In this chapter, you will learn to:
Use the Adaptive Security Algorithm
Recognize translations and connections
Understand Access Control Lists
Make use of content filtering
Understand Object Grouping
Test conduits
Apply routing configuration
In this chapter, you build on the PIX Firewall basics introduced in the last two chapters. You look at those commands and techniques that make it possible to limit and manage traffic passing through the firewall device. Some of the topics expand on features introduced earlier, such as ASA, access-lists, and routing, but now going into more details and introducing additional options.