6.2. Installing PIX

Before you actually plug everything in and boot up the firewall, you need to plan where it will be implemented in your network. You should also, at this point, have a good idea of what types of traffic you will allow through the firewall—in both directions. And, yes, we can get back up on our soap box to remind you of the first two chapters of this book and tell you that all these things should have been decided as part of your security policy, security plan, and implementation guide.

Typically, a manufacturer places last-minute additions and changes to a system in a file referred to as release notes. For example, the release notes for the PIX Firewall operating system version 6.1 specify that the DHCP capabilities can be ...

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.