Using The Transparent Firewall In Your Network; Transparent Firewall Guidelines - Cisco PIX 500 Series Configuration Manual

Security appliance command line
Hide thumbs Also See for PIX 500 Series:
Table of Contents

Advertisement

Chapter 15
Firewall Mode Overview

Using the Transparent Firewall in Your Network

Figure 15-6
subnet as the inside devices. The inside router and hosts appear to be directly connected to the outside
router.
Figure 15-6

Transparent Firewall Guidelines

Follow these guidelines when planning your transparent firewall network:
OL-12172-03
shows a typical transparent firewall network where the outside devices are on the same
Transparent Firewall Network
Internet
10.1.1.1
Network A
10.1.1.3
192.168.1.2
Network B
A management IP address is required; for multiple context mode, an IP address is required for each
context.
Unlike routed mode, which requires an IP address for each interface, a transparent firewall has an
IP address assigned to the entire device. The security appliance uses this IP address as the source
address for packets originating on the security appliance, such as system messages or AAA
communications.
The management IP address must be on the same subnet as the connected network. You cannot set
the subnet to a host subnet (255.255.255.255).
You can configure an IP address for the Management 0/0 management-only interface. This IP
address can be on a separate subnet from the main management IP address.
The transparent security appliance uses an inside interface and an outside interface only. If your
platform includes a dedicated management interface, you can also configure the management
interface or subinterface for management traffic only.
Management IP
10.1.1.2
Cisco Security Appliance Command Line Configuration Guide
Transparent Mode Overview
15-9

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5500 series

Table of Contents