O'Reilly logo

Cisco Secure Firewall Services Module (FWSM) by Arvind CCIE No. 7016 Durai, Ray CCIE No. 7050 Blair

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13 Understanding Application Protocol Inspection

Application protocol inspection provides three primary functions:

• It validates control traffic flows and/or verifies for RFC compliance.

• It monitors sessions for embedded IP addressing in the data portion of the packet.

• It examines session information for secondary channels.

Validation of control traffic flows may occur with protocols, such as Extended Simple Mail Transfer Protocol (ESMTP), where you want to allow only specific commands, such as DATA, HELO, QUIT, and so on. An example of RFC compliance verification is when the inspection engine is monitoring port 80 for HTTP traffic and another protocol (that is, Telnet) is attempting to use port 80 as well. Because the Telnet traffic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required