15-3
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 15 Firewall Mode Overview
Routed Mode Overview
4.
The security appliance then records that a session is established and forwards the packet from the
outside interface.
5.
When www.example.com responds to the request, the packet goes through the security appliance,
and because the session is already established, the packet bypasses the many lookups associated
with a new connection. The security appliance performs NAT by translating the global destination
address to the local user address, 10.1.2.27.
6.
The security appliance forwards the packet to the inside user.
An Outside User Visits a Web Server on the DMZ
Figure 15-2
shows an outside user accessing the DMZ web server.
Figure 15-2
Outside to DMZ
The following steps describe how data moves through the security appliance (see
Figure 15-2
):
1.
A user on the outside network requests a web page from the DMZ web server using the global
destination address of 209.165.201.3, which is on the outside interface subnet.
2.
The security appliance receives the packet and because it is a new session, the security appliance
verifies that the packet is allowed according to the terms of the security policy (access lists, filters,
AAA).
For multiple context mode, the security appliance first classifies the packet according to either a
unique interface or a unique destination address associated with a context; the destination address
is associated by matching an address translation in a context. In this case, the classifier “knows” that
the DMZ web server address belongs to a certain context because of the server address translation.
Web Server
10.1.1.3
User
209.165.201.2
10.1.1.1
10.1.2.1
Dest Addr Translation
209.165.201.3
10.1.1.13
Outside
Inside
DMZ
92406
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......