<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX default and RIP routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-default-and-rip-routing/m-p/132141#M622574</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the following reference about the PIX :&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a00800b6f0e.html" target="_blank"&gt;http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a00800b6f0e.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Both the inside and perimeter networks are protected with the PIX&amp;nbsp;Firewall's Adaptive Security Algorithm (ASA). The inside, perimeter, and outside interfaces can listen to RIP routing updates, and all interfaces can broadcast a RIP default route if required."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also from the same reference:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"RIP Version 2&lt;/P&gt;&lt;P&gt;Routing Information Protocol (RIP) version 2 provides MD5 authentication of encryption keys. The PIX&amp;nbsp;Firewall only listens in passive mode and/or broadcasts a default route. The PIX&amp;nbsp;Firewall supports Cisco IOS software standards, which conform to RFC 1058, RFC 1388, and RFC 2082 of RIPv2 with text and keyed MD5 authentication. The PIX&amp;nbsp;Firewall supports one key and key ID per interface. While the key has an infinite lifetime, for best security, you should change the key every two weeks or sooner."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And from the following reference : &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a00800eb71e.html" target="_blank"&gt;http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a00800eb71e.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have the most interesting part:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Overview&lt;/P&gt;&lt;P&gt;Each inside or perimeter PIX&amp;nbsp;Firewall interface is configurable for route and Routing Information Protocol (RIP) information. To determine what route information is required, consider what routers are in use in your network and are adjacent to the planned installation point of the PIX&amp;nbsp;Firewall.&lt;/P&gt;&lt;P&gt;Specifying a route tells the PIX&amp;nbsp;Firewall where to send information that is forwarded on a specific interface and destined for a particular network address. You can specify more than one route per interface, which lets you control where to send network traffic. Refer to the routecommand page in the Cisco&amp;nbsp;PIX&amp;nbsp;FirewallCommand Referencefor more information.&lt;/P&gt;&lt;P&gt;The PIX&amp;nbsp;Firewall learns where everything is on the network by "passively" listening for RIP network traffic. When the PIX&amp;nbsp;Firewall interface receives RIP traffic, the PIX&amp;nbsp;Firewall updates its routing tables. You can also configure the PIX&amp;nbsp;Firewall to broadcast an inside or perimeter interface as a "default" route. Broadcasting an interface as a default route is useful if you want all network traffic on that interface to go out through that interface. Refer to the ripcommand page in the Cisco&amp;nbsp;PIX&amp;nbsp;FirewallCommand Referencefor configuration information."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Benoit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 29 Nov 2002 02:06:20 GMT</pubDate>
    <dc:creator>bdube</dc:creator>
    <dc:date>2002-11-29T02:06:20Z</dc:date>
    <item>
      <title>PIX default and RIP routing</title>
      <link>https://community.cisco.com/t5/network-security/pix-default-and-rip-routing/m-p/132139#M622569</link>
      <description>&lt;P&gt;Is there any way that I can use my RIP learned route from my outside interface and proagate that default route out my inside interface?  The inside default command will just send a default route to my inside router even if the PIX does not have a default route.  My goal is to have the router on the inside of the PIX get a dynamic default route and then have that route go away when my router on the outside interface of the PIX goes away. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only other way I know would be to use BGP but, I would rather not go there since I do not have an AS and I do not have control of the outside routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank-you&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:24:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-default-and-rip-routing/m-p/132139#M622569</guid>
      <dc:creator>TOM EVANS</dc:creator>
      <dc:date>2020-02-21T06:24:07Z</dc:date>
    </item>
    <item>
      <title>Re: PIX default and RIP routing</title>
      <link>https://community.cisco.com/t5/network-security/pix-default-and-rip-routing/m-p/132140#M622572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PIX is not a router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately PIX does not know how to handle routing updates (and rightfully so, since this is a security risk).&lt;/P&gt;&lt;P&gt;Is the PIX protected network a stub network? If so all its hosts (including routers) will have as a default gw the inside interface IP address removing the need for dynamic routing on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not (i.e. you have multiple connections to the outside) each of them should be firewalled and you definitely need to apply for an AS and run BGP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fabio Sardone&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Nov 2002 19:36:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-default-and-rip-routing/m-p/132140#M622572</guid>
      <dc:creator>fabios</dc:creator>
      <dc:date>2002-11-27T19:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: PIX default and RIP routing</title>
      <link>https://community.cisco.com/t5/network-security/pix-default-and-rip-routing/m-p/132141#M622574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the following reference about the PIX :&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a00800b6f0e.html" target="_blank"&gt;http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a00800b6f0e.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Both the inside and perimeter networks are protected with the PIX&amp;nbsp;Firewall's Adaptive Security Algorithm (ASA). The inside, perimeter, and outside interfaces can listen to RIP routing updates, and all interfaces can broadcast a RIP default route if required."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also from the same reference:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"RIP Version 2&lt;/P&gt;&lt;P&gt;Routing Information Protocol (RIP) version 2 provides MD5 authentication of encryption keys. The PIX&amp;nbsp;Firewall only listens in passive mode and/or broadcasts a default route. The PIX&amp;nbsp;Firewall supports Cisco IOS software standards, which conform to RFC 1058, RFC 1388, and RFC 2082 of RIPv2 with text and keyed MD5 authentication. The PIX&amp;nbsp;Firewall supports one key and key ID per interface. While the key has an infinite lifetime, for best security, you should change the key every two weeks or sooner."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And from the following reference : &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a00800eb71e.html" target="_blank"&gt;http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a00800eb71e.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have the most interesting part:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Overview&lt;/P&gt;&lt;P&gt;Each inside or perimeter PIX&amp;nbsp;Firewall interface is configurable for route and Routing Information Protocol (RIP) information. To determine what route information is required, consider what routers are in use in your network and are adjacent to the planned installation point of the PIX&amp;nbsp;Firewall.&lt;/P&gt;&lt;P&gt;Specifying a route tells the PIX&amp;nbsp;Firewall where to send information that is forwarded on a specific interface and destined for a particular network address. You can specify more than one route per interface, which lets you control where to send network traffic. Refer to the routecommand page in the Cisco&amp;nbsp;PIX&amp;nbsp;FirewallCommand Referencefor more information.&lt;/P&gt;&lt;P&gt;The PIX&amp;nbsp;Firewall learns where everything is on the network by "passively" listening for RIP network traffic. When the PIX&amp;nbsp;Firewall interface receives RIP traffic, the PIX&amp;nbsp;Firewall updates its routing tables. You can also configure the PIX&amp;nbsp;Firewall to broadcast an inside or perimeter interface as a "default" route. Broadcasting an interface as a default route is useful if you want all network traffic on that interface to go out through that interface. Refer to the ripcommand page in the Cisco&amp;nbsp;PIX&amp;nbsp;FirewallCommand Referencefor configuration information."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Benoit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Nov 2002 02:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-default-and-rip-routing/m-p/132141#M622574</guid>
      <dc:creator>bdube</dc:creator>
      <dc:date>2002-11-29T02:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: PIX default and RIP routing</title>
      <link>https://community.cisco.com/t5/network-security/pix-default-and-rip-routing/m-p/132142#M622576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for yor reply but, I should be able to use a private AS # between Ethernets on the outside internet router and inside router.  I can put a static route with my serial interface on the internet router and redistribute the static into BGP and send that through the PIX (port 179), NAT on the PIX and then put a static route to my public address on the inside router.  This should at least eliminate the need for a public AS.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Nov 2002 15:37:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-default-and-rip-routing/m-p/132142#M622576</guid>
      <dc:creator>TOM EVANS</dc:creator>
      <dc:date>2002-11-29T15:37:00Z</dc:date>
    </item>
  </channel>
</rss>

