
5-16
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
Chapter 5 Configuring the Firewall Mode
Transparent Mode Overview
5.
The web server responds to the request; because the session is already established, the packet
bypasses the many lookups associated with a new connection.
6.
The FWSM forwards the packet to the outside user.
An Outside User Attempts to Access an Inside Host
Figure 5-12
shows an outside user attempting to access a host on the inside network.
Figure 5-12
Outside to Inside
The following steps describe how data moves through the FWSM (see
Figure 5-12
):
1.
A user on the outside network attempts to reach an inside host.
2.
The FWSM receives the packet and adds the source MAC address to the MAC address table, if
required. Because it is a new session, it verifies if the packet is allowed according to the terms of the
security policy (access lists, filters, AAA).
For multiple context mode, the FWSM first classifies the packet according to a unique interface.
3.
The packet is denied, and the FWSM drops the packet.
4.
If the outside user is attempting to attack the inside network, the FWSM employs many technologies
to determine if a packet is valid for an already established session.
Management IP
209.165.201.6
Host
209.165.201.2
Host
209.165.201.3
Internet
92894
FWSM
Содержание 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Страница 35: ...P A R T 1 Getting Started and General Information ...
Страница 36: ......
Страница 297: ...P A R T 2 Configuring the Security Policy ...
Страница 298: ......
Страница 521: ...P A R T 3 System Administration ...
Страница 522: ......
Страница 613: ...P A R T 4 Reference ...
Страница 614: ......