O'Reilly logo

CCNP Security FIREWALL 642-618 Official Cert Guide by Anthony Sequeira, Dave Garneau, David Hucaby

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Controlling Access Through the ASA

This chapter covers the following topics:

Understanding How Access Control Works: This section provides a brief introduction to the information necessary to implement effective access control.

State Tables: This section describes the two state tables (connection and local host) used by the Cisco ASA to determine if connections should be allowed through the ASA without the need to consult interface access rules, and how to view their contents.

Understanding Interface Access Rules: This section describes the functionality of interface access rules, the most common access control method deployed on Cisco ASAs.

Default Access Rules: This section describes the default interface access rules present ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required