15-4
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 15 Firewall Mode Overview
Routed Mode Overview
3.
The security appliance translates the destination address to the local address 10.1.1.3.
4.
The security appliance then adds a session entry to the fast path and forwards the packet from the
DMZ interface.
5.
When the DMZ web server responds to the request, the packet goes through the security appliance
and because the session is already established, the packet bypasses the many lookups associated
with a new connection. The security appliance performs NAT by translating the local source address
to 209.165.201.3.
6.
The security appliance forwards the packet to the outside user.
An Inside User Visits a Web Server on the DMZ
Figure 15-3
shows an inside user accessing the DMZ web server.
Figure 15-3
Inside to DMZ
The following steps describe how data moves through the security appliance (see
Figure 15-3
):
1.
A user on the inside network requests a web page from the DMZ web server using the destination
address of 10.1.1.3.
2.
The security appliance receives the packet and because it is a new session, the security appliance
verifies that the packet is allowed according to the terms of the security policy (access lists, filters,
AAA).
Web Server
10.1.1.3
User
10.1.2.27
209.165.201.2
10.1.1.1
10.1.2.1
Inside
DMZ
Outside
92403
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......