Chapter 19: Access Through the PIX Firewall

Chapter 19: Access Through the PIX Firewall

Overview

In this chapter, you will learn to:

  • Use the Adaptive Security Algorithm

  • Recognize translations and connections

  • Understand Access Control Lists

  • Make use of content filtering

  • Understand Object Grouping

  • Test conduits

  • Apply routing configuration

In this chapter, you build on the PIX Firewall basics introduced in the last two chapters. You look at those commands and techniques that make it possible to limit and manage traffic passing through the firewall device. Some of the topics expand on features introduced earlier, such as ASA, access-lists, and routing, but now going into more details and introducing additional options.




Part III: Virtual Private Networks (VPNs)