Refer to the following sections for information about these topics:
• 7-1: Filtering Content—Covers third-party web content-filtering applications you can use to control outbound access through a firewall.
• 7-2: Defining Security Policies in a Modular Policy Framework—Explains the modular approach to configuring and enforcing security policies. Traffic can be matched with one type of policy module and acted on within another policy module. The whole hierarchy of policies is then applied to firewall interfaces and traffic inspection.
• 7-3: Application Inspection—Provides an overview of the mechanisms a Cisco firewall uses to inspect specific application traffic. Some applications embed information about their connections ...