Chapter 8. Controlling Access Through the ASA

This chapter covers the following topics:

Understanding How Access Control Works: This section provides a brief introduction to the information necessary to implement effective access control.

State Tables: This section describes the two state tables (connection and local host) used by the Cisco ASA to determine if connections should be allowed through the ASA without the need to consult interface access rules, and how to view their contents.

Understanding Interface Access Rules: This section describes the functionality of interface access rules, the most common access control method deployed on Cisco ASAs.

Default Access Rules: This section describes the default interface access rules present ...

Get CCNP Security FIREWALL 642-618 Official Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.