
12-8
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 12 Firewall Mode Overview
Transparent Mode Overview
A DMZ User Attempts to Access an Inside Host
Figure 12-6 shows a user in the DMZ attempting to access the inside network.
Figure 12-6 DMZ to Inside
The following steps describe how data moves through the security appliance (see Figure 12-6):
1. A user on the DMZ network attempts to reach an inside host. Because the DMZ does not have to
route the traffic on the internet, the private addressing scheme does not prevent routing.
2. The security appliance receives the packet and because it is a new session, the security appliance
verifies if the packet is allowed according to the security policy (access lists, filters, AAA).
3. The packet is denied, and the security appliance drops the packet and logs the connection attempt.
Transparent Mode Overview
This section describes transparent firewall mode, and includes the following topics:
• Transparent Firewall Features, page 12-9
• Using the Transparent Firewall in Your Network, page 12-10
• Transparent Firewall Guidelines, page 12-10
• Unsupported Features in Transparent Mode, page 12-11
• How Data Moves Through the Transparent Firewall, page 12-12
Web Server
10.1.1.3
User
10.1.2.27
209.165.201.2
10.1.1.110.1.2.1
Outside
Inside DMZ
92402
Kommentare zu diesen Handbüchern