Network Abode Adaptation (NAT)

Network Abode Adaptation (NAT)

NAT, additionally referred to as IP abode masquerading, performs the adaptation of an IP abode that is acclimated within

one arrangement (internal network) to a altered IP abode accepted aural addition arrangement (outside world). NAT

technology is about acclimated to adumbrate the IP addresses in an centralized arrangement (using RFC 1918 private

addressing). The masquerading abode can be apparent as a anatomy of aegis ambuscade the absolute character of the

network.

A NAT accessory performs the afterward two processes:

1. Substituting a absolute abode into a mapped address, which is routable on the destination network.

2. Undoing adaptation for abiding traffic.

Firewall Stateful analysis advance all access traversing through the Aegis Appliance by advancement a

translation table and application this table to verify the destination of an entering packet that matches the antecedent of a

previous outbound request.

Securing EIGRP

Securing EIGRP 209

EIGRP supports avenue affidavit by application MD5 affidavit for all acquisition updates. The MD5

authentication prevents the addition of crooked or apocryphal acquisition letters from crooked sources.

Note

EIGRP avenue affidavit is configured on a per-interface basis. All neighbors charge be configured with

the aforementioned affidavit approach and key for EIGRP adjacencies to be established.

EIGRP affidavit can be enabled on the concrete interface as follows:

Step 1. Enter the concrete interface agreement approach for which EIGRP affidavit needs to be

configured:

firewall(config)# interface phy_if

Step 2. Enable per-interface MD5 affidavit as follows:

firewall(config-if)# affidavit approach eigrp as-num md5

Step 3. Configure the defended key acclimated by the MD5 algorithm. The key altercation can accommodate up to 16

characters. The key-id altercation is a numeric cardinal from 0 to 255:

firewall(config-if)# affidavit key eigrp as-num key key-id key-id

Configuring EIGRP Butt Routing

Configuring EIGRP Butt Routing

The Security Appliance can be enabled as an EIGRP butt router through the afterward steps:

Step 1. Enable the EIGRP acquisition action from the all-around agreement approach as follows. The as-num is the

Autonomous System cardinal of the EIGRP acquisition process:

firewall(config)# router eigrp as-num

Step 2. Configure the interface affiliated to the administration router to participate in the EIGRP process:

firewall(config-router)# arrangement ip-addr [mask]

Step 3. Configure the Security Appliance for the butt acquisition process. Specific networks charge be explicitly

defined that charge to be advertised by the butt acquisition action to the administration router. By default,

static and affiliated networks are not automatically redistributed into the butt acquisition process.

firewall (config-router)# eigrp butt {receive-only | [connected] [redistributed] [static]

[summary]}

By default, EIGRP accost packets are beatific as multicast packets. In a nonbroadcast ambiance such as a tunnel,

EIGRP neighbors charge be manually authentic to accelerate accost packets as unicast messages. To ascertain a static

neighbor in EIGRP, use the afterward command from the router agreement mode:

firewall(config-router)# acquaintance ip-addr interface if_name

Multiple changeless neighbors can be authentic application the ahead categorical process.

Similar to EIGRP abutment in a Cisco IOS router, several added alternative ambit can be configured on Security

Appliance, such as the distribute-list, passive-interface and default-information commands.

Again

Again coming soon...

Enhanced Interior Gateway Acquisition Agreement (EIGRP)

Enhanced Interior Gateway Acquisition Agreement (EIGRP) 206

The Security Appliance OS Software Version 8.0 debuts the abutment of the Enhanced Interior Gateway Routing

Protocol (EIGRP). EIGRP is a Cisco proprietary acquisition agreement and is accessible on Cisco accessories only. EIGRP on

Security Appliance is accurate in distinct approach only; it is not accurate in multicontext mode.

Note

Firewall OS supports alone one EIGRP acquisition action on the Security Appliance.

The Security Appliance can be configured as an EIGRP butt router, which helps enhance the achievement by

decreasing anamnesis and processing requirements on the Security Appliance. A firewall configured as an EIGRP

stub does not crave advancement a complete EIGRP acquisition table, because it assiduously all nonlocal cartage to a

distribution router. The administration router sends a absence avenue to the butt router/firewall. In some occasions,

only specific routes are advertised from the butt router to the administration router. When the Security Appliance

is configured as a butt router, it sends a associate advice packet to all adjoining routers to address its status

as a butt router. Neighbors accepting this packet will not concern the butt for routes. The butt depends on the

distribution router to accelerate the able updates to all peers.