EasyManua.ls Logo

Allen-Bradley Stratix 5950 - Page 93

Allen-Bradley Stratix 5950
130 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Rockwell Automation Publication 1783-UM010C-EN-P - June 2019 93
Firewall Modes Chapter 8
undesired traffic and other actions that are applied by policy, the traffic is
returned to the firewall for further processing.
In inline transparent mode, traffic goes through the firewall checks before
being forwarded to the FirePOWER module. The module blocks traffic that is
not allowed for a certain application. All other traffic is forwarded through the
firewall.
Figure 23
shows the traffic flow when using the IFW in inline transparent
mode.
Figure 23 - IFW Traffic Flow for Inline Transparent Mode
As shown in the figure, traffic flows through the IFW as follows:
1. Traffic enters the IFW.
2. Firewall policies are applied.
3. Traffic is sent to the FirePOWER module.
4. The FirePOWER module applies its security policy to the traffic, and
takes appropriate actions.
5. Valid traffic is sent back to the firewall; the FirePOWER module could
block some traffic according to its security policy.
6. Traffic exits the IFW.

Table of Contents