O'Reilly logo

Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition by David Hucaby - CCIE No. 4594

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Inspecting Traffic

Refer to the following sections for information about these topics:

7-1: Filtering Content—Covers third-party web content-filtering applications you can use to control outbound access through a firewall.

7-2: Defining Security Policies in a Modular Policy Framework—Explains the modular approach to configuring and enforcing security policies. Traffic can be matched with one type of policy module and acted on within another policy module. The whole hierarchy of policies is then applied to firewall interfaces and traffic inspection.

7-3: Application Inspection—Provides an overview of the mechanisms a Cisco firewall uses to inspect specific application traffic. Some applications embed information about their connections ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required