Usually when I install a PIX onto the edge of an existing business, I like to perform a basic vulnerability assessment of the existing infastructure. This of course involves port scanning to see what services are listening currently, then run the same scans to demonstrate how the PIX has sheilded these services and ports from the outside. I usually use little hacker sharware utilities like Hoppa Portscanner, or Ultrascan. These scanners can be downloaded at various hacker sites. Run a scan from the outside on various devices, then capture a screenshot of the results(I like Snagit). You can then insert this screenshot into Word or some other program with a before and after view. Management loves these and it helps to validate your efforts and expense.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...