Cisco PIX 525 Especificaciones Pagina 34

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 604
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 33
1-2
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 1 Introduction to the Security Appliance
Firewall Functional Overview
This section includes the following topics:
Security Policy Overview, page 1-2
Firewall Mode Overview, page 1-3
Stateful Inspection Overview, page 1-4
Security Policy Overview
A security policy determines which traffic is allowed to pass through the firewall to access another
network. By default, the security appliance allows traffic to flow freely from an inside network (higher
security level) to an outside network (lower security level). You can apply actions to traffic to customize
the security policy. This section includes the following topics:
Permitting or Denying Traffic with Access Lists, page 1-2
Applying NAT, page 1-2
Using AAA for Through Traffic, page 1-2
Applying HTTP, HTTPS, or FTP Filtering, page 1-3
Applying Application Inspection, page 1-3
Applying QoS Policies, page 1-3
Applying Connection Limits and TCP Normalization, page 1-3
Permitting or Denying Traffic with Access Lists
You can apply an access list to limit traffic from inside to outside, or allow traffic from outside to inside.
For transparent firewall mode, you can also apply an EtherType access list to allow non-IP traffic.
Applying NAT
Some of the benefits of NAT include the following:
You can use private addresses on your inside networks. Private addresses are not routable on the
Internet.
NAT hides the local addresses from other networks, so attackers cannot learn the real address of a
host.
NAT can resolve IP routing problems by supporting overlapping IP addresses.
Using AAA for Through Traffic
You can require authentication and/or authorization for certain types of traffic, for example, for HTTP.
The security appliance also sends accounting information to a RADIUS or TACACS+ server.
Vista de pagina 33
1 2 ... 29 30 31 32 33 34 35 36 37 38 39 ... 603 604

Comentarios a estos manuales

Sin comentarios