
- •Icons Used in This Book
- •Network Security
- •Vulnerabilities
- •Threats
- •Types of Attacks
- •Network Security Policy
- •AVVID and SAFE
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Firewall Technologies
- •Cisco PIX Firewall
- •Foundation Summary
- •The Cisco Secure PIX Firewall
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of the Cisco PIX Firewall
- •Cisco PIX Firewall Models and Features
- •Foundation Summary
- •System Maintenance
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Accessing the Cisco PIX Firewall
- •Installing a New Operating System
- •Upgrading the Cisco PIX OS
- •Creating a Boothelper Diskette Using a Windows PC
- •Auto Update Support
- •Password Recovery
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How the PIX Firewall Handles Traffic
- •Address Translation
- •Translation Versus Connection
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Access Modes
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •TurboACL
- •Object Grouping
- •Advanced Protocol Handling
- •Foundation Summary
- •Syslog
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •How Syslog Works
- •How Log Messages Are Organized
- •How to Read System Log Messages
- •Disabling Syslog Messages
- •Foundation Summary
- •Cisco PIX Firewall Failover
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •What Causes a Failover Event
- •What Is Required for a Failover Configuration
- •Failover Monitoring
- •Stateful Failover
- •LAN-Based Failover
- •Foundation Summary
- •Virtual Private Networks
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of VPN Technologies
- •Cisco VPN Client
- •PPPoE Support
- •Foundation Summary
- •Scenario
- •Completed PIX Configurations
- •PIX Device Manager
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •PDM Overview
- •PIX Firewall Requirements to Run PDM
- •Foundation Summary
- •Content Filtering with the Cisco PIX Firewall
- •“Do I Know This Already?” Quiz
- •Filtering Java Applets
- •Filtering ActiveX Objects
- •Filtering URLs
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Overview of AAA and the Cisco PIX Firewall
- •Cisco Secure Access Control Server (CSACS)
- •Foundation Summary
- •How to Best Use This Chapter
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Specifying Your AAA Servers
- •Troubleshooting Your AAA Setup
- •Foundation Summary
- •“Do I Know This Already?” Quiz
- •Foundation Topics
- •Multimedia Support on the Cisco PIX Firewall
- •Attack Guards
- •PIX Firewall’s Intrusion Detection Feature
- •ip verify reverse-path Command
- •Foundation Summary
- •Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
- •Chapter 1
- •Chapter 2
- •Chapter 3
- •Chapter 4
- •Chapter 5
- •Chapter 6
- •Chapter 7
- •Chapter 8
- •Chapter 9
- •Chapter 10
- •Chapter 11
- •Chapter 12
- •Chapter 13
- •Chapter 14
- •Chapter 15
- •Appendix B
- •What’s Wrong with This Picture?

Chapter 12 359
8Which of the following is a prerequisites for access rules to be created?
A Hosts or networks must be defined before access rule creation.
B Dynamic or static translation must be defined before access rule creation.
C There are no prerequisites.
D A and B
Answer: D
9What is a translation exemption rule?
AA rule that exempts addresses from being encrypted or translated
BA rule that denies access to addresses
CA rule that increases security on selected addresses
DNone of the above
Answer: A
10PDM does not run on which of the following?
A Windows 3.1
B Windows 2000
C Linux 7.0
D Windows NT 4.0
Answer: A
Chapter 12
"Do I Know This Already?" Quiz
1What two URL filtering servers does the PIX work with?
Answer: Websense and N2H2
2What command filters out Java applets from HTML pages?
Answer: filter java port local_ip mask foreign_ip mask
3Why are Java applets and ActiveX objects considered a threat?
Answer: They can be used to execute malicious tasks on the network and the local machine.

360 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
4 How does PIX filter Java applets and ActiveX objects?
Answer: Java and ActiveX filtering of HTML files is performed by selectively replacing the <APPLET> and </APPLET> and <OBJECT CLASSID> and </ OBJECT> tags with comments.
5True or false: PIX blocks HTML tags split across network packets or tags longer than the number of bytes in the MTU.
Answer: False
6What is the command to designate or identify the filtering server?
Answer: url-server
7True or false: Cisco PIX Firewall version 5.3 supports N2H2.
Answer: False
8What PIX Firewall version supports the Websense filtering server?
Answer: Cisco PIX Firewall version 5.3 or later supports Websense.
9What is the longest URL filter, in bytes, that is possible with Cisco PIX Firewall version 6.1 and older?
Answer: 1159 bytes
10What is the longest URL filtering that is supported by Cisco PIX Firewall 6.2?
Answer: 6 KB
11What is the command to filter URLs?
Answer: filter url
12If the filtering server does not respond before the web content server does, the reply from the web content server is dropped. What can you do to avoid this problem?
Answer: Use the url-block block block-buffer-limit command so that replies from web content servers are buffered and are forwarded to the requesting user if the filtering server allows the connection.
Q&A
1 How does PIX filter Java applets and ActiveX objects?
ABy commenting out the <OBJECT> </OBJECT> or <APPLET> </APPLET> tags in the HTML page.
BBy deleting the <OBJECT> </OBJECT> or <APPLET> </APPLET> tags in the HTML page.

Chapter 12 361
CIt notifies the content filtering server, which in turn disables the ActiveX objects and Java applets.
DPIX does not filter ActiveX objects or Java applets.
Answer: A
2What is the command to designate or identify the filtering server?
A filter url-server
B url-server
C filtering server
D server url Answer: B
3True or false: Cisco PIX Firewall version 4.4 supports N2H2.
Answer: False. Cisco PIX Firewall version 5.3 or later supports Websense.
4What is the longest URL filtering that is supported by Cisco PIX Firewall 6.2 with Websense Enterprise filtering software?
A12 KB
B15 KB
C4 KB
D6 KB
Answer: D
5What is the command to filter URLs?
A filter url
B url-filter
C url-server
D filter web page Answer: A
6What happens when the only filtering server is unavailable?
AIf the allow option is set, the PIX forwards HTTP traffic without filtering.
BHTTP traffic is dropped, because the filtering server is unavailable.
CHTTP requests are queued until the filtering server is available.
DPIX reverts to the onboard filtering engine to filter HTTP traffic.
Answer: A

362 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Q&A Questions
7What is the default port used by the N2H2 server to communicate with the Cisco PIX Firewall?
ATCP/UDP 1272
BTCP 5004 only
CTCP/UDP 4005
DUDP 5004 only
Answer: C
8What command identifies Websense servers on a Cisco PIX Firewall?
A websense url filter server_ip
B filter url server_ip vendor n2h2
C url-server [if_name] vendor n2h2 host local_ip
D All of the above
Answer: C
9How many URL servers can be configured on a single Cisco PIX Firewall?
A 5
B 12
C 3
D 16
Answer: D
10What command disables URL caching on the Cisco PIX Firewall?
Ano url-cacheno
Bcaching-url
Cdisable url-cache
DNone of the above
Answer: D