
CHAPTER
15-1
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
15
Permitting or Denying Network Access
This chapter describes how to control network access through the security appliance using access lists.
To create an extended access lists or an EtherType access list, see Chapter 13, “Identifying Traffic with
Access Lists.”
Note You use ACLs to control network access in both routed and transparent firewall modes. In transparent
mode, you can use both extended ACLs (for Layer 3 traffic) and EtherType ACLs (for Layer 2 traffic).
This chapter includes the following sections:
• Inbound and Outbound Access List Overview, page 15-1
• Applying an Access List to an Interface, page 15-4
Inbound and Outbound Access List Overview
Traffic flowing across an interface in the security appliance can be controlled in two ways. Traffic that
enters the security appliance can be controlled by attaching an inbound access list to the source interface.
Traffic that exits the security appliance can be controlled by attaching an outbound access list to the
destination interface. To allow any traffic to enter the security appliance, you must attach an inbound
access list to an interface; otherwise, the security appliance automatically drops all traffic that enters that
interface. By default, traffic can exit the security appliance on any interface unless you restrict it using
an outbound access list, which adds restrictions to those already configured in the inbound access list.
Note “Inbound” and “outbound” refer to the application of an access list on an interface, either to traffic
entering the security appliance on an interface or traffic exiting the security appliance on an interface.
These terms do not refer to the movement of traffic from a lower security interface to a higher security
interface, commonly known as inbound, or from a higher to lower interface, commonly known as
outbound.
Kommentare zu diesen Handbüchern