cc/td/doc/product/iaabu/pix
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

PIX Firewall Manager Version 4.1 Release Notes

PIX Firewall Manager Version 4.1 Release Notes

November 1997

This document describes how to install and configure Cisco's PIX Firewall Manager.

The following topics are covered in these release notes:


Note Each PIX Firewall you manage must have previously been configured with the PIX Firewall telnet command to permit access to the PIX Firewall. Refer to "PIX Firewall Requirements" for other requirements.

Note Each PIX Firewall must be running PIX Firewall version 4.1.3 or later.

Note The Windows NT workstation on which you install PIX Firewall Manager must be running version 4.0 or later. Refer to "Management Server Requirements" for other requirements.

Introduction

Cisco's PIX Firewall Manager lets you administer one or more PIX Firewall units, view SYSLOG messages, and define customized alarms for each type of SYSLOG message. You can use the PIX Firewall Manager to view, add, and modify the configuration of each PIX Firewall unit.

PIX Firewall Manager software includes these components:

PIX Firewall Manager provides two access levels: user-level with read-only (non-modifying) access and administrator-level with read and write access.

Diskettes for installing PIX Firewall Manager are provided in the PIX Firewall accessory kit.

Information Requirements

Before installing PIX Firewall Manager, you need the following:

To view the IP address:

Step 1 Click the Start menu and choose Settings.

Step 2 Select Control Panel and double-click the Network icon.

Step 3 Click the Protocols tab and choose TCP/IP Protocols.

Step 4 Select Properties and when the Microsoft TCP/IP Properties dialog box opens, click the IP Address tab. The IP address appears on the lower part of this tab.

Step 5 If the Obtain an IP address from a DHCP server item is checked, click it to disable it. Then click Specify an IP address and enter an IP address, subnet mask, and default gateway IP address for this system.

Software Requirements

The following sections list software requirements for using PIX Firewall Manager.

PIX Firewall Requirements


Note Each PIX Firewall you manage must have been configured with the PIX Firewall telnet command to permit the Management Server to access the PIX Firewall.

All PIX Firewall units managed by PIX Firewall Manager must be running PIX Firewall version 4.1.3 or later. To check the version of the PIX Firewall software, go to the unit and enter the show version command at the console.

If you intend to manage PIX Firewall units on the outside network, each foreign unit must run Private Link and at least one firewall on the local network must also run Private Link. The local PIX Firewall must be configured to communicate with the foreign Private Link firewalls.

You must have console access to each local PIX Firewall you manage. If you are managing remote firewalls, work with the site administrator to get the PIX Firewall to communicate with PIX Firewall Manager.

To configure each PIX Firewall unit, enter these commands at the PIX Firewall console:

Step 1 enable--to enter privileged mode. When prompted, enter the privileged mode password. The default is no password and you can press the Enter key at the prompt.

Step 2 configure terminal--to enter configuration mode.

Step 3 nameif--to specify the name or security level of the outside or optional third interface on the PIX Firewall. The inside interface cannot be renamed or given a different security level. Each security level must be a unique number between 0 and 99.

Step 4 interface--to set options for the Ethernet or Token Ring network interfaces.

Step 5 ip address--to assign IP addresses and network masks to each interface.

Step 6 telnet--to let the PIX Firewall communicate with the PIX Firewall Manager:

Replace Windows_NT_IP_Address with the IP address of the Windows NT system.


Add the comment before the telnet statement to ensure that the next person configuring the firewall knows the purpose of this telnet statement.


Step 7 link--If you are managing remote PIX Firewall units, configure each for Private Link access. Refer to Chapter 2, "Configuring the PIX Firewall" in the PIX Firewall Series Configuration Guide for information on configuring Private Link, and Chapter 3, "Command Reference," to view the link command page for more information.

Step 8 write memory--save the configuration in flash memory.

All commands are described in the PIX Firewall Series Configuration Guide supplied in your PIX Firewall accessory kit.

Windows NT System Requirements

The Windows NT system on which you install the Management Server requires the following:

Management Server Requirements

The Management Server runs as a background Windows NT service (similar to a UNIX daemon). The server starts automatically when the installation completes or when a user logs in. An icon for the server does not display in the task bar.

All machines running the Management Server must be on the PIX Firewall's "inside" (most secure) network.

PIX Firewall Manager comes with a sound file, T1.AU, for the SYSLOG audio alarm.

All sound files must be in .AU format.

To use another .AU format sound file:

Step 1 Place the sound file on the Windows NT system running the Management Server in the following subdirectories of the Management Server's target directory:

Step 2 Click the Management Client's Setting tab to modify the audio filename.

You can stop the Management Server from the Windows NT Services item on the Control Panel. Access the Control Panel by choosing the Settings item from the Start menu. Double-click the Services icon and when the dialog box opens, select the "PIX Firewall Management Server" item. You can stop the service with the Stop button in the dialog box.

Management Client Requirements

All machines running the Management Client must be on the PIX Firewall's inside network.

The Management Client network browser must be Java 1.02 or 1.1 compliant.

The following browsers are supported:

The system running the browser must use Windows 95, Windows NT 4.0 Workstation, Windows NT 4.0 Server, or Solaris. On Windows 95 or Windows NT 4.0, 32 MB RAM is highly recommended.

Installing PIX Firewall Manager


Note Only users with Windows NT Administrator privileges can run the installer or uninstaller.

During installation, if a previous version of the PIX Firewall Manager is found, the installation program replaces the old version with the new.

To install PIX Firewall Manager:

Step 1 Verify network connectivity before starting. This consists of successfully performing the following:

Step 2 Exit all Windows programs.

Step 3 Log into the Windows NT system as Administrator.

Step 4 From the Windows NT system, insert the first PIX Firewall Manager diskette in the diskette drive. You can install the software:

Step 5 Once the installation program starts, you are prompted with a series of dialog boxes. You can simply click Next and the installation will proceed without interruption. Alternately, you can designate an installation directory other than the default.

Step 6 When you are prompted for a port number for the PIX Firewall Manager's built-in web server, use the default, 8080, unless that port is in use already. Any port between 1025 and 64000 can be entered as an alternative.To pick another port, view ftp://ftp.isi.edu/in-notes/iana/assignments/port-numbers to find the ports in use.

The installation program then copies its files and prompts you to insert the second diskette. Insert the diskette and the remaining files are copied.


Step 7 At the last dialog box, click Finish.

Step 8 To check whether the Management Server is running, choose Settings from the Start menu. Select Control Panel and double-click the Services icon. Look for the "PIX Firewall Management Server" service name. A server is running if its status appears as Started. If the status field is blank, you may run the server by selecting its name and then clicking Start.

Step 9 After the software setup completes, change the PIX Admins and PIX Users passwords with the Windows NT User Manager program. User Manager may also appear as User Manager for Domains in some Windows NT 4.0 or later versions.

To access User Manager, choose Programs from the Start menu, and choose Administrative Tools from the Programs folder. Then choose User Manager. When User Manager starts, you will see two users groups, PIX Admins and PIX Users. All members in the PIX Admins group have read and write access, and all members in the PIX Users group can only read, but not change the PIX Firewall configurations. User names that do not belong to one of these two groups cannot use the Management Client applet.


To change the two passwords, select either the PIX Admins or PIX Users accounts in the User Manager dialog box and choose Properties... from the File menu. Enter the new password in the Password and Confirm Password fields, and click OK to exit.


Limiting Access to the Management Client

You can specify which users can access the Management Client by creating logins on the Windows NT system in which PIX Firewall Manager is installed and giving the user either PIX Firewall Manager administrative or read-only access privileges. When the Management Client starts, users enter their login and password and, if accepted, can then run PIX Firewall Manager.


Note Before limiting access to the Management Client, change the default password to a new value as described in Step 9 in the last section "Installing PIX Firewall Manager."

To limit access to the Management Client:

Step 1 Start User Manager as described in Step 9 in the last section, "Installing PIX Firewall Manager." The User Manager dialog box appears. If you want to authorize access for users who already have logins on the Windows NT system, proceed to Step 2. To add new users to the Windows NT system, choose New User from the User menu. Specify the information for the user including the user's login name, full name, and password.


Note After adding a user to the Windows NT system, the PIX Admins and PIX Users groups in the Groups section at the bottom of the User Manager dialog box may no longer be visible. If the PIX Admins and PIX Users groups are not available, exit the User Manager program and restart it from the Start menu before proceeding to the next step.

Step 2 To give a user access to the Management Client, locate the Groups area at the bottom of the User Manager dialog box.

Step 3 From the Groups area, if you want users to be able to change PIX Firewall settings, double-click PIX Admins. If you want users to only have read access and no change privileges, double-click PIX Users. The Local Group Properties dialog box then appears.

Step 4 Click Add to add an existing user to the selected group. The Add Users and Groups dialog box appears.

Step 5 Select the name of the user you wish to add, click Add, and then click OK to complete adding this user. Control returns to the Local Group Properties dialog box where you can continue adding users. To exit back to the User Manager dialog box, click OK. Then exit User Manager by clicking OK.


Note If you assign the user to both PIX Admins and PIX Users groups, the user can only receive PIX Admins privileges.

Starting the Management Client Applet

You can view the Management Client applet with any network browser described in "Management Client Requirements."

Disabling Browser Proxies

The sections that follow describe how to disable proxies from each type of supported network browser before running the Management Client.

Windows 95, Windows NT, Solaris Netscape Navigator Version 3.x

Step 1 Choose the Network Preferences option from the Options menu.

Step 2 Click the Proxies tab, check the No Proxies option, and click OK.

Step 3 Choose the Open Location option from the File menu, enter ^L, or click Open, and enter the following:

IP_address is the system running PIX Firewall Manager Server. port is the Management Server's web server port that you defined in Step 6 of "Installing PIX Firewall Manager."


Windows 95, Windows NT, Solaris Netscape Communicator 4.0, 4.03, Netscape Navigator 4.03

Step 1 Choose the Preferences... item from the Edit menu. A dialog box appears.

Step 2 In the hierarchy display at the left, double-click the Advanced item. (In Solaris, click the arrow beside Advanced.) The hierarchy expands to display additional choices.

Step 3 Click the Proxies item from the expanded hierarchy list.

Step 4 Check the Direct connection to the Internet option and click OK.

Step 5 Choose the Open Location option from the File menu, enter ^L, or click Open, and enter the following:

IP_address is the system running PIX Firewall Manager Server. port is the Management Server's web server port that you defined in Step 6 of "Installing PIX Firewall Manager."


Windows 95 or Windows NT Internet Explorer 4.0

Step 1 Choose the Internet Options... item from the View menu.

Step 2 Click the Connections tab.

Step 3 In the Proxies Server group box, disable the Access the Internet using a proxy server option.

Step 4 Return to the main menu and enter the following:

IP_address is the system running PIX Firewall Manager Server. port is the Management Server's web server port that you defined in Step 6 of "Installing PIX Firewall Manager."


Running the Management Client

Step 1 After you have disabled browser proxies as described in "Disabling Browser Proxies" and started the Management Client, the home page appears.

Step 2 You are then prompted for a user name and password. For the user name, enter pixadmin for read-write access, or pixuser for read-only access. Enter either the default password, cisco, or the new password recommended in Step 9 in "Installing PIX Firewall Manager."

Step 3 You can use the Enter key to move between the user name and password fields (the Tab key has no effect). When you complete entering a user name and password, click OK. The PIX Firewall Manager then opens after loading the Java applet into memory.


Note When the program is loading, do not minimize it.

Step 4 To view or modify the PIX Firewall configuration, go to the Main Tree window on the left side of the window and select a PIX Firewall folder. If the Main Tree window is empty, click Add to add PIX Firewall units for management.


Note Any change to the configuration of a PIX Firewall made in the Management Client is sent immediately to the firewall and automatically saved in the firewall's configuration in RAM.

Step 5 To ensure that the firewall can reload the new configuration after reboot, save the configuration in the firewall's flash memory by clicking the Save button in the upper-left corner. To back up the configuration to a diskette, place an IBM-formatted diskette in the PIX Firewall's drive. Then in the PIX Firewall Manager's Main Tree window, go to the PIX Firewall folder's Administration folder and choose Save/Erase Config and click to Floppy.

Step 6 If you need to restart the applet, you must first close and restart the Web browser, then load the applet again. Do not click the browser's Reload button because the browser may run out of memory and crash with a page fault or by becoming non-responsive.

Navigating the Management Client

After you enter your login credentials, the Management Client screen appears. The areas of the screen you can see are as follows:

To start, double-click the PIX Firewall folder you want to access.

The folder opens to display the possible configuration options for this unit.

The grayed buttons at the top are accessible once you click a configuration option that can be changed.

Double-click the configuration option you want. The folder then opens into a series of subfolders or files for each configuration feature. The Action window displays information about each configuration feature. If you want to add information, click Add. To delete an entry, click Del. To save your configuration, click Save.

View-Only Configuration Commands

The following configuration features can be viewed on the Manager Client but must be added or changed at the PIX Firewall's console port or Telnet session:

Usage Notes

In the FIREWALL.HTML file, replace the old IP address with the current IP address, which is only visible in the protected network.

Generating SYSLOG Reports


Note The files you download must be placed in the same directory.

To generate SYSLOG reports:

Step 1 From the Web browser, download the Microsoft Excel macro, REPORT.XLS, from the Manager Server by entering the following:

IP_address is the system running Management Server and port is the Management Server's built-in web server port you defined when you installed PIX Firewall Manager.


Step 2 From the same site, download the SYSLOG database file STAT.DBF, domain name database file DNS.DBF, and the daily information database file(s). For example, Monday.dbf is Monday's log file.

Step 3 Start Microsoft Excel 97. (The PIX Firewall Manager SYSLOG reports only work with Microsoft Excel 97 or later.)

Step 4 Choose Open from the File menu and open the macro REPORT.XLS. Do not open it from the list of previously opened files on the File menu.

Step 5 If a dialog box appears asking if you want to download the macro, click Enable Macros, then continue.

Step 6 In the next dialog box, if you select daily information files, an Open File dialog box is displayed. Select a file from Monday.dbf to Sunday.dbf, then click Open.

Step 7 Make your selections in the dialog boxes that follow. At the end, a chart is generated.

Step 8 To print the chart, choose Print from the File menu.

Step 9 To generate another chart, close the macro REPORT.XLS, and then go to Step 4.

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.

CD-ROM Documentation

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more up to date than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar, select Documentation, and click Enter the feedback form. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.

hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1997 © Cisco Systems Inc.