Cisco Systems ASA 5580 Manual De Usuario

Descargar
Página de 712
C H A P T E R
 
6-1
Cisco ASA Series Firewall CLI Configuration Guide
 
6
Configuring Access Rules
This chapter describes how to control network access through the ASA using access rules and includes 
the following sections:
Note
You use access rules to control network access in both routed and transparent firewall modes. In 
transparent mode, you can use both access rules (for Layer 3 traffic) and EtherType rules (for Layer 2 
traffic).
To access the ASA interface for management access, you do not also need an access rule allowing the 
host IP address. You only need to configure management access according to the general operations 
configuration guide.
Information About Access Rules
You create an access rule by applying an extended or EtherType ACL to an interface or globally for all 
interfaces.You can use access rules in routed and transparent firewall mode to control IP traffic. An 
access rule permits or denies traffic based on the protocol, a source and destination IP address or 
network, and optionally the source and destination ports.
For transparent mode only, an EtherType rule controls network access for non-IP traffic. An EtherType 
rule permits or denies traffic based on the EtherType.
This section includes the following topics: