
Contents
vii
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Failover Configuration Examples 11-44
Cable-Based Active/Standby Failover Example 11-45
LAN-Based Active/Standby Failover Example 11-46
LAN-Based Active/Active Failover Example 11-48
PART
2 Configuring the Firewall
CHAPTER
12 Firewall Mode Overview 12-1
Routed Mode Overview 12-1
IP Routing Support 12-2
Network Address Translation 12-2
How Data Moves Through the Security Appliance in Routed Firewall Mode 12-3
An Inside User Visits a Web Server 12-4
An Outside User Visits a Web Server on the DMZ 12-5
An Inside User Visits a Web Server on the DMZ 12-6
An Outside User Attempts to Access an Inside Host 12-7
A DMZ User Attempts to Access an Inside Host 12-8
Transparent Mode Overview 12-8
Transparent Firewall Features 12-9
Using the Transparent Firewall in Your Network 12-10
Transparent Firewall Guidelines 12-10
Unsupported Features in Transparent Mode 12-11
How Data Moves Through the Transparent Firewall 12-12
An Inside User Visits a Web Server 12-13
An Outside User Visits a Web Server on the Inside Network 12-14
An Outside User Attempts to Access an Inside Host 12-15
CHAPTER
13 Identifying Traffic with Access Lists 13-1
Access List Overview 13-1
Access List Types and Uses 13-2
Access List Type Overview 13-2
Controlling Network Access for IP Traffic (Extended) 13-2
Identifying Traffic for AAA Rules (Extended) 13-3
Controlling Network Access for IP Traffic for a Given User (Extended) 13-4
Identifying Addresses for Policy NAT and NAT Exemption (Extended) 13-4
VPN Access (Extended) 13-5
Identify Traffic in a Class Map for Modular Policy Framework 13-5
Controlling Network Access for Non-IP Traffic (EtherType) 13-6
Redistributing OSPF Routes (Standard) 13-6
Komentarze do niniejszej Instrukcji