Chapter 7. Inspecting Traffic
Refer to the following sections for information about these topics:
• 7-1: Filtering Content—Covers third-party web content-filtering applications you can use to control outbound access through a firewall.
• 7-2: Defining Security Policies in a Modular Policy Framework—Explains the modular approach to configuring and enforcing security policies. Traffic can be matched with one type of policy module and acted on within another policy module. The whole hierarchy of policies is then applied to firewall interfaces and traffic inspection.
• 7-3: Application Inspection—Provides an overview of the mechanisms a Cisco firewall uses to inspect specific application traffic. Some applications embed information about their connections ...
Get Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.