Cisco Systems OL-12172-01 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Cisco Systems OL-12172-01, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Cisco Systems OL-12172-01 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Cisco Systems OL-12172-01. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Cisco Systems OL-12172-01 should contain:
- informations concerning technical data of Cisco Systems OL-12172-01
- name of the manufacturer and a year of construction of the Cisco Systems OL-12172-01 item
- rules of operation, control and maintenance of the Cisco Systems OL-12172-01 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Cisco Systems OL-12172-01 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Cisco Systems OL-12172-01, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Cisco Systems service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Cisco Systems OL-12172-01.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Cisco Systems OL-12172-01 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    CH A P T E R 15-1 Cisco Security Applia nce Command Line Configuratio n Guide OL-12172-01 15 Firewall Mode Overview This chapter describes ho w the fire wall w orks in each fire wall mode. T o set the fire wall mode, see t he “Setting T ransparent or Routed Fire wall Mode” section on page 2- 5 . Note In multiple conte xt mode, you cannot set th[...]

  • Page 2

    15-2 Cisco Security Appliance Command Line Configuration Guide OL-12172-01 Chapter 15 Firewall Mode Overview Routed Mode Over view • An Inside User V isits a W eb Server , page 15-2 • An Outside User V isits a W eb Server on the DMZ, page 15-3 • An Inside User V isits a W eb Server on the DMZ, page 15-4 • An Outside User Attempts to Access [...]

  • Page 3

    15-3 Cisco Security Applia nce Command Line Configuratio n Guide OL-12172-01 Chapter 15 Fi rewall Mode Overview Routed Mode Overview 3. The security appliance translat es the local so urce address (10. 1.2.27) to the global address 209.165.201.10, which is on the outside interface subnet. The global address could be o n any subnet, b ut routing is [...]

  • Page 4

    15-4 Cisco Security Appliance Command Line Configuration Guide OL-12172-01 Chapter 15 Firewall Mode Overview Routed Mode Over view 2. The security appliance receiv es the packet and b ecause it is a new session, the security appliance verif ies that the packet is allowed according to th e terms of the security policy (access lists, f ilters, AAA). [...]

  • Page 5

    15-5 Cisco Security Applia nce Command Line Configuratio n Guide OL-12172-01 Chapter 15 Fi rewall Mode Overview Routed Mode Overview The follo wing steps describe ho w data mo ves through the security appliance (see Figure 15-3 ): 1. A user on the inside netw ork requests a web page from the DMZ web serv er using the destination address of 10.1.1.3[...]

  • Page 6

    15-6 Cisco Security Appliance Command Line Configuration Guide OL-12172-01 Chapter 15 Firewall Mode Overview Routed Mode Over view The follo wing steps describe ho w data mo ves through the security appliance (see Figure 15-4 ): 1. A user on the outside netw ork attempts to reach an inside host (assuming the ho st has a routable IP address). If the[...]

  • Page 7

    15-7 Cisco Security Applia nce Command Line Configuratio n Guide OL-12172-01 Chapter 15 Fi rewall Mode Overview Transparent Mode Overview Transparent Mode Overview T raditionally , a fire wall is a routed hop and acts as a default gate way for hosts that connect to one of i ts screened subnets. A transparen t fire wall, on the other hand, is a Laye[...]

  • Page 8

    15-8 Cisco Security Appliance Command Line Configuration Guide OL-12172-01 Chapter 15 Firewall Mode Overview Transparen t Mode Overview Passing Traffic Not Allowed in Routed Mode In routed mode, some types of traf fic cannot pass through the security appliance e ven if you allow it in an access list. The transparent fire wall, ho wev er, can allo w[...]

  • Page 9

    15-9 Cisco Security Applia nce Command Line Configuratio n Guide OL-12172-01 Chapter 15 Fi rewall Mode Overview Transparent Mode Overview Using the Transparent Firewall in Your Network Figure 15-6 sh ows a typical transparent fire wall net work where the outside devices are on the same subnet as the inside devices. The in side router and hosts appe[...]

  • Page 10

    15-10 Cisco Security Appliance Command Line Configuration Guide OL-12172-01 Chapter 15 Firewall Mode Overview Transparen t Mode Overview In single mode, you can only use tw o data interfaces (and the dedicated man agement interface, if av ailable) e ven if your security applia nce includes more than two interfaces. • Each directly connected netwo[...]

  • Page 11

    15-11 Cisco Security Applia nce Command Line Configuratio n Guide OL-12172-01 Chapter 15 Fi rewall Mode Overview Transparent Mode Overview How Data Moves Through the Transparent Firewall Figure 15-7 sho ws a typical transparent fire wall impl ementation with an inside netw ork that contains a public web server . The security appliance has an acces [...]

  • Page 12

    15-12 Cisco Security Appliance Command Line Configuration Guide OL-12172-01 Chapter 15 Firewall Mode Overview Transparen t Mode Overview An Inside User Visits a Web Server Figure 15-8 sh ows an insi de user accessing an outside web serv er . Figur e 15-8 Inside to Outside The follo wing steps describe ho w data mo ves through the security appliance[...]

  • Page 13

    15-13 Cisco Security Applia nce Command Line Configuratio n Guide OL-12172-01 Chapter 15 Fi rewall Mode Overview Transparent Mode Overview An Inside User Visits a Web Server Using NAT Figure 15-8 sh ows an insi de user accessing an outside web serv er . Figur e 15-9 Inside to Outside with NA T The follo wing steps describe ho w data mo ves through [...]

  • Page 14

    15-14 Cisco Security Appliance Command Line Configuration Guide OL-12172-01 Chapter 15 Firewall Mode Overview Transparen t Mode Overview 7. The security appliance performs N A T by transla ting the mapped address to the real address, 10.1.2.27. An Outside User Visits a Web Server on the Inside Network Figure 15-10 sho w s an outside user accessing [...]

  • Page 15

    15-15 Cisco Security Applia nce Command Line Configuratio n Guide OL-12172-01 Chapter 15 Fi rewall Mode Overview Transparent Mode Overview If the destinat ion MA C address is not in t he security appliance table , the security applia nce attempts to disco ver the MA C address b y sending an ARP request and a ping. The f irst packet is dropped. 5. T[...]

  • Page 16

    15-16 Cisco Security Appliance Command Line Configuration Guide OL-12172-01 Chapter 15 Firewall Mode Overview Transparen t Mode Overview[...]