I understand that as in any firewall the PIX 501 sits in between the DSL interface and the LAN. It is not possible to connect to a USB type ADSL modem as there is only an ethernet point on this unit. I have an ADSL router which includes its own modem and 4 port hub.
The only way I can see to physically connect with this scenario is by connecting the ADSL router from its own LAN port directly to one of the LAN ports 1 through 4 on the PIX. Connecting it to port 0 doesn't work. I assume that no protection is afforded when the router connects to the PIX via one of the port 1 to 4 as it simply acts as a hub on those ports.
My question is how is this unit designed to work? Is it only made for a cable modem which has an Ethernet connection or is there someway of getting this unit to connect to the ADSL router on port 0?
Hi, I do this all the time and it works fine. You might want to check your cable if your not getting a link light on Eth0. If your not, might try a cross over cable if your using a straight cable. Also make sure the subnet that the ADSL router's 4 port hub is on the same subnet that the PIX Eth0 is on.
yes the link light on Eth0 IS on. The subnet is the same (PIX 192.168.1.1, ADSL router 192.168.1.254) but can only get a reply from the ping when the router is on Eth1~4. I assumed it was a rule or setting made in the PDM gui interface which blocked access to Eth0. So in a telnet window with enabled privlieges I just typed write erase and then reload. Since then the PIX 501 is nothing more than a very expensive (but working) 4 port hub. No ping reponse from 192.168.1.1 at all. Is there some other way to connect I've so far been unsuccessful connecting via the console/serial port. Need to know if there's some other default IP on it that I can connect to.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :