Cisco PIX 525 Especificaciones Pagina 201

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 604
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 200
12-15
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 12 Firewall Mode Overview
Transparent Mode Overview
An Outside User Attempts to Access an Inside Host
Figure 12-11 shows an outside user attempting to access a host on the inside network.
Figure 12-11 Outside to Inside
The following steps describe how data moves through the security appliance (see Figure 12-11):
1. A user on the outside network attempts to reach an inside host.
2. The security appliance receives the packet and adds the source MAC address to the MAC address
table, if required. Because it is a new session, it verifies if the packet is allowed according to the
terms of the security policy (access lists, filters, AAA).
For multiple context mode, the security appliance first classifies the packet according to a unique
interface.
3. The packet is denied, and the security appliance drops the packet.
4. If the outside user is attempting to attack the inside network, the security appliance employs many
technologies to determine if a packet is valid for an already established session.
Management IP
209.165.201.6
Host
209.165.201.2
Host
209.165.201.3
Internet
92410
Vista de pagina 200
1 2 ... 196 197 198 199 200 201 202 203 204 205 206 ... 603 604

Comentarios a estos manuales

Sin comentarios