EasyManua.ls Logo

Cisco Catalyst 6500 Series - Page 64

Cisco Catalyst 6500 Series
392 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
4-6
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide
OL-6392-01
Chapter 4 Configuring the Firewall Mode
Firewall Mode Overview
The steps below describe how data moves through the FWSM (see Figure 4-4):
1. A user on the inside network requests a web page from the DMZ website using the destination
address of 10.1.1.3.
Because the DMZ is a lower security interface, the inside user can use the untranslated local address
of the web server.
2. The FWSM receives the packet, and because it is a new session, the FWSM verifies that the packet
is allowed according to the terms of the security policy (ACLs, filters, AAA).
For multiple context mode, the FWSM first classifies the packet according to either a unique VLAN
or a unique destination address. In this case, the VLAN would be unique because the destination is
on a different interface in the same context.
3. The FWSM translates the local source address to the global address 10.1.1.15, which is on the DMZ
subnet.
4. The FWSM then records that a session is established and forwards the packet out of the DMZ
interface.
5. When the DMZ web server responds to the request, the packet goes through the fast path, which
allows the packet to bypass the many lookups associated with a new connection. The fast path
performs NAT by translating the global destination address to the local address of the user,
10.1.2.27.
6. The FWSM forwards the packet to the inside user.
An Outside User Attempts to Access an Inside Host
Figure 4-5 shows an outside user attempting to access the inside network.

Table of Contents

Other manuals for Cisco Catalyst 6500 Series

Related product manuals