
- •Icons Used in This Book
- •Network Security
- •Vulnerabilities
- •Threats
- •Types of Attacks
- •Network Security Policy
- •AVVID and SAFE
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Firewall Technologies
- •Cisco PIX Firewall
- •Foundation Summary
- •The Cisco Secure PIX Firewall
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of the Cisco PIX Firewall
- •Cisco PIX Firewall Models and Features
- •Foundation Summary
- •System Maintenance
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Accessing the Cisco PIX Firewall
- •Installing a New Operating System
- •Upgrading the Cisco PIX OS
- •Creating a Boothelper Diskette Using a Windows PC
- •Auto Update Support
- •Password Recovery
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How the PIX Firewall Handles Traffic
- •Address Translation
- •Translation Versus Connection
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Access Modes
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •TurboACL
- •Object Grouping
- •Advanced Protocol Handling
- •Foundation Summary
- •Syslog
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How Syslog Works
- •How Log Messages Are Organized
- •How to Read System Log Messages
- •Disabling Syslog Messages
- •Foundation Summary
- •Cisco PIX Firewall Failover
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •What Causes a Failover Event
- •What Is Required for a Failover Configuration
- •Failover Monitoring
- •Stateful Failover
- •LAN-Based Failover
- •Foundation Summary
- •Virtual Private Networks
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of VPN Technologies
- •Cisco VPN Client
- •PPPoE Support
- •Foundation Summary
- •Scenario
- •Completed PIX Configurations
- •PIX Device Manager
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •PDM Overview
- •PIX Firewall Requirements to Run PDM
- •Foundation Summary
- •Content Filtering with the Cisco PIX Firewall
- •“Do I Know This Already?” Quiz
- •Filtering Java Applets
- •Filtering ActiveX Objects
- •Filtering URLs
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of AAA and the Cisco PIX Firewall
- •Cisco Secure Access Control Server (CSACS)
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Specifying Your AAA Servers
- •Troubleshooting Your AAA Setup
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Multimedia Support on the Cisco PIX Firewall
- •Attack Guards
- •PIX Firewall’s Intrusion Detection Feature
- •ip verify reverse-path Command
- •Foundation Summary
- •Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
- •Chapter 1
- •Chapter 2
- •Chapter 3
- •Chapter 4
- •Chapter 5
- •Chapter 6
- •Chapter 7
- •Chapter 8
- •Chapter 9
- •Chapter 10
- •Chapter 11
- •Chapter 12
- •Chapter 13
- •Chapter 14
- •Chapter 15
- •Appendix B
- •What’s Wrong with This Picture?

240 Chapter 11: PIX Device Manager: PIX Device Manager
Foundation Summary
PDM is a browser-based configuration tool designed to help you set up, configure, and monitor your Cisco PIX Firewall graphically. It is installed as a separate software image on the Cisco PIX Firewall and resides in the Flash memory of all PIX units running PIX version 6.0 and higher. Multiple PIX units can be monitored and configured using the PDM from a single workstation via the web browser.
PDM works with the following operating systems:
Windows Requirements
•Windows 2000 (Service Pack 1), Windows NT 4.0 (Service Pack 4 and higher), Windows 98, or Windows Me.
•Supported browsers: Internet Explorer 5.0 (Service Pack 1) or higher (5.5 recommended), Netscape Communicator 4.51 or higher (4.76 recommended). Internet Explorer is recommended due to its faster load times.
•Any Pentium or Pentium-compatible processor running at 350 MHz or higher.
•At least 128 MB of RAM. 192 MB or more is recommended.
•An 800× 600-pixel display with at least 256 colors. A 1024× 768-pixel display and at least High Color (16-bit) colors are recommended.
SUN Solaris Requirements
•Sun Solaris 2.6 or later running CDE or OpenWindows window manager.
•SPARC microprocessor.
•Supported browser: Netscape Communicator 4.51 or higher (4.76 recommended).
•At least 128 MB of RAM.
•An 800× 600 pixel display with at least 256 colors. A 1024× 768 pixel display and at least High Color (16-bit) colors are recommended.
Linux Requirements
•Red Hat Linux 7.0 running the GNOME or KDE 2.0 desktop environment.
•Supported browser: Netscape Communicator 4.75 or a later version.
•At least 64 MB of RAM.
•An 800× 600-pixel display with at least 256 colors. A 1024× 768-pixel display and at least High Color (16-bit) colors are recommended.

Foundation Summary 241
PDM uses tables, drop-down menus, and task-oriented selection menus to assist you in administering your Cisco PIX Firewall. Connection to the PDM is only allowed for SSL connection. There are six main tabs available on the PDM used to configure the Cisco PIX Firewall:
•
•
•
•
•
•
System Properties
Hosts/Networks
Translation Rules
Access Rules
VPN
Monitoring
The optimal configuration file size to use with PDM is less than 100 KB (which is approximately 1500 lines). Cisco PIX Firewall configuration files larger than 100 KB might interfere with PDM’s performance on your workstation.

242 Chapter 11: PIX Device Manager: PIX Device Manager
Q&A
The questions in this book are more difficult than what you should experience on the exam. The questions do not attempt to cover more breadth or depth than the exam; however, they are designed to make sure that you know the answer. Hopefully, these questions will help limit the number of exam questions on which you narrow your choices to two options and then guess. Be sure to use the CD and take the simulated exams.
The answers to these questions can be found in Appendix A.
1How many tabs does the PDM have for configuring and monitoring the Cisco PIX Firewall?
AThree
BFive
CEight
DSix
2 How do you connect to the PDM?
ABy accessing the PIX through Telnet and entering PDM
BBy entering http://inside_interface_ip in your browser
CBy entering https://inside_interface_ip in your browser
DBy entering https://PIX_PDM
3What version of the PIX is required for PDM to run?
A 5.1
B 5.2
C 5.3
D 6.0
4Which model of the Cisco PIX Firewall does PDM support?
A 506
B 515
C 520
D 525
E 535
F All of the above

Q&A 243
5 Where does PDM reside?
AOn a Windows NT/2000 server
BOn a Red Hat Linux 7.0 server
COn a Solaris server
DAll of the above
EIn the PIX Flash memory
6What default security mechanism does PDM employ for browsers to connect to it?
A RSA
B SSL
C Biometrics
D None of the above
7True or false: The PDM lets conduits and access lists exist together on the PIX
Firewall configuration.
8Which of the following is a prerequisite for access rules to be created?
A Hosts or networks must be defined before access rule creation.
B Dynamic or static translation must be defined before access rule creation.
C There are no prerequisites.
D A and B
9What is a translation exemption rule?
AA rule that exempts addresses from being encrypted or translated
BA rule that denies access to addresses
CA rule that increases security on selected addresses
DNone of the above
10PDM does not run on which of the following?
A Windows 3.1
B Windows 2000
C Linux 7.0
D Windows NT 4.0

This chapter covers the following exam topics for the Secure PIX Firewall Advanced Exam (CSPFA 9E0-111):
20. URL filtering