Cisco 4700M Configuration Manual page 62

Application control engine appliance security
Hide thumbs Also See for 4700M:
Table of Contents

Advertisement

ACL Configuration Examples
Figure 1-2
Outbound ACL
ACL Inbound
Permit from
10.1.1.14
209.165.201.4
Static NAT
IP Addresses for ACLs with NAT
Cisco 4700 Series Application Control Engine Appliance Security Configuration Guide
1-38
Web Server:
209.165.200.225
ACE
ACL Outbound
Permit HTTP from 209.165.201.4, 209.165.201.6,
and
209.165.201.8
Deny all others
Inside
ACL Inbound
any
to
any
Permit from
10.1.2.67
When you use NAT, the IP addresses that you specify for an ACL depend on the
interface to which the ACL is attached. You must use addresses that are valid on
a network that is connected to the interface. This guideline applies for both
inbound and outbound ACLs. The ACL direction does not determine the address
used, only the interface to which the ACL is attached determines the address that
is used.
Chapter 1
Outside
to
209.165.200.225
HR
any
to
any
209.165.201.6
Static NAT
Configuring Security Access Control Lists
Eng
ACL Inbound
Permit from
any
to
any
10.1.3.34
209.165.201.8
Static NAT
OL-16202-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

4700 series

Table of Contents