This chapter describes how to use and configure application inspection on the Firewall Services Module (FWSM) with modular policy. The FWSM mechanisms used for stateful application inspection enforce a secure use of services offered in the network.
This chapter covers the following topics:
• Components of modular policy
• Configuration of modular policy
• Understanding application engines
Modular policy is a three-step process: classification, policy map, and service policy.
In the first step, classification, the traffic is assessed and is divided into classes as per user configuration.
In the second step, policy map defines actions on the traffic defined in these classes. The traffic flow is based on the interface. ...