Learn how to connect and operate a Cisco PIX firewall.
- [Instructor] Cisco provides a range of popular home…and business grade firewalls…built using a proprietary Cisco Operating System,…known as IOS.…This provides a much more powerful firewalling solution…to the built-in Windows and Linux firewall's.…So we'll take a first look…at how to access and configure them.…I'm using a Cisco Pix firewall,…which despite being somewhat long in the tooth,…is still a useful device for becoming familiar…with IOS configuration,…and a low cost way of creating secure enclaves…in a home network.…
It has a serial console port, a one-port,…and an integrated four-port ethernet switch.…I'll be connecting this to my local network switch…in order to establish a secure subnet.…I've connected to the Pix using a USB to serial adapter…into the RS232 console port,…and an ethernet cable from my local network switch…to the Pix One-port.…I'll check the serial configuration…using Device Manager.…When I open the Ports entry,…I can see the ATIN adapter on COM3.…
I'll now connect using the PuTTY utility…
Released
2/15/2017Note: Learning about ethical hacking for perimeter defenses is part of the Evading IDS, Firewalls, and Honeypots competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Understanding firewalls
- Applying the basics of the Windows Firewall
- Using advanced features in the Windows Firewall
- Reviewing firewall logs
- Understanding Linux iptables
- Setting up an iptables firewall
- Managing rules with Firewall Builder
- Setting up a Cisco PIX firewall
- Creating a secure enclave
- Installing GNS3
- Understanding web application firewalls
- Protecting API services with the WSO2 gateway
- Running the Cowrie honeypot
- Detecting intrusions with Security Onion
Share this video
Embed this video
Video: Setting up a Cisco PIX firewall