface

Identify network interface speed and duplex. (Configuration mode.)

interface hardware_id hardware_speed

show interface
Syntax Description
hardware_id Identifies the network interface type. Possible values are ethernet0, ethernet1 to ethernetn or token-ring0, token-ring1 to token-ringn depending on how many network interfaces are in the firewall.
hardware_speed Network interface speed.

Possible Ethernet values are:

Possible Token Ring values are:

  • 4mbps--4 Mbps data transfer speed. You can specify this as 4.

  • 16mbps--(default) 16 Mbps data transfer speed. You can specify this as 16.

Usage Guidelines

The interface command identifies the speed and duplex settings of the network interface boards.
Refer to Installing Circuit Boards in the PIX Firewall for information on installing an interface board. Use show interface to view information about the interface.

The configuration of the interface affects buffer allocation (the PIX Firewall will allocate more buffers for higher line speeds). Buffer allocation can be checked with the show blocks command.


Note The aui and bnc options will be obsoleted in a future release.

When you use the interface token-ring command, also use the mtu command to set the block size depending on the interface speed.

The use of inside and outside instead of hardware_id for PIX Firewall versions before 4.1 will be maintained for backward compatibility.

The show interface command lets you view network interface information for both Ethernet and Token Ring depending on which is installed in your PIX Firewall. This is one of the first commands you should use when establishing network connectivity after installing a PIX Firewall.

The information in the display is as follows:

Example

The following example assigns names to each interface, enables auto detection for the interface parameters, and then shows interface activity:

nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 perimeter security50
interface ethernet0 auto
interface ethernet1 auto
interface ethernet2 auto
show interface
interface ethernet0 "outside" is up, line protocol is up
  Hardware is i82557 ethernet, address is 00:a0:c9:3e:68:42
  IP address 204.31.17.1, subnet mask 255.255.255.0
  MTU 1500 bytes, BW 10000 Kbit half duplex
        3975 packets input, 293655 bytes, 0 no buffer
        Received 3975 broadcasts, 0 runts, 0 giants
        0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
        699 packets output, 44736 bytes, 0 underruns
interface ethernet1 "inside" is up, line protocol is up
  Hardware is 3c590 ethernet, address is 00:a0:24:9f:5e:26
  IP address 10.1.1.2, subnet mask 255.255.255.0
  MTU 1500 bytes, BW 10000 Kbit half duplex
        58 packets input, 7308 bytes, 0 no buffer
        Received 58 broadcasts, 0 runts, 0 giants
        0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
        699 packets output, 29358 bytes, 0 underruns
interface ethernet2 "perimeter" is up, line protocol is up
  Hardware is 3c590 ethernet, address is 00:a0:24:9f:66:a8
  IP address 204.31.18.1, subnet mask 255.255.255.0
  MTU 1500 bytes, BW 10000 Kbit half duplex
        315 packets input, 25350 bytes, 0 no buffer
        Received 186 broadcasts, 0 runts, 0 giants
        0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
        710 packets output, 29820 bytes, 0 underruns

ip address

Identify the IP address for the PIX Firewall. (Configuration mode.)

ip address if_name ip_address [netmask]

show ip
Syntax Description
if_name The internal or external interface name designated by the nameif command.
ip_address PIX Firewall's network interface IP address.
netmask Network mask of ip_address.
Usage Guidelines

The ip address command assigns an IP address to the PIX Firewall. Use the show ip command to view which addresses are assigned to the network interfaces.

Example
nameif ethernet0 outside security0
nameif ethernet1 inside security100
nameif ethernet2 perimeter security50
ip address inside 192.168.2.1 255.255.255.0
ip address outside 204.31.17.2 255.255.255.0
ip address perimeter 204.31.18.3 255.255.255.0
show ip address
interface 0: ip address outside 204.31.17.2 mask 255.255.255.0
interface 1: ip address inside 192.168.2.1 mask 255.255.255.0
interface 2: ip address perimeter 204.31.18.3 mask 255.255.255.0

kill

Terminate a Telnet session. (Privileged mode.)

kill telnet_id
Syntax Description
telnet_id Telnet session ID.
Usage Guidelines

The kill command terminates a Telnet session. Use the who command to view the Telnet session ID value. When you kill a Telnet session, the PIX Firewall lets any active commands terminate and then drops the connection without warning the user.

See also: show who, telnet.

Example
show who
2: From 10.10.54.0 
kill 2

link / linkpath / age

Specify a Private Link connection to a remote PIX Firewall. (Configuration mode.)

link foreign_external_ip key-id key|md5

no link foreign_external_ip key-id key|md5

show link

linkpath foreign_internal_ip netmask foreign_external_ip

no linkpath foreign_internal_ip netmask foreign_external_ip

show linkpath

age minutes

show age
Syntax Description
foreign_external_ip The external network interface IP address on the foreign PIX Firewall running Private Link.
foreign_internal_ip The internal network IP address on the foreign PIX Firewall running Private Link. Note that this is the IP address of the network on the inside of the PIX Firewall, not the address of the inside interface.
key-id A value from 1 to 7.
key The 56-bit key (up to 14 hexadecimal digits) used to seed the encryption chip. This key must be the same on each host end of an encrypted link. The key consists of hexadecimal numbers; for example, fadebacfadebac. Select a unique key that is difficult to guess. Do not use the example keys shown in this document.
md5 Select MD5 encryption. This option puts a digital signature in the AH/ESP header of each packet before being transmitted to the remote Private Link firewall.
netmask Specifies a subnet mask to apply to foreign_internal_ip.
minutes age only: Duration in minutes that a Private Link key is used to encrypt information on the connection. The maximum duration is 130,000,000 minutes (247 years). The minimum duration is 1 minute.
Usage Guidelines

The link command creates an encrypted path between Version 4 Private Link-equipped PIX Firewall units. You can specify up to seven encryption keys for data access between your unit and the remote unit. The key-ID and key values must be the same on each side of the Private Link. Once you specify the same keys on both sides of the connection, the systems alert each other when a new key takes effect. You can use the age command to specify the number of minutes that a key is in effect.

The linkpath command identifies the internal and external network interfaces on the foreign PIX Firewall running Private Link. Use show linkpath to view the IP addresses you specify. Use no linkpath to stop access to a Private Link remote firewall. Refer to the link command description for more information about using linkpath. You can use multiple linkpath statements to define which networks on the remote PIX Firewall can access the Private Link connection.

Test access to the foreign Private Link PIX Firewall with the ping inside command.

The age command specifies the length of time in minutes that a key is active over Private Link. Private Link supports up to seven keys that it selects sequentially to ensure additional security. The show age command lists the current duration.


Note An encryption circuit board must be present to use link or linkpath commands.

Private Link is enabled automatically after you power-up after inserting the encryption circuit board. Refer to Installing Circuit Boards in the PIX Firewall, for more information on installing the encryption circuit board and Regulatory Compliance and Safety Information for the PIX Firewall Series, for important safety information before opening the PIX Firewall chassis. Both documents are included in the accessory kit that accompanies your PIX Firewall.

The no link command deletes a key from the link command. Use the show link command to list the remote IP address, keys, and the number of packets processed through Private Link.

Enter the link command for each key you want to specify; for example, if you want seven keys, enter the link command in the configuration seven times.

The PIX Firewall Private Link consists of an encryption card and software that permits the PIX Firewall units to provide encrypted communications across an unsecure network such as the Internet. This optional feature is available to domestic customer sites.

The PIX Firewall allows up to 256 Private Links. At least two PIX Firewall units are required along with the hardware/software option to use this feature.

Refer to "Configuring Private Link" in Chapter 2 for more information.

If a single key is set, the age command keeps that one key active continuously.


Note Use the same link statements on either side of the Private Link to ensure that the keys are the same and in the same order on both sides of the link.

Private Link packet information tells the remote side what key number to use to decrypt the data. The aging duration can be different, as well as the system clocks themselves on either side of the link, but as long as you use the same link statements on both sides, all information decrypts correctly.
Example

The following example specifies the remote IP address of the Private Link and specifies four keys for access to the remote system, and specifies the IP address of the inside network interface on the remote host.

link 204.31.17.2 1 FadebacFadebac
link 204.31.17.2 2 BacfadeFadebac
link 204.31.17.2 3 BaabaaaFadebac
link 204.31.17.2 4 BeebeeeFadebac
linkpath 10.1.0.0 255.255.255.0 204.31.17.2

Another example follows:

link 204.31.17.42 1 FadeBacBeeBeee
link 204.31.17.42 2 Abcdef42FedcbA
show link
     Foreign IP  KeyID               Key
   204.31.17.42    1    0xfadebacbeebeee
                   2    0xabcdef01fedcba
                          100 out, 100 in

An age example follows:

age 10
show age
Private Link Key Aging: 10 minutes

mailhost

Add or remove mail hosts. (Configuration mode.)

mailhost [(internal_if_name, external_if_name)] global_ip local_ip [max_conns [em_limit]]

clear mailhost

no mailhost [[(internal_if_name, external_if_name)] global_ip [local_ip]]

show mailhost
Syntax Description
internal_if_name The internal network interface name.
external_if_name The external network interface name.
global_ip A global IP address. Do not pick a global_ip address from the global pool of addresses.
local_ip The local IP address of the internal SMTP mail server.
max_conns The maximum mail connections permitted. Set this value to less than or equal to your connection license. Use show conn to view the maximum number of connections for your firewall.
em_limit The embryonic mail connection limit. An embryonic connection is a connection that someone attempted but has not completed and has not yet seen data. Every connection is embryonic until it sets up. The default is 0, which means unlimited connections.
The maximum is 65,535 and the minimum is 1. A rule of thumb for the limit is the maximum number of connections on your connection license minus 30%; for example, on a 64-session license, set it to at least 40. Set it lower for slower systems, higher for faster systems.
Usage Guidelines

The mailhost command lets you create an SMTP mail host on an internal secure interface that can be accessed safely from an unprotected or less secure external interface. The mailhost command imposes a security check and translation of the SMTP protocol with the PIX Firewall Adaptive Security enroute. The mailhost command limits what connections from less secure interfaces can do to the mail host itself. Only the seven SMTP commands specified in RFC 821, section 4.5.1 (HELO, MAIL, RCPT, DATA, RSET, NOOP, and QUIT) are permitted. Any other commands are treated as NOOP and discarded with OK returned to the sender. This command creates its own implied conduit.

The mailhost command removes the need for an external mail relay in the perimeter network, also known as the DMZ (demilitarized zone), that section of the network outside the firewall but before the Internet. The mailhost command is also known as the Mail Guard feature.


Note To ensure that the mailhost command is working properly, refer to Cisco's PIX Firewall web site at http://www.cisco.com/pix and locate the "Testing the PIX Firewall mailhost command" topic in the Technical Tips section.

The identical clear mailhost and no mailhost commands disable access to the SMTP server.

View mail host information with the show mailhost and show xlate commands.

See also: show conn, show xlate.

Example
ip address inside 10.1.1.1 255.0.0.0
ip address outside 204.31.17.10 255.255.255.0
mailhost (inside, outside) 204.31.17.25 10.1.1.3 10 40

mtu

Specify the MTU (maximum transmission unit) for an interface. (Configuration mode.)

mtu if_name bytes

no mtu [if_name bytes]

show mtu
Syntax Description
if_name The internal or external network interface name.
bytes The number of bytes in the MTU in the range of 64 to 65,535 bytes.
Usage Guidelines

The mtu command sets the size of data sent on a connection. Data larger than the MTU value is fragmented before being sent.

For Ethernet interfaces, the default MTU, 1,500 bytes in a block, is sufficient for most applications. For Token Ring, the default is 8,192 bytes. The minimum value for bytes is 64 and the maximum is 65,535 bytes. RFC 1191 [Mogul and Deering 1990] recommends 1,500 bytes for Ethernet, 17,914 for 16 Mbps Token Ring, and 4,464 for 4 Mbps Token Ring.

The no mtu command resets the MTU block size to 1,500 for Ethernet interfaces and 8,192 for Token Ring. The show mtu command displays the current block size. The show interface command also shows the MTU value.

Example
interface token-ring0 4mbps
interface ethernet0 auto
mtu inside 4464
show mtu
mtu outside 1500
mtu inside 4464

name / names

Associate a name with an IP address. (Configuration mode.)

name ip_address name

no name [ip_address name]

names

no names

clear names

show names
Syntax Description
ip_address The IP address of the host being named.
name The name assigned to the IP address. The maximum name length is 4,000 characters.
The total length of all strings together cannot exceed 4,000 characters. Allowable characters are a to z, A to Z, 0 to 9, - and _. The name cannot start with a number or
a dot.
Usage Guidelines

Use the name command to identify a host by a text name. The names you define become like a host table local to the PIX Firewall. Because there is no connection to DNS or /etc/hosts on UNIX servers, use of this command is a mixed blessing--it makes configurations much more readable but introduces another level of abstraction to administer; not only do you have to add and delete IP addresses to your configuration as you do now, but with this command, you need to ensure that the host names either match existing names or you have a map to list the differences.

The names command enables use of the name command to map text strings to IP addresses. The clear names and no names commands are the same and disable use of the name text strings. The show names command lists the contents of the name statements in the configuration.


Note You must first use the names command before using the name command.
To disable displaying name values, use no names.

Only one name can be associated with an IP address.

The maximum name table length is 4,000 characters. (In other words, you can have one name command with a 4,000-character string, or up to 100 with shorter text strings, such as 40 characters each.)

You can have a maximum of 100 name statements in your configuration. The total length of all strings cannot exceed 4,000 characters.

Example

In the example that follows, the names command enables use of the name command. The name command substitutes pix_inside for references to 192.168.42.3, and pix_outside for 204.31.17.33. The ip address commands use these names while assigning IP addresses to the network interfaces. The no names command disables the name values from displaying. Subsequent use of the names command restores their display.

names
name 192.168.42.3 pix_inside
name 204.31.17.33 pix_outside
ip address inside pix_inside
ip address outside pix_outside
show ip address
inside ip address pix_inside mask 255.255.255.255
outside ip address pix_outside mask 255.255.255.255
no names
show ip address
inside ip address 192.168.42.3 mask 255.255.255.255
outside ip address 204.31.17.33 mask 255.255.255.255
names
show ip address
inside ip address pix_inside mask 255.255.255.255
outside ip address pix_outside mask 255.255.255.255

nameif

Name interfaces. (Configuration mode).

nameif hardware_id if_name security_level

show nameif
Syntax Description
hardware_id The hardware name for the network interface that specifies the interface's slot location on the PIX Firewall motherboard. Interface boards are numbered from the leftmost slot nearest the power supply as slot 0. The internal network interface must be in slot 1. The lowest security_level external interface board is in slot 0 and the next lowest security_level external interface board is in slot 2.

Possible choices are ethernetn for Ethernet or token-ringn for Token Ring.
The internal interface is ethernet1.

These names can be abbreviated with any leading characters in the name; for example, ether1, e2, token0, or t0.

if_name A name for the internal or external network interface of up to 255 characters in length. This name can be uppercase or lowercase.
security_level A security level name designating how you want to protect your networks and the relationship between interfaces. Possible choices are securityn. The names can be abbreviated as secn or just sn, as in s0. Security level 100 is the highest security and is for the inside network. The outside security level is 0 for the lowest security. Perimeter interfaces can have any value between 1 and 99. Interfaces with the same security level cannot communicate directly.
Usage Guidelines

The nameif command lets you assign a name to an interface. You can use this command to assign interface names if you have more than two network interface circuit boards in your PIX Firewall or you want to assign names other than inside and outside to the respective interface boards.

The first two interfaces have the default names inside and outside. The inside interface has default security level 100, the outside interface has default security level 0. An interface is always "outside" with respect to another interface that has a higher security level. Packets cannot flow between interfaces that have the same security level.


Note Interface names can be abbreviated when specified in a command.

Refer to the current PIX Firewall release notes for information about the number of supported interfaces.

See also: interface.

Examples

The following example defines four interfaces with the interface command, assigns names and security levels to each with the nameif command:

nameif ethernet0 internet sec0
nameif ethernet1 corporate sec100
nameif ethernet2 dmz1 sec50
interface ethernet0 10baset
interface ethernet1 10baset
interface ethernet2 10baset

The following example shows use of the show nameif command:

show nameif
nameif ethernet0 internet security0
nameif ethernet1 corporate security100
nameif ethernet2 dmz1 security50

nat

Associate a network with a pool of global IP addresses. (Configuration mode.)

nat [(if_name)] nat_id local_ip [netmask [max_conns [em_limit]]] [norandomseq]

no nat [[(if_name)] nat_id local_ip [netmask [max_conns [em_limit]]]] [norandomseq]

show nat
Syntax Description
if_name The internal network interface name.
nat_id Specify 0 to indicate that no address translation be used with local_ip. All nat statements with the same nat_id are in the same nat group. You can have up to 1,000 nat groups.
local_ip Internal network IP address to be translated. You can use 0.0.0.0 to allow all hosts to start outbound connections. The 0.0.0.0 local_ip can be abbreviated as 0.
netmask Network mask for local_ip. You can use 0.0.0.0 to allow all outbound connections to translate with IP addresses from the global pool. The 0.0.0.0 netmask can be abbreviated
as 0.
max_conns The maximum connections permitted. Set this value to less than or equal to your connection license. Use show conn to view the maximum number of connections for your firewall.
em_limit The embryonic connection limit. The default is 0, which means unlimited connections. The maximum is 65,535 and the minimum is 1. A rule of thumb for the limit is the maximum number of connections on your connection license minus 30%; for example, on a 64-session license, set it to at least 40. Set it lower for slower systems, higher for faster systems.
norandomseq Do not randomize the TCP/IP packet's sequence number. Only use this option if another inline firewall is also randomizing sequence numbers and the result is scrambling the data. Use of this option opens a security hole in the PIX Firewall.
Usage Guidelines

The nat command lets you enable or disable address translation for one or more internal addresses. Address translation means that when a host starts an outbound connection, the IP addresses in the internal network are translated into global addresses. Address translation lets your network have any IP addressing scheme and the firewall protects these addresses from visibility on the external network. You can have up to 1,000 nat groups.

You can use the no nat command to remove a nat statement and you can use the show nat command to view nat statements in the current configuration.

You can disable address translation with the nat 0 command. Use this when you have IP addresses that are the same as those used on the external network and you want these addresses to be used for outbound and inbound connections. Adaptive Security remains in effect with nat 0.

The connection limit lets you set the maximum number of outbound connections that can be started with the IP address criteria you specify. The embryonic connection limit lets you prevent a type of attack where processes are started without being completed. An embryonic connection is a connection that someone attempted but has not completed and has not yet seen data. Every connection is embryonic until it sets up.


Note To specify a connection limit or embryonic limit, you must specify a netmask value.

nat 1 0 means that all outbound connections can pass through the PIX Firewall with address translation.

nat 1 1.2.3.0 means that only outbound connections originating from inside host 1.2.3.0 can pass through the firewall to go to their destinations with address translation.

nat 0 0 means let all inside IP addresses appear on the outside network without translation. They will still be protected by Adaptive Security, just not translated.


Note When using nat 0, if you want the addresses to be visible from the outside network, use static and conduit first as shown in the example in the "Identity Example" section.

Note When using nat 0, the IP addresses on the internal network need to be on a different subnet than the addresses on the external network. You can change the subnet of an IP address with the subnet mask, by subdividing the last octet into a host portion to determine what the subnet mask will be. Select a subnet field size that yields enough subnetworks. For example, using a 5-bit mask allows 20 subnets; the remaining bits in the last octet are used for the host field.

nat 0 1.2.3.0 means let those IP addresses in the 1.2.3.0 net appear on the outside without translation. All other hosts are translated depending on how their nat statements appear in the configuration.

See also: global, outbound, apply.

Example

  1. nat (inside) 1 10.0.0.0 255.0.0.0

  2. nat (inside) 3 3.3.3.0 255.255.255.0

  3. global (outside) 1 204.31.17.25-204.31.17.27

  4. global (outside) 1 204.31.17.28

  5. global (outside) 3 204.31.18.1-204.31.18.254

  6. outbound 11 deny 3.3.3.3 255.255.255.255 1720

  7. outbound 10 deny 0.0.0.0 0.0.0.0 80

  8. outbound 10 deny 3.3.3.3 255.255.255.255 java

  9. outbound 11 permit 10.1.1.11 255.255.255.255 80

  10. apply (inside) 10 outgoing_src

  11. apply (inside) 11 outgoing_src

Lines 1 and 2 specify which internal network hosts can start outbound connections and whose addresses are translated between the internal and external network.

Lines 3 to 5 create a pool of global addresses. Line 2 creates a port address translation address (PAT) that permits up to 64,000 hosts to share this IP address.

Lines 6 to 9 create access lists to determine which hosts can access services. In line 6, denies host 3.3.3.3 from accessing H323 (port 1720) services such as MS NetMeeting or InternetPhone. Line 7 denies all hosts from accessing the web (port 80). Line 8 lets host 3.3.3.3 use the web, but denies its users from downloading Java applets.

Line 9 permits host 10.1.1.11 access to the web and to download Java applets. This permit statement outweighs the previous deny regardless of the order in which the statements are entered into the configuration.

Lines 10 and 11 specify that the access lists in lines 6 to 9 pertain to connections started on the inside network to access outside services.

Identity Example

An example of nat 0 access is:

nat (inside) 0 0 0
static (inside, outside) 207.31.17.1 207.31.17.1
conduit (inside, outside) 207.31.17.1 ftp tcp 10.0.0.1 255.255.255.255

In this example, the firewall is configured to allow one inside host, 207.31.17.1 to be accessible by a single outside host for FTP access. The nat 0 0 command permits inside hosts to be accessible from outside the firewall. The static command identifies the inside IP address as being visible on the outside of the firewall. The conduit command lets outside host 10.0.0.1 access the inside host via FTP.

outbound

Create an access list for controlling Internet use. (Configuration mode.)

outbound num permit|deny ip_address [netmask [java|port[-port]]] [protocol]

outbound num except ip_address [netmask [java|port[-port]]] [protocol]

clear outbound [num permit|deny ip_address [netmask [java|port[-port]]] [protocol]]

clear outbound [num except ip_address [netmask [java|port[-port]]] [protocol]]

no outbound [num permit|deny ip_address [netmask [java|port[-port]]] [protocol]]

no outbound [num except ip_address [netmask [java|port[-port]]] [protocol]]

show outbound
Syntax Description
num A tag number for the access list. The number you use must be the same for the apply command. This value must be a positive number.
permit Allow the access list to access the specified IP address and port.
deny Deny the access list access to the specified IP address and port.
except Create an exception to a previous outbound command.
ip_address The IP address for this access list entry.
netmask The network mask for comparing with the IP address; 255.255.255.0 causes the access list to apply to an entire Class C address. 0.0.0.0 indicates all access. The 0.0.0.0 netmask can be abbreviated as 0.
port A port or range of ports that the access list is permitted or denied access to. Do cannot use the udp, tcp, or esp literals in the port range. Permitted literal names are: dns, ftp, h323, http, ident, nntp, ntp, pop2, pop3, rpc, smtp, snmp, snmptrap, sqlnet, telnet, and tftp. Note that you can specify literals in port ranges; for example, ftp-h323.
java The java keyword indicates port 80 and when used with deny, means that the firewall blocks Java applets from being downloaded from ip_address (depending on use of the apply command). Java applets are permitted by default and do not have to be explicitly permitted.
protocol Limit outbound access to udp, tcp, or esp ports.
Usage Guidelines

The outbound command creates an access list that lets you specify the following:

The use of an outbound command requires use of the apply command. The apply command lets you specify whether the access control list applies to inside users' ability to start outbound connections with apply command's outgoing_src option, or whether the access list applies to inside users' ability to access servers on the outside network with the apply command's outgoing_dest option.

Use the no outbound commands to remove the respective outbound statement from the configuration.


Note The Java applet blocking feature removes applets that come into the HTTP port. The
PIX Firewall removes applets containing a Java signature anywhere in the message, but does not remove applets encapsulated in some archive files. Legitimate, non-Java files with Java signatures are also blocked.

If no outbound commands are specified, the default behavior is to permit all outbound traffic and services from inside hosts.

The except option replaces the deny or permit options and lets you create an exception to the outbound command in your configuration that sets up a blanket definition for denying or permitting access.

Do not use the deny, permit, and except options in the same outbound list; this also includes the implied permit in the default mode (listed here for clarity).

The following example demonstrates what NOT to do:

outbound 1 permit 0 0
outbound 1 deny 10.0.0.2 255.255.255.255 23
outbound 1 except 10.0.0.42 255.255.255.255 23
apply (inside) 1 outgoing_src

This set of statements uses the default of permitting all internal hosts to start outbound connections. Because the except option reverses the previous deny, 10.0.0.2 is given Telnet access, and only 10.0.0.42 is actually denied outbound Telnet access.

Do not specify more than one outbound statement for the same outbound list because each additional command stays in the configuration.


Note If you permit access to port 80 (http), this also permits Java applets to be downloaded.
You must have a specific deny statement to block Java applets.

The maximum number of outbound access lists is 1000.

See also: apply.

Examples
Controlling Outbound Connections

The following example prevents all inside hosts from starting outbound connections:

outbound 1 deny 0 0 0
apply (inside) 1 outgoing_src

The 0 0 0 at the end of the command means all IP addresses (0 is the same as 0.0.0.0), with a 0.0.0.0 subnet mask and for all services (port value is zero).

Conversely, the following example permits all inside hosts to start connections to the outside (this is the default if an access list is not created):

outbound 1 permit 0 0 0
apply (inside) 1 outgoing_src
Controlling Inside Hosts' Access to Outbound Services

The following example prevents inside host 192.168.1.49 from accessing the World Wide Web
(port 80):

outbound 11 deny 192.168.1.49 255.255.255.255 80
apply (inside) 11 outgoing_src
Controlling Inside Hosts' Access to Outside Servers

If your employees are spending too much time examining GIF images on a particular site with two web servers, you can use the following example to restrict this access:

outbound 12 deny 192.168.146.201 255.255.255.255 80
outbound 12 deny 192.168.146.202 255.255.255.255 80
apply (outside) 12 outgoing_dest
Preventing Use of Java Applets

The following example prevents all inside users from executing Java applets on the inside network:

outbound 1 deny 0 0 java
apply (inside) 1 outgoing_src

pager

Enable or disable screen paging. (Privileged mode.)

pager [lines lines]

no pager

show pager
Syntax Definition
lines The number of lines before the More prompt appears. The minimum is 1.
Usage Guidelines

The pager lines command lets you specify the number of lines in a page before the More prompt appears. The pager command enables display paging, and no pager disables paging and lets output display completely without interruption. If you set pager lines to some value and want to revert back to the default, enter the pager command without options.

The show pager command displays pager status.

When paging is enabled, the following prompt appears:

<--- More --->

The More prompt uses syntax similar to the UNIX more command:

To return to the command line, press the q key.

Example
pixfirewall5# pager lines 2
pixfirewall6# ping inside 10.0.0.42
        10.0.0.42 NO response received -- 1010ms
        10.0.0.42 NO response received -- 1000ms
<--- More --->

passwd

Set password for Telnet and HTTP access to the firewall console. (Privileged mode.)

passwd password

show passwd
Syntax Description
password A case-sensitive password of up to 15 alphanumeric characters.
Usage Guidelines

The passwd command sets a password for Telnet and HTTP (HTML, Web) access to the firewall console. An empty password is also changed into an encrypted string. The default configuration contains plain text passwords, which you can see with show config. However, any use of a write command displays or writes the passwords in encrypted form. Once passwords are encrypted, they are not reversible back to plain text.

For this reason, always keep a floppy disk with the plain text password available to boot from in the event the encrypted version is forgotten.

If you downgrade your system to version 3, you must use the encrypted form of the password.


Note Write down the new password and store it in a manner consistent with your site's security policy. Once you change this password, you cannot view it again.

See also: enable password.

Example
passwd watag00s1am
show passwd
passwd 2KFQnbNIdI,2KYOU encrypted

ping

Determine if other IP addresses are visible from the PIX Firewall. (Privileged mode.)

ping if_name ip_address
Syntax Description
if_name The internal or external network interface name. The address of the specified interface is used as the source address of the ping.
ip_address The IP address of a host on the inside or outside networks.
Usage Guidelines

The ping command determines if the PIX Firewall has connectivity or if a host is available on the network. The command output shows if the response was received; that is, that the host exists on the network. If the host is not responding, ping displays "no response received." Use show interface to ensure that the PIX Firewall is connected to the network and has connectivity.


Note You cannot ping the PIX Firewall's interface addresses or any global address you specify with the global, static, or mailhost commands.

If you are pinging from a host on the internal or external networks, use the debug trace on command to view the status of packets moving through the firewall.
Example

The ping command makes three attempts to reach an IP address:

ping inside 192.168.42.54
                                                            192.168.42.54 response received -- 1000Ms
                                                            192.168.42.54 response received -- 1010Ms
                                                            192.168.42.54 response received -- 1040Ms

radius-server host

Specify a RADIUS server. (Privileged mode.)

radius-server host local_ip key

clear radius-server [[local_ip] [key]]

no radius-server [[local_ip] [key]]

show radius-server
Syntax Description
local_ip The internal IP address of a RADIUS authentication server. The IP address is used as the source address of the RADIUS request, and the request is transmitted on the internal interface.
key A case-sensitive alphanumeric keyword of up to 127 characters defined by what the authentication server accepts. This is a key between the client and server for encrypting data between them. The key must be the same on both the client and server systems. Spaces are not permitted in the key, but other special characters are.
Usage Guidelines

Specify a RADIUS (Remote Authentication Dial-In User Service) server. Use show radius-server to view the information. Up to 256 TACACS+ and RADIUS servers are permitted. Servers are used in the order entered in the configuration. If the server is off-line or fails, the next server is checked. This continues until a working server is found. Use no radius-server to disable access to a host.

Without arguments, the clear radius-server command removes access to all RADIUS servers.

RADIUS can be used to authenticate connections but not authorize access to services.

Example
radius-server host 192.168.42.42 whatakey!@#$%^&*
show radius-server
radius-server host 192.168.42.42 whatakey!@#$%^&*

reload

Reboot and reload the configuration. (Privileged mode.)

reload
Usage Guidelines

The reload command reboots the PIX Firewall and reloads the configuration from a bootable floppy
disk or, if a floppy disk is not present, from flash memory.


Note You are prompted for confirmation before starting with "Proceed with reload?".
Any response other than n causes the reboot to occur.

If a bootable floppy disk is in the PIX Firewall, during installation, you will be prompted to enter an activation key.
Example
reload
Proceed with reload?  [confirm] y

Rebooting...

rip

Change RIP settings. (Configuration mode.)

rip if_name default|passive

no rip [if_name default|passive]

show rip if_name
Syntax Description
if_name The internal or external network interface name.
default Cause the PIX Firewall to broadcast a default route on the inside network.
passive Enable passive RIP on either the inside or outside interface. The PIX Firewall listens for RIP routing broadcasts and uses that information to populate its routing tables.
Usage Guidelines

The rip passive command enables IP routing table updates from received RIP (Routing Information Protocol) broadcasts. Use show rip to display the current RIP settings. Use no rip to disable the PIX Firewall IP routing table updates. The default is to enable IP routing table updates.

Examples
show rip
rip outside passive
no rip outside default
rip inside passive
no rip inside default
rip inside default 
show rip
rip outside passive
no rip outside default
rip inside passive
rip inside default

route

Enter a static route for the specified interface. (Configuration mode.)

route if_name ip_address netmask gateway_ip [metric]

clear route [if_name ip_address [netmask gateway_ip]]

no route [if_name ip_address [netmask gateway_ip]]

show route
Syntax Description
if_name The internal or external network interface name.
ip_address The internal or external network IP address. Use 0.0.0.0 to specify a default route.
The 0.0.0.0 IP address can be abbreviated as 0.
netmask Specify a network mask to apply to ip_address. Use 0.0.0.0 to specify a default route. The 0.0.0.0 netmask can be abbreviated as 0.
gateway_ip Specify the IP address of the gateway router (the next hop address for this route).
metric Specify the number of hops to gateway_ip. If you are not sure, enter 1. Your network administrator can supply this information or you can use a traceroute command to obtain the number of hops. The default is 1 if a metric is not specified.
Usage Guidelines

Use the route command to enter static routes for an interface. To enter a default route, set ip_address and netmask to 0.0.0.0. All routes entered using the route command are stored in the configuration when it is saved. Refer to the write command for more information about saving the configuration.

Example
route inside 192.168.42.0 255.255.255.0 192.168.88.1 
route outside 0 0 10.10.1.1 1


session

Access an embedded AccessPro router console. (Privileged mode.)

session enable

no session

show session
Note Only use this command if you have an AccessPro router installed in your PIX Firewall.
Syntax Description
enable Enable the session command for communications with the AccessPro router.
Usage Guidelines

The session command lets you specify Cisco IOS commands on an AccessPro router console when the router is installed in your PIX Firewall. Use COM port 4 on the AccessPro router to communicate with the PIX Firewall.

Exit the router console session by entering tilde-dot (~.). Press the tilde key and when you hear a bell sound from your terminal, press the dot key.

While a router console session is occurring, the PIX Firewall disables failover because they both require the same interrupts.

Example

This example enables an AccessPro session, starts the session, and then disables it.

session enable
Session has been enabled.
session
Warning: FAILOVER has been disabled!!!
Attempting session with embedded router, use ~. to quit!

acpro> ~.
no session
Session has been disabled
session
Session is not enabled

show

View command information. (Differs by mode.)

show

show ?
Usage Guidelines

The show command without arguments or the show ? command lets you view the names of the show commands and their descriptions. Explanations for each show command are provided on the respective command page for the command itself where appropriate; for example, show arp is described on the arp command page. However, the show commands that do not have a command equivalent are shown in this section.

If the pager command is enabled and when 24 lines display, the listing pauses, and the following prompt appears:

<--- More --->

The More prompt uses syntax similar to the UNIX more command:

Example
show
aaa	Set Authentication and Authorization parameters

...

show blocks

Show system buffer utilization. (Privileged mode.)

show blocks
Usage Guidelines

The show blocks command lists system buffer utilization.

Example
pixfirewall# show blocks
  SIZE    MAX    LOW    CNT
     4   1600   1598   1600
    80    100     94     97
   256     80     79     80
  1550    800    791    800
 64000     16     16     16

show conn

Display connection information. (Privileged mode.)

show conn
Usage Guidelines

The show conn command displays the number of active TCP connections. Refer to the section,
"PIX Firewall Connection Licenses" in Chapter 1 for more information about how applications use TCP connections. You can derive the value from show conn by adding the "in use" and "remain" values.

Example
show conn
32 in use, 32 remain, 48 most used

show hw

Display hardware identification values. (Unprivileged mode.)

show hw
Usage Guidelines

The show hw command lets you view hardware identification information.

Example
show hw
Hardware ID: 0x52c 0x1bf 19126

show memory

Show system memory utilization. (Privileged mode.)

show memory
Usage Guidelines

The show memory command displays a summary of the maximum physical memory and current free memory available to the PIX Firewall operating system. Memory in the PIX Firewall is preallocated and the amount of free memory should never change.

Example
show memory
nnnnnnnn bytes total, nnnnnnn bytes free

show processes

Display processes. (Privileged mode.)

show processes
Usage Guidelines

The show processes command displays a summary listing of running processes. Processes are lightweight threads requiring only a few instructions to switch. In the listing, PC is the program counter, SP is the stack pointer, STATE is the address of a thread queue, Runtime is the number of milliseconds that the thread has been running, SBASE is the stack base address, Stack is the current number of bytes used and the total size of the stack, and Process lists the thread's function.

Example
show processes
       PC         SP     STATE   Runtime        SBASE    Stack Process
8000139e 8024ad00  80005354        940    80249d1c    36/4096 arp_timer
...

show serial

View the PIX Firewall's serial number. (Privileged mode.)

show serial
Usage Guidelines

The show serial command displays the serial number, also known as the BIOS ID.

Example
show serial
Serial Number:  123

snmp-server

Provide SNMP event information. (Configuration mode.)

snmp-server community key

snmp-server contact text

snmp-server host local_ip

snmp-server location text

clear snmp-server [contact text]

clear snmp-server [host local_ip]

clear snmp-server [location text]

no snmp-server [contact text]

no snmp-server [host local_ip]

no snmp-server [location text]

show snmp-server
Syntax Description
community Indicate that you are entering the key value in use at the SNMP server. SNMP community strings are a shared secret between the SNMP client and server. They are effectively a password used to determine if the SNMP request is valid.
key A case-sensitive key value in use at the SNMP server. This string can be up to 32 characters in length. Spaces are not permitted. The default, if this option is not used, is public. Only use the key in effect at the server, do not make up a key value for the snmp-server command.
contact Indicate that you are supplying your name or that of the PIX Firewall system administrator.
location Indicate that you are specifying your PIX Firewall location.
text When used with contact, specify your name or that of the PIX Firewall system administrator. When used with location, specify your PIX Firewall location. The text is case-sensitive and can be up to 127 characters. Spaces are accepted, but multiple spaces are shortened to a single space.
host Indicate that you are specifying an IP address of a host to which SNMP traps should be sent. You can specify a maximum of 5 host IP addresses.
local_ip When used with host, the IP address of a host to which SNMP traps should be sent. You can specify a maximum of 5 host IP addresses.
Usage Guidelines

Use the snmp-server command to identify your name, location, and the host to which SNMP traps should be sent. Refer to Chapter 2, "Configuring the PIX Firewall" for more information on SNMP events. The clear snmp-server and no snmp-server commands remove the information. The show snmp-server command displays the information.

Example
snmp-server community wallawallabingbang
snmp-server location Building 42, Sector 54
snmp-server contact Sherlock Holmes
snmp-server host 10.1.2.42
show snmp
snmp-server host 10.1.2.42
snmp-server location Building 42, Sector 54
snmp-server contact Sherlock Holmes
snmp-server community WallaWallaBingBang

static

Map local IP address to a global IP address. (Configuration mode.)

static [(internal_if_name, external_if_name)] global_ip local_ip [max_conns [em_limit]] [options]

clear static

no static [[(internal_if_name, external_if_name)] global_ip local_ip [options]]

show static
Syntax Description
internal_if_name The internal network interface name.
external_if_name The external network interface name.
global_ip A global IP address. This address cannot be a PAT (port address translation)
IP address.
local_ip The local IP address from the inside network.
max_conns The maximum number of TCP connections allowed for this static. Use the show conn command to view how TCP connections are being used in the firewall. For more information about connections, refer to "PIX Firewall Connection Licenses" in Chapter 1.
em_limit The embryonic connection limit.
options Specify one option, or two options separated with a comma from the following:

For example, norandomseq,classa. (Do not put a space after the comma.)

Usage Guidelines

The static command creates a permanent mapping (called a static translation slot or "xlate") between a local IP address and a global IP address. For outbound connections, use static to specify an address in the pool of global addresses that is always used for translation between the local host and the global address. For inbound connections, use static with the conduit command to identify addresses visible on the external network. For inbound connections, do not use a global IP address created with the global command.

You can create a single mapping between the global and local hosts, or create a range of statics known as net statics.

The static command determines the network mask of network statics by the class option or by the number in the first octet of the global IP address. The class option overrides the number in the first octet. This feature lets you change the class of a global IP address; for example, you can use 192.0.0.0 as a Class A address even though its first octet indicates it is a Class C address. Refer to the "Net Statics" section for more information.

If the address is all zeros where the net mask is zero, then the address is a net address.


Note Net statics take precedence over use of the nat 1 0 0 and global command pair. This means that nat 1 0 0 only grants outbound access to hosts not specified in the net static statement.
IP Address Classes

IP address classes are defined as follows:

Class Resolution Examples

If the global_ip address is a net address, then the static is presumed to be a net static, and the net mask is the mask for the global_ip address. The local_ip address must follow the global_ip address; if the global address is a Class B net address, then the local_ip address must also be a net address, using a Class B net mask. For example, the following command is a net static:

	static (inside,outside) 172.16.0.0 172.8.0.0 0 0 

The global_ip is 172.16.0.0. The first octet is 172, and that makes the net mask 255.255.0.0 (a
Class B net mask). When a net mask of 255.255.0.0 is applied to the local_ip address, we find that it is also a net address. It does not matter that the first octet in the local_ip is a Class B address; the only thing that counts is the value of the first octet of the global_ip.

	static (inside, outside) 172.16.0.0 10.8.0.0 0 0 

In this command, the local_ip address, 10.8.0.0, is a Class A address, but the mask is taken from the global_ip address, which is a Class B address, so the net mask is 255.255.0.0. Using that mask, 10.8.0.0 is a net address.

	static (inside,outside) 172.16.0.0 192.168.5.0 0 0 

This command is an error, and is rejected. The global address is a Class B net address. Using a
Class B net mask, the local_ip is a host address, not a net address. It is irrelevant that 192.168.5.0 is a Class C address, as determined by its first octet, 192. It also does not matter that 192.168.5.0, under most conditions, would be considered a Class C network address. What matters is that the global address indicates that static use a Class B net mask. Using that mask, 172.16.0.0 is a net address and 192.168.5.0 is a host address, and PIX Firewall disallows a static command where the global_ip is a host address and local_ip is a net address or vice versa.

Using the class Option

To specify a net mask different than the mask specified by the global_ip address, use the class option. This option overrides the net mask implied by the first octet of the global_ip.

For example, if you have three Class C networks, 10.0.0.0, 10.2.0.0, and 10.3.4.0, and want to create a net static for the first one only, use the following command:

	static (inside,outside) 10.0.0.0 10.0.0.0 0 0 classc 

The class option lets you permit access to some hosts in a network and deny access to others as shown in this example:

static (inside,outside) 10.0.0.0 10.0.0.0 0 0 classc 	
conduit (inside,outside) 10.0.0.0 0 tcp 0 0 	
conduit (inside,outside) 10.0.0.0 0 udp 0 0

Without the classc option, the command would build a static and a conduit for 10.n.n.n; and allow TCP access to both 10.0.0.5 and 10.2.0.3. With the classc option, the command builds a static and a conduit for 10.0.0.n. This then permits outside TCP access to 10.0.0.5, but denies access to 10.2.0.3.

The following usage rules apply:

Use show static to view static statements in the configuration.

If the global_ip and the local_ip are of the same class, static mapping is one-to-one.

If the global_ip and the local_ip are not of the same class; for example, static 172.16.32.0 10.1.0.0 then PIX Firewall maps 172.16.32.n to 10.1.x.n on a first-come, first-serve basis. If both 10.1.1.2 and 10.1.2.2 want to go outbound in that order, 10.1.1.2 will use the global 172.16.32.2 to go out and 10.1.2.2 will be denied. On the other hand, if 10.1.2.2 sends a connection request ahead of 10.1.1.2, 10.1.2.2 will be able to go out using the global 172.16.32.2 and 10.1.1.2 will be denied.

PIX Firewall does not allow the global_ip class to be a smaller class than the local_ip class. That is, a
Class A global_ip cannot be mapped to a Class C local_ip address.

Net Statics

You can also create net statics that permit up to 254 statics to be created simultaneously. If both the global_ip and local_ip are network addresses (the host ID is 0), net statics are created for the full number of IP addresses available in the class. Each address is mapped one-to-one between the global and local addresses.

The class option overrides the number in the first octet. This feature lets you change the class of a global IP address; for example, you can use 192.0.0.0 as a Class A address even though its first octet indicates it is a Class C address.

The following restrictions apply to use of the static command:

An example net static is:

static (inside, outside) 204.31.17.0 10.1.1.0 classc

This statement creates statics that map 204.31.17.1 to 10.1.1.1, 204.31.17.2 to 10.1.1.2, and so on up to the last value for the class type, in this case, 204.31.17.254 to 10.1.1.254.


Note For net statics, the addresses in the range must only be used for static mappings. They cannot also be used for a network interface or a default route.

Do not create a global pool for a net static.

The maximum number of net statics that can be created is 16,384.
Regular Statics

An embryonic connection is a connection that someone attempted but has not completed and has not yet seen data. Every connection is embryonic until it sets up. If you do not specify a value, the default is 0, which means unlimited connections; however, 0 cannot be specified.

The maximum is 65,535 and the minimum is 1. A rule of thumb for the limit is the maximum number of connections on your connection license minus 30%; for example, on a 64-session license, set it to at least 40. Set it lower for slower systems, higher for faster systems.

The max_conns option permits access to the service for only the number of users (connections). The max_conns value applies to BOTH inbound and outbound connections so if it is set to 30 and 30 SYN flooders come in, the service itself cannot go out.

Use the static command before the conduit command.

Use the mailhost command to specify a static for an SMTP server. The mailhost command is a type of static with special features to prevent attacks from the outside.

See also: conduit.

Example

The example that follows creates a net static and then permits users to call in through H.323 using Intel InternetPhone or MS NetMeeting to 10.1.1.222 using IP address 204.31.17.222 to 10.1.1.188 using
IP address 204.31.17.188, and so on.

static (inside, outside) 204.31.17.0 10.1.1.0 8 50
conduit (inside, outside) 204.31.17.0 h323 tcp 0 0

syslog

Enable SYSLOG message facility. (Privileged mode.)

syslog console

clear syslog console

no syslog console

syslog host local_ip

clear syslog host local_ip

no syslog host [local_ip]

syslog output facility.level

clear syslog output facility.level

no syslog output facility.level

show syslog
Syntax Description
local_ip The IP address of an internal network host that is authorized to receive SYSLOG messages.
facility Eight facilities LOCAL0(16) through LOCAL7(23); the default is LOCAL4(20). Hosts file the messages based on the facility number in the message.
level Message type; sets the level above which the PIX Firewall suppresses messages to the SYSLOG hosts. Setting the level to 3, for example, allows messages with levels 0, 1, 2, and 3 to display. The default is 3. The levels are:

  • 0 -- System unusable

  • 1 -- Take immediate action

  • 2 -- Critical condition

  • 3 -- Error message

  • 4 -- Warning message

  • 5 -- Normal but significant condition

  • 6 -- Informational

  • 7 -- Debug message

Usage Guidelines

The syslog console command displays SYSLOG messages on the console session. If you are using Telnet to access the console, the output displays in the Telnet session. Use no syslog console to stop the display.

The syslog host command lets you specify up to 16 inside network host IP addresses to which SYSLOG messages are sent. Use no syslog host to remove a host from the receiving list.

Use no syslog host to remove a host from the receiving list. Use show syslog to view the current hosts. Refer to the description of syslog output for more information on SYSLOG.


Note Use syslog host before any other syslog command.

The PIX Firewall generates SYSLOG messages for system events, such as security alerts and resource depletion. Using a UNIX syslog facility, you can specify which types of SYSLOG messages create email alerts, are stored in log files, or display on the console of a designated inside network host.

Because the PIX Firewall shares the eight facilities with other UNIX network devices, syslog output lets you choose the facility that the PIX Firewall marks on each message it sends to the SYSLOG host. Messages are sent to the SYSLOG host over UDP.

A PC WinSock version of syslogd can also receive SYSLOG events created by PIX Firewall.


Note You can specify only one syslog output command in your configuration. The PIX Firewall sends all messages to the single facility you choose. In addition, the PIX Firewall sends SYSLOG messages only to a single file on the receiving system.

Use show syslog to view the current SYSLOG hosts and previously sent messages.

Example

The following example uses syslog host to specify an inside network host to receive SYSLOG messages, starts SYSLOG with the syslog output command, enables the console to receive SYSLOG messages, and then shows the current SYSLOG status:

syslog host 192.168.0.99
syslog out 20.4
syslog console
show syslog
    OUTPUT ON (20.4)
    CONSOLE ON
<162> 104001 Secondary: Switching to ACTIVE.
<162> 101003 Secondary: Cable not connected my side.

tacacs-server host

Specify a TACACS+ server. (Privileged mode.)

tacacs-server host local_ip [key]

clear tacacs-server host [[local_ip] [key]]

no tacacs-server host [[local_ip] [key]]

show tacacs-server
Syntax Description
local_ip The internal IP address of a TACACS+ authentication server. The IP address is used as the source address of the TACACS+ request, and the request is transmitted on the internal interface.
key A case-sensitive alphanumeric keyword of up to 127 characters that is the same as on the TACACS+ server. This is a key between the client and server for encrypting data between them. The key must be the same on both the client and server systems. Spaces are not permitted in the key, but other special
characters are.
Usage Guidelines

Specify a TACACS+ (Terminal Access Controller Access Control System) server. Use
show tacacs-server to examine the information. Up to 256 TACACS+ and RADIUS servers are permitted. Servers are used in the order entered in the configuration. If the server is off-line or fails, the next server is checked. This continues until a working server is found.


Note The key parameter is optional. If you do not specify a key, communications with the TACACS+ server are not encrypted.
Example
tacacs-server host 192.168.42.42 whatakey!@#$%^&*
show tacacs-server
tacacs-server host 192.168.42.42 whatakey!@#$%^&*

telnet

Allow an inside IP address access to the PIX Firewall console over Telnet. (Privileged mode.)

telnet local_ip [netmask]

clear telnet [local_ip [netmask]]

no telnet [local_ip [netmask]]

show telnet
Syntax Description
local_ip The internal IP address or network of a host that is authorized to access the
PIX Firewall Telnet console interface.
netmask Bit mask of local_ip. To limit access to a single IP address, use 255 in each octet; for example, 255.255.255.255. If you do not specify netmask, it defaults to 255.255.255.255 regardless of the class of local_ip.

Note: This is NOT the subnet mask of the internal network. It is only a bit mask for the IP address in local_ip.

Usage Guidelines

The telnet command lets you decide who can access the PIX Firewall with Telnet. Up to 16 hosts or networks are allowed access to the PIX Firewall console with Telnet, 5 simultaneously. The show telnet command displays the current list of IP addresses authorized to access the PIX Firewall. Use no telnet or clear telnet to remove Telnet access from a previously set IP address. Use the who command to view which IP addresses are currently accessing the firewall. Use the kill command to terminate an active Telnet console session.


Note The default password for Telnet access is cisco.

With Telnet, you can configure the PIX Firewall from the inside network or over Private Link.

To use Telnet to access the console, the following is required:

See also: passwd, who.

Examples
telnet 192.168.1.3 255.255.255.255 
telnet 192.168.1.4 255.255.255.255
telnet 192.168.2.0 255.255.255.0
show telnet
          192.168.1.3 255.255.255.255
          192.168.1.4 255.255.255.255
          192.168.2.0 255.255.255.0
no telnet 192.168.1.3
show telnet
          192.168.1.4 255.255.255.255
          192.168.2.0 255.255.255.0

tftp-server

Specify the IP address of the TFTP configuration server. (Configuration mode.)

tftp-server local_ip path

no tftp-server [local_ip path]

show tftp-server
Syntax Description
local_ip The internal IP address or network of the TFTP server.
path The path and filename of the configuration file. The format for path differs by the type of operating system on the server. The contents of path are passed directly to the server without interpretation or checking.
Usage Guidelines

The tftp-server command lets you specify the IP address of a server that you use to propagate PIX Firewall configuration files to your firewalls. Use tftp-server with the configure net command to read from the configuration or with the write net command to store the configuration in the file you specify.

The contents of the path name you specify in tftp-server are appended to the end of the IP address you specify in the configure net and write net commands. The more of a file and path name specification you provide with the tftp-server command, the less you need to do with the configure net and write net commands. If you specify the full path and filename in tftp-server, the IP address in configure net and write net can be represented with a colon ( : ).

The no tftp server command disables access to the server. The show tftp-server command lists the tftp-server statements in the current configuration.

Example

The following example specifies a TFTP server and then reads the configuration from /pixfirewall/config/test_config:

tftp-server 10.1.1.42 /pixfirewall/config/test_config
...
configure :

timeout

Set the maximum idle time duration. (Configuration mode.)

timeout [xlate [hh:mm:ss]] [conn [hh:mm:ss]] [udp [hh:mm:ss]] [rpc [hh:mm:ss]]

[h323 [hh:mm:ss]] [uauth [hh:mm:ss]]

show timeout
Syntax Description
conn hh:mm:ss Idle time until a connection slot is freed (default value is 12 hours). Use 0:0:0 for the time value to never time out a connection. This duration must be at least 5 minutes.
h323 hh:mm:ss Duration for H323 (InternetPhone) inactivity timer. When this time elapses, the port used by the H323 service closes. This duration must be at least 5 minutes.
rpc hh:mm:ss Idle time until an RPC slot is freed. This duration must be at least 1 minute.
uauth hh:mm:ss Duration before authentication and authorization cache times out and user has to reauthenticate next connection. This duration must be longer than the xlate value and longer than 2 minutes. Set to 0 to disable caching.
udp hh:mm:ss Idle time until a UDP slot is freed. This duration must be at least 1 minute.
xlate hh:mm:ss Idle time until a translation slot is freed (default value is 24 hours). This duration must be at least 5 minutes.
Usage Guidelines

The timeout command sets the idle time for connection, translation UDP, RPC, and H323 slots. If the slot has not been used for the idle time specified, the resource is returned to the free pool. The minimum idle time for xlate is 5 minutes. TCP connection slots are freed within 30 seconds after a normal connection close sequence.

Use show timeout to display the current timeout settings.

See also: show xlate, uauth.


Note RPC and NFS are very unsecure protocols and should be used with caution.
Examples
show timeout
timeout xlate 24:00:00 conn 12:00:00 udp 0:02:00
timeout rpc 0:10:00 h323 0:05:00 uauth 0:05:00
timeout xlate 5:0:0
timeout conn 0:0:0
timeout xlate 5:00:00 conn 0:00:00 udp 0:02:00 
timeout rpc 0:10:00 h323 0:05:00 uauth 0:05:00
timeout xlate 0:10:0 conn 0:5:0
show timeout
timeout xlate 0:10:00 conn 0:05:00 udp 0:02:00 
timeout rpc 0:10:00 h323 0:05:00 uauth 0:05:00
timeout xlate 0:0:12345
show timeout
timeout xlate 3:25:45 conn 0:05:00 udp 0:02:00 
timeout rpc 0:10:00 h323 0:05:00 uauth 0:05:00

uauth (clear and show)

Delete all authorization caches for a user. (Privileged mode).

clear uauth

show uauth
Usage Guidelines

The clear uauth command deletes all users' authorization caches, which forces all authorized users to have to reauthenticate the next time they create a connection. The show uauth command displays all currently authenticated users, the host IP to which they are bound, and, if applicable, any cached IP and port authorization information.

Each user host's IP address has an authorization cache attached to it. If the user attempts to access a service that has been cached from the correct host, the firewall considers it preauthorized and immediately unproxies the connection. This means that once you are authorized to access a web site, for example, the authorization server is not contacted for each of the images as they are loaded (assuming they come from the same IP address). This significantly increases performance and reduces load on the authorization server.

The cache allows up to 16 address and service pairs for each user host.

The output from show uauth displays the user name provided to the authorization server for authentication and authorization purposes, the IP address that the user name is bound to, and whether the user is authenticated only, or has cached services.

Use the timeout uauth command to specify how long the cache should be kept after the user connections become idle. The timeout value must be at least 2 minutes. Use clear uauth to delete all authorization caches for all users, which will cause them to have to reauthenticate the next time they create a connection.

See also: aaa authorization, timeout.

Example
show uauth
user 'winifred' from 207.31.17.42 authenticated
user 'pollyhedra' from 207.31.17.54 authorized to:
                       port 192.168.67.34/telnet                        192.168.67.11/http                                    192.168.67.33/tcp/8001
                                                          192.168.67.56/tcp/25                              192.168.67.42/ftp
user 'oakman' from 207.31.17.207 authorized to:
                       port 262.146.153.50/http                                     262.71.177.69/http

In this example, user winifred has authenticated with the server but has not completed authorization. User pollyhedra has preauthorized connections to the Telnet, web (HTTP), sendmail, FTP services, and to TCP port 8001 on 192.168.67.33.

User oakman has been browsing the web and is authorized for web browsing to the two sites shown.

uptime

Display time since last reboot. (Unprivileged mode.)

uptime

show uptime
Usage Guidelines

The uptime and show uptime commands are identical and display how long the firewall has been operating since its last reboot.

Example
uptime
pixfirewall up 12 hours 24 mins

version

View the PIX Firewall version. (Unprivileged mode.)

version

show version
Usage Guidelines

The version and show version commands are identical and let you view the version of your PIX Firewall software.

Example
version
PIX Version 4.pv.nnn

where: pv is the point release version and nnn is the release number.


who

Show active Telnet administration sessions on the PIX Firewall. (Unprivileged mode.)

who [local_ip]

show who [local_ip]
Syntax Description
local_ip An optional internal IP address to limit the listing to one IP address or to a network IP address.
Usage Guidelines

The who command shows the PIX Firewall tty_id and IP address of each Telnet client currently logged into the PIX Firewall. This command is the same as the show who command.

See also: kill, telnet.

Example
who
2: From 192.168.2.2
1: From 192.168.1.3

write

Store, view, or erase the current configuration. (Privileged mode.)

write net [[server_ip]:[filename]]

write erase

write floppy

write memory

write terminal
Syntax Description
server_ip Stores current configuration at a host available across the network. If you specify the full path and filename in the tftp-server command, only specify a colon ( : ) in the write command.
filename A filename you specify to qualify the location of the configuration file on the TFTP server named in server_ip. If you set a filename with the tftp-server command, do not specify it in the write command; instead just use a colon ( : ) without a filename.

Many TFTP servers require the configuration file to be world-writable to
write to it.

erase Clears the flash memory configuration.
floppy Stores current configuration on floppy disk.
memory Stores current configuration in flash memory.
terminal Displays current configuration on the terminal.
Usage Guidelines

The write net command stores the current configuration into a file on a TFTP server elsewhere in the network. If you specify both the IP address and path name in the tftp-server command, you can specify :filename as simply a colon ( : ); for example:

	write net :

Use the configure net command to get the configuration from the file.

The write erase command clears the flash memory configuration. To refresh the flash memory without erasing information, use the groom command.

The write floppy command stores the current configuration on floppy disk. The floppy disk must be DOS formatted or a PIX Firewall boot disk. The floppy disk you create can only be read or written by the PIX Firewall. If you use the write floppy command with a floppy disk that is not a PIX Firewall boot disk, do not leave the floppy in the floppy drive because it will prevent the firewall from rebooting in the event of a power failure or system reload. Only one copy of the configuration can be stored on a single floppy disk.

The write memory command saves the current running configuration to flash memory. Use configure memory to merge the current configuration with the image you saved in flash memory.


Note Only use the write memory command if a configuration has been created with IP addresses for both network interfaces.

The write terminal command displays the current configuration in the PIX Firewall's RAM memory.

You can also display the configuration stored in flash memory using the show configure command.

See also: configure, groom.

Examples

The following example specifies a configuration file on the TFTP server and then stores the configuration in this file:

tftp-server 10.1.1.2 /pixfirewall/config/new_config
write net :

The following example erases the contents of flash memory and reloads the PIX Firewall:

write erase
Erase PIX configuration in flash memory? [confirm] y
reload

The following example saves the configuration on floppy disk:

write floppy
Building configuration...
[OK]

The following example saves the configuration in flash memory:

write memory
Building configuration...
[OK]

The following example displays the configuration:

write terminal
Building configuration...
: Saved
:
...

xlate (clear and show)

View or clear translation slot information. (Privileged mode.)

clear xlate [global_ip [local_ip]]

show xlate [global_ip [local_ip]]
Syntax Description
global_ip The registered IP address to be used from the global pool.
local_ip The local IP address from the inside network.
Usage Guidelines

The clear xlate command clears the contents of the translation slots. ("xlate" means translation slot.)

The show xlate command displays the contents of the translation slots.


Note In the output of the show xlate command, if a line in the display is flush left, it describes information for a translation slot ("xlate"). If the display line is indented, it describes information in a connection slot ("conn").

Table 3-1 lists connection slot flags:


Table 3-2: Connection Slot Flags
Connection Flag Description
< Rshell back connection.
b SMTP banner.
D Connection done.
f FIN seen on inbound packet.
F FIN seen on outbound packet.
h H245 parameter negotiations.
H HTTP get.
i SMTP incomplete.
I Data in.
J Java applets are not permitted on connection.
m SMTP data.
O Data out.
q ISDN started.
Q SQL*net
r Reclaim memory.
R Reclaim memory.
S SMTP connection.
U Connection is up.

Table 3-3 lists translation slot flags:


Table  3-3:
Translation Slot Flags
Translation Flag Description
a Passive mode FTP detected on inbound connection.
A Passive mode FTP detected on outbound connection.
B Inbound-only connection.
d Marked to be dumped (cleaned up).
f Expecting IP fragment.
h HTTP connection.
i PAT ICMP echo.
I Identity connection. The identity feature is started with the nat 0 command.
n The IP packet sequence number has not been randomized. This occurs when the norandomseq option is used with the nat and the static commands.
N Netstatic xlate.
o Port-in received
O Port-out received.
p Port-in transmitted.
P Port-out transmitted.
r Port address translation (PAT) xlate.
R Connection flag--reclaim memory.
s Static.
S SMTP connection.
v Passive mode FTP started.

See also: timeout, uauth.

Example

In the following example, line numbers are added to make interpretation of the output easier.


  1. show xlate

  2. Global 11.1.1.1 Local 10.1.1.1 static nconns 0 econns 0 flags s

  3. Global 192.150.49.105 Local 171.69.74.17 static nconns 0 econns 0 flags s

  4. TCP out 192.150.49.12:23 in 171.69.74.17:1330 idle 0:00:18 Bytes 374 flags fFrRIO

  5. UDP out 192.150.49.12:8393 in 171.69.74.17:4574 idle 0:00:30 flags -

  6. UDP out 192.150.49.12:659 in 171.69.74.17:4580 idle 0:00:00 flags -

  7. UDP out 192.150.49.12:111 in 171.69.74.17:4579 idle 0:00:00 flags -

  8. PAT Global 192.150.49.110(2049) Local 171.69.74.17 flags dr

  9. PAT Global 192.150.49.110(2051) Local 171.69.74.17 flags r

  10. TCP out 192.150.49.12:23 in 171.69.74.17:1334 idle 0:00:24 Bytes 374 flags fFrRIO

  11. PAT Global 192.150.49.110(2055) Local 171.69.74.17 flags r

  12. UDP out 192.150.49.12:659 in 171.69.74.17:4604 idle 0:01:30 flags -

  13. PAT Global 192.150.49.110(2054) Local 171.69.74.17 flags r

  14. UDP out 192.150.49.12:111 in 171.69.74.17:4603 idle 0:01:30 flags -

  15. PAT Global 192.150.49.110(2056) Local 171.69.74.17 ICMP id 27606 flags ri

Line 1 starts the display. Line 2 shows a static xlate in which no connections have been established. Line 3 shows a global xlate. Lines 4 through 7 show the connection slots for the static xlate in
line 3. Line 4 shows a Telnet (:23-port 23) connection. Line 5 shows a UDP state of a DNS query awaiting a response. 8393 is the DNS ID. Usually DNS queries get answered and closed quickly and do not appear. Lines 6 and 7 show a portmapper (111) and the resulting mountd request (659) built from the portmapper request.

Line 8 shows a port address translation (PAT) IP connection marked to be cleaned up. Lines 9 and 10 show a PAT for a Telnet. Lines 11 through 14 show a PAT from a portmapper and mountd. Line 15 shows a PAT for an ICMP ping.

"nconns" in lines 2 and 3 is the maximum number of TCP connections allowed for this static. Use the show conn command to view how TCP connections are being used in the firewall. For more information about connections, refer to "PIX Firewall Connection Licenses" in Chapter 1.

"econns" is the embryonic connection limit.

"idle" means there is not data on the connection.

hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1997 © Cisco Systems Inc.