
xxiii
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
About This Guide
Document Objectives
Part 2: Configuring the Firewall
Chapter 12, “Firewall Mode
Overview”
Describes in detail the two operation modes of the security appliance, routed and
transparent mode, and how data is handled differently with each mode.
Chapter 13, “Identifying Traffic
with Access Lists”
Describes how to identify traffic with access lists.
Chapter 14, “Applying NAT” Describes how address translation is performed.
Chapter 15, “Permitting or
Denying Network Access”
Describes how to control network access through the security appliance using access lists.
Chapter 16, “Applying AAA for
Network Access”
Describes how to enable AAA for network access.
Chapter 17, “Applying Filtering
Services”
Describes ways to filter web traffic to reduce security risks or prevent inappropriate use.
Chapter 18, “Using Modular
Policy Framework”
Describes how to use the Modular Policy Framework to create security policies for TCP,
general connection settings, inspection, and QoS.
Chapter 19, “Intercepting and
Responding to Network Attacks”
Describes how to configure protection features to intercept and respond to network attacks.
Chapter 20, “Applying QoS
Policies”
Describes how to configure the network to provide better service to selected network
traffic over various technologies, including Frame Relay, Asynchronous Transfer Mode
(ATM), Ethernet and 802.1 networks, SONET, and IP routed networks.
Chapter 21, “Applying
Application Layer Protocol
Inspection”
Describes how to use and configure application inspection.
Chapter 22, “Configuring
ARP Inspection and Bridging
Parameters”
Describes how to enable ARP inspection and how to customize bridging operations.
Part 3: Configuring VPN
Chapter 23, “Configuring IPSec
and ISAKMP”
Describes how to configure ISAKMP and IPSec tunneling to build and manage VPN
“tunnels,” or secure connections between remote users and a private corporate network.
Chapter 24, “Setting General
VPN Parameters”
Describes miscellaneous VPN configuration procedures.
Chapter 25, “Configuring
Tunnel Groups, Group Policies,
and Users”
Describes how to configure VPN tunnel groups, group policies, and users.
Chapter 26, “Configuring IP
Addresses for VPNs”
Describes how to configure IP addresses in your private network addressing scheme, which
let the client function as a tunnel endpoint.
Chapter 27, “Configuring
Remote Access VPNs”
Describes how to configure a remote access VPN connection.
Chapter 28, “Configuring
LAN-to-LAN VPNs”
Describes how to build a LAN-to-LAN VPN connection.
Table 1 Document Organization (continued)
Chapter/Appendix Definition
Comentarios a estos manuales