O'Reilly logo

Cisco Secure Firewall Services Module (FWSM) by Arvind CCIE No. 7016 Durai, Ray CCIE No. 7050 Blair

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9 Configuring Routing Protocols

This chapter gives a snapshot of routing protocol concepts and their support on the Firewall Services Module (FWSM). It also covers configuration of each routing protocol on the FWSM with design examples.

Packet flow to and from the firewall depends on the routing of the packets from one security domain to the other. It is important to have symmetry in routing between the firewall and the Layer 3 device in each security domain. This helps in aligning and placing the firewalls at various locations on a network, such as the edge of the Internet or in a data center.

Routing in the FWSM follows the security policy before the packet is sent to the next hop address. The FWSM uses the XLATE table and the routing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required