2-19
PIX 515E Security Appliance Getting Started Guide
78-17645-01
Chapter 2 Scenario: DMZ Configuration
Configuring the Security Appliance for a DMZ Deployment
processes the traffic, whether the traffic is incoming or outgoing, the origin and
destination of the traffic, and the type of traffic protocol and service to be
permitted.
In this section, you create an access rule that permits incoming HTTP traffic
originating from any host or network on the Internet, if the destination of the
traffic is the web server on the DMZ network. All other traffic coming in from the
public network is denied.
To configure the access control rule, perform the following steps:
Step 1
In the ASDM window:
a.
Click the
Configuration
tool.
b.
In the Features pane, click
Security Policy
.
c.
Click the
Access Rules
tab, and then from the Add pull-down list, choose
Add Access Rule.
The Add Access Rule dialog box appears.