Chapter 18. System Maintenance

On completion of this chapter, you will be able to perform the following tasks:

  • Configure Telnet access to the PIX Firewall console.

  • Configure Secure Shell (SSH) access to the PIX Firewall console.

  • Configure command authorization.

  • Recover PIX Firewall passwords using general password recovery procedures.

  • Use Trivial File Transfer Protocol (TFTP) to install and upgrade the software image on the PIX Firewall.

If you work with PIX Firewalls long enough, chances are you will at some time have to recover or replace a forgotten system password. You are also likely to use other system maintenance functions such as PIX Firewall and PIX Device Manager (PDM) software images, Telnet and SSH access, Simple Network Management Protocol ...

Get CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA), Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.