Like this article? We recommend
Conclusion
Initially configuring the PIX using these six commands is a simple, straightforward process. A firewall that will pass data has been created. No data will be permitted in; all data will be permitted out. In some internetworking circumstances, that is all that is required. The "appliance" is working. For many people, this can be accomplished in as little as 60 seconds.
In most circumstances, however, getting the "appliance" to work is just the beginning. To find out about the six basic commands (and more), see Chapter 4 of the book Cisco Secure PIX Firewalls.
< Back
Page 2 of 2