An Outside User Visits A Web Server On The Inside Network - Cisco PIX 500 Series Configuration Manual

Security appliance command line
Hide thumbs Also See for PIX 500 Series:
Table of Contents

Advertisement

Transparent Mode Overview
7.

An Outside User Visits a Web Server on the Inside Network

Figure 15-10
Figure 15-10
The following steps describe how data moves through the security appliance (see
1.
2.
3.
4.
Cisco Security Appliance Command Line Configuration Guide
15-14
The security appliance performs NAT by translating the mapped address to the real address,
10.1.2.27.
shows an outside user accessing the inside web server.
Outside to Inside
Host
Internet
209.165.201.2
209.165.201.1
209.165.200.230
Web Server
209.165.200.225
A user on the outside network requests a web page from the inside web server.
The security appliance receives the packet and adds the source MAC address to the MAC address
table, if required. Because it is a new session, it verifies that the packet is allowed according to the
terms of the security policy (access lists, filters, AAA).
For multiple context mode, the security appliance first classifies the packet according to a unique
interface.
The security appliance records that a session is established.
If the destination MAC address is in its table, the security appliance forwards the packet out of the
inside interface. The destination MAC address is that of the downstream router, 209.186.201.1.
Management IP
209.165.201.6
Chapter 15
Firewall Mode Overview
Figure
15-10):
OL-12172-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5500 series

Table of Contents