
Step 4—Configuring Cisco IOS Firewall Features
Cisco 7100 Series VPN Configuration Guide
3-34
Note Refer to the “Traffic Filtering and Firewalls” part of the Security Configuration
Guide and the Security Command Reference for advanced firewall configuration
information.
This section explains how to configure an extended access list, which is a sequential
collection of permit and deny conditions that apply to an IP address, and includes the
following tasks:
1 Creating Extended Access Lists Using Access List Numbers
2 Verifying Extended Access Lists
3 Applying Access Lists to Interfaces
4 Verifying Extended Access Lists Are Applied Correctly
Note The extended access list configuration explained in this section is different from the
crypto access list configuration explained in the “Creating Crypto Access Lists” section on
page 3-21. Crypto access lists are used to define which IP traffic is or is not protected by
crypto, while an extended access list is used to determine which IP traffic to forward or
block at an interface.
The simplest connectivityto the Internet is to use a single deviceto provide the connectivity
and firewall function to the Internet. With everything being in a single device, it is easy to
address translation and termination of the VPN tunnels. Complexity arises when you need
to add extra VPN gateways to the network. This normally leads people into building a
network where the corporate network touches the Internet via a network called the DMZ,
or demilitarized zone.
Kommentare zu diesen Handbüchern