15-11
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 15 Firewall Mode Overview
Transparent Mode Overview
How Data Moves Through the Transparent Firewall
Figure 15-7
shows a typical transparent firewall implementation with an inside network that contains a
public web server. The security appliance has an access list so that the inside users can access Internet
resources. Another access list lets the outside users access only the web server on the inside network.
Figure 15-7
Typical Transparent Firewall Data Path
This section describes how data moves through the security appliance, and includes the following topics:
•
An Inside User Visits a Web Server, page 15-12
•
An Inside User Visits a Web Server Using NAT, page 15-13
•
An Outside User Visits a Web Server on the Inside Network, page 15-14
•
An Outside User Attempts to Access an Inside Host, page 15-15
www.example.com
209.165.201.2
Management IP
209.165.201.6
209.165.200.230
Web Server
209.165.200.225
Host
209.165.201.3
Internet
92412
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......