
- •Icons Used in This Book
- •Network Security
- •Vulnerabilities
- •Threats
- •Types of Attacks
- •Network Security Policy
- •AVVID and SAFE
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Firewall Technologies
- •Cisco PIX Firewall
- •Foundation Summary
- •The Cisco Secure PIX Firewall
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of the Cisco PIX Firewall
- •Cisco PIX Firewall Models and Features
- •Foundation Summary
- •System Maintenance
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Accessing the Cisco PIX Firewall
- •Installing a New Operating System
- •Upgrading the Cisco PIX OS
- •Creating a Boothelper Diskette Using a Windows PC
- •Auto Update Support
- •Password Recovery
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How the PIX Firewall Handles Traffic
- •Address Translation
- •Translation Versus Connection
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Access Modes
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •TurboACL
- •Object Grouping
- •Advanced Protocol Handling
- •Foundation Summary
- •Syslog
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How Syslog Works
- •How Log Messages Are Organized
- •How to Read System Log Messages
- •Disabling Syslog Messages
- •Foundation Summary
- •Cisco PIX Firewall Failover
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •What Causes a Failover Event
- •What Is Required for a Failover Configuration
- •Failover Monitoring
- •Stateful Failover
- •LAN-Based Failover
- •Foundation Summary
- •Virtual Private Networks
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of VPN Technologies
- •Cisco VPN Client
- •PPPoE Support
- •Foundation Summary
- •Scenario
- •Completed PIX Configurations
- •PIX Device Manager
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •PDM Overview
- •PIX Firewall Requirements to Run PDM
- •Foundation Summary
- •Content Filtering with the Cisco PIX Firewall
- •“Do I Know This Already?” Quiz
- •Filtering Java Applets
- •Filtering ActiveX Objects
- •Filtering URLs
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of AAA and the Cisco PIX Firewall
- •Cisco Secure Access Control Server (CSACS)
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Specifying Your AAA Servers
- •Troubleshooting Your AAA Setup
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Multimedia Support on the Cisco PIX Firewall
- •Attack Guards
- •PIX Firewall’s Intrusion Detection Feature
- •ip verify reverse-path Command
- •Foundation Summary
- •Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
- •Chapter 1
- •Chapter 2
- •Chapter 3
- •Chapter 4
- •Chapter 5
- •Chapter 6
- •Chapter 7
- •Chapter 8
- •Chapter 9
- •Chapter 10
- •Chapter 11
- •Chapter 12
- •Chapter 13
- •Chapter 14
- •Chapter 15
- •Appendix B
- •What’s Wrong with This Picture?

354 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
Chapter 10
"Do I Know This Already?" Quiz
1Which encryption is stronger, Group 2 Diffie-Hellman or 3DES?
Answer: 3DES. Diffie-Hellman is not an encryption protocol.
2What is the command to apply an access list to a crypto map?
Answer: crypto-map map-name seq-num match address acl_name
3What is the difference between ESP and AH?
Answer: AH does only header authentication. ESP can both authenticate and encrypt the header and the data.
4What service uses UDP 500?
Answer: IKE
5What is the size of an MD5 hash?
Answer: 128 bits
6Why is manual-ipsec not recommended by Cisco?
Answer: The session keys are manually coded and never change.
7 What is the most scalable VPN solution?
Answer: IKE using certification authorities (CAs)
8 What is the difference between an access VPN and an intranet VPN?
Answer: Access VPNs require VPN client software on the remote machine.
9Which hash algorithm is configured by default for phase 1?
Answer: SHA
10What are the two methods of identifying SA peers?
Answer: IP address and host name
11What happens if you have different ISAKMP policies configured on your potential SA peers, and none of them match?
Answer: They cannot negotiate the connection.
12What command should you use to watch your IKE negotiation?
Answer: debug crypto isakmp

Chapter 10 355
13Where do you define your authentication method?
Answer: isakmp policy
14What are the three types of VPNs?
Answer: Access, intranet, extranet
Q&A
1What is the default lifetime if not defined in isakmp policy?
Answer: 86,400 seconds
2Do your transform sets have to match exactly on each peer?
Answer: No. The peers continue to go through the transforms until they find a match. If there is no match, they are unable to negotiate the connection.
3True or false: The X509v3 standard applies to the ESP header's format.
Answer: False. X509v3 applies to digital certificates.
4What is the difference between the isakmp lifetime and the crypto-map lifetime?
Answer: The isakmp lifetime initiates a renegotiation of IKE based on time only. The crypto-map lifetime initiates a renegotiation of the IPSec SA based on time of traffic (kilobytes).
5What command do you use to delete any active SAs?
Answer: clear crypto isakmp sa
6What is the command for defining a preshared key?
Answer: isakmp key string address | hostname peer-address netmask peer netmask | hostname
7What is the first thing you should check if you are unable to establish a VPN?
Answer: Verify that the peers' configurations match.
8What is the function of the access list with regard to VPNs?
Answer: It tells the PIX what traffic should be encrypted.
9What PIX firewalls support PPPoE?
Answer: 501, 506, 506E

356 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
Chapter 11
"Do I Know This Already?" Quiz
1What happens to traffic that is not explicitly permitted by an access rule in an access control list?
Answer: It is denied.
2True or false: PDM supports a mixed configuration with outbound or conduit commands and access-list commands.
Answer: False
3 What is a translation exemption rule?
Answer: The translation exemption rule specifies traffic that is exempt from being translated or encrypted. It is possible to create an exemption rule for traffic that is not to be encrypted and sent to the Internet or a less-secure interface. This makes it possible to allow certain traffic between hosts or networks to remain unencrypted. This can be useful if you want to encrypt some traffic to another remote VPN network but you want traffic destined for anywhere else to be unencrypted.
4 What are the six tabs on the PDM?
Answer: System Monitoring, Hosts/Networks, Access Rules, Translation Rules,
VPN, Monitoring
5 How do you connect to the PDM?
Answer: Through your browser by entering the PIX's inside interface IP address: https://inside_interface_ip
6What version of PIX Software is required of PDM version 1.1?
Answer: PDM Version 1.1 requires PIX version 6.0(1) at a minimum
7Which models of Cisco PIX Firewall are supported by PDM?
Answer: 501, 506, 515, 520, 525, 535
8What versions of Windows does PDM support?
Answer: Windows NT and Windows 2000

Chapter 11 357
9 What steps should you take before installing PDM?
Answer: Ensure that you have 8 MB or more of Flash memory and that PIX OS version 6.0 or later is on the PIX.
10True or false: PDM comes preinstalled on all PIX 5.3 and later software versions.
Answer: False. PDM is available only for Cisco PIX 6.0 and later.
11Where does PDM reside?
Answer: In the PIX's Flash memory
Q&A
1How many tabs does the PDM have for configuring and monitoring the Cisco PIX Firewall?
AThree
BFive
CEight
DSix
Answer: D
2 How do you connect to the PDM?
ABy accessing the PIX through Telnet and entering PDM
BBy entering http://inside_interface_ip in your browser
CBy entering https://inside_interface_ip in your browser
DBy entering https://PIX_PDM
Answer: C
3What version of the PIX is required for PDM to run?
A 5.1
B 5.2
C 5.3
D 6.0
Answer: D

358 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
4Which model of the Cisco PIX Firewall does PDM support?
A 506
B 515
C 520
D 525
E 535
F All of the above
Answer: F
5Where does PDM reside?
AOn a Windows NT/2000 server
BOn a Red Hat Linux 7.0 server
COn a Solaris server
DAll of the above
EIn the PIX Flash memory
Answer: E
6What default security mechanism does PDM employ for browsers to connect to it?
A RSA
B SSL
C Biometrics
D None of the above
Answer: B
7True or false: The PDM lets conduits and access lists exist together on the PIX Firewall configuration.
Answer: False. If your PIX currently has a working configuration using either conduit commands, outbound commands, or access lists, PDM continues using your current model. If the PIX Firewall is currently using conduit commands to control traffic, PDM adds more conduit commands to your configuration as you add rules. Similarly, if the PIX Firewall is currently configured using access-list commands, PDM adds more access-list commands to your configuration as you add rules. If you have a PIX Firewall with no previous configuration, PDM adds access-list commands to the CLI by default. PDM does not support a mixed configuration with outbound commands or conduit commands and access-list commands.