From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Create a secure enclave

Create a secure enclave

From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Start my 1-month free trial

Create a secure enclave

- [Instructor] Okay, we are back at the PIX prompt, we can now log in and look at some operational commands. One of the operational commands is ping, like the windows and limits command. To use it, we can specify an external address, using the outside interface. However, we don't have an outside connection and we get no response recieved. Let's set the PIX up by configuring a secure enclave on our local network. As shown in the slide we'll be on a 192.168.1.0/24, local network. And we'll create a secure enclave beyond the PIX security device, with addresses of 10 dot knot dot knot dot knot slash 24. I've connected a couple of systems to the local network so that we can test connectivity. I'll set the IP addresses for the two ethernet ports and set them to automatic mode to bring them up and operational. I'll assign a static address of 192.168.1.254 to the PIX. And bring up the interface. When configuring an IOS device, you might need to use the no version of the command to remove any…

Contents