xviii
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide
OL-6392-01
About This Guide
Related Documentation
Related Documentation
For more information, refer to the following documentation set for the FWSM:
• Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command
Reference
• Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module System
Messages Guide
• Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Installation
Note
• Release Notes for the Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services
Module
Document Organization
This guide includes the following chapters and appendixes:
• “Quick Start Steps” provides pointers to the minimum configuration required for routed or
transparent mode.
• Chapter 1, “Introduction to the Firewall Services Module,” describes the system requirements and
features.
• Chapter 2, “Configuring the Switch for the Firewall Services Module,” tells how to configure the
switch for use with the FWSM.
• Chapter 3, “Connecting to the Firewall Services Module and Managing the Configuration,” tells
how to access the FWSM command line interface (CLI) and manage the configuration.
• Chapter 4, “Configuring the Firewall Mode,” tells how to set the firewall mode.
• Chapter 5, “Managing Security Contexts,” tells how to configure multiple security contexts.
• Chapter 6, “Configuring Basic Settings,” tells how to configure basic settings that are either
essential or useful to the operation of your FWSM.
• Chapter 7, “Configuring Bridging Parameters and ARP Inspection,” tells how to customize the
operation of the transparent firewall.
• Chapter 8, “Configuring IP Addresses, Routing, and DHCP,” tells how to configure IP addresses,
static routes, dynamic routing, and DHCP.
• Chapter 9, “Configuring Network Address Translation,” tells how to configure Network Address
Translation (NAT).
• Chapter 10, “Controlling Network Access with Access Control Lists,” tells how to control network
access through the FWSM using access control lists (ACLs).
• Chapter 11, “Allowing Remote Management,” tells how to allow remote management access to the
FWSM.
• Chapter 12, “Configuring AAA,” tells how to configure AAA, which includes command
authorization, CLI access authentication, and AAA for traffic through the FWSM.
• Chapter 13, “Configuring Application Protocol Inspection,” tells how to configure inspection
engines.
• Chapter 14, “Filtering HTTP, HTTPS, or FTP Requests Using an External Server,” tells how to
configure filtering.