
6-4
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
Chapter 6 Configuring Interface Parameters
Configuring Interfaces for Transparent Firewall Mode
The following example configures parameters in multiple context mode for the context configuration.
The interface ID is a mapped name.
hostname/contextA(config)#
interface int1
hostname/contextA(config-if)#
nameif outside
hostname/contextA(config-if)#
security-level 100
hostname/contextA(config-if)#
ip address 10.1.2.1 255.255.255.0
Configuring Interfaces for Transparent Firewall Mode
This section includes the following topics:
•
Information About Interfaces in Transparent Mode, page 6-4
•
Configuring Transparent Firewall Interfaces for Through Traffic, page 6-6
•
Assigning an IP Address to a Bridge Group, page 6-6
•
Adding a Management Interface, page 6-7
Information About Interfaces in Transparent Mode
This section includes the following topics:
•
Information About Bridge Groups, page 6-4
•
Information About Device Management, page 6-4
•
Guidelines and Limitations, page 6-5
Information About Bridge Groups
A transparent firewall connects the same network on its inside and outside interfaces. Each pair of
interfaces belongs to a bridge group, to which you must assign a management IP address. You can
configure up to eight bridge groups of two interfaces each. Each bridge group connects to a separate
network. Bridge group traffic is isolated from other bridge groups; traffic is not routed to another bridge
group within the FWSM, and traffic must exit the FWSM before it is routed by an external router back
to another bridge group in the FWSM.
You might want to use more than one bridge group if you do not want the overhead of security contexts,
or want to maximize your use of security contexts. Although the bridging functions are separate for each
bridge group, many other functions are shared between all bridge groups. For example, all bridge groups
share a system log server or AAA server configuration. For complete security policy separation, use
security contexts with one bridge group in each context.
Note
The FWSM does not support traffic on secondary networks; only traffic on the same network as the
management IP address is supported.
Information About Device Management
For device management, you have two available mechanisms:
•
Any bridge group management address—Connect to the bridge group network on which your
management station is located.
Содержание 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Страница 35: ...P A R T 1 Getting Started and General Information ...
Страница 36: ......
Страница 297: ...P A R T 2 Configuring the Security Policy ...
Страница 298: ......
Страница 521: ...P A R T 3 System Administration ...
Страница 522: ......
Страница 613: ...P A R T 4 Reference ...
Страница 614: ......