Contents
xii
Cisco ASA 5500 Series Configuration Guide using ASDM
Firewall Mode Examples 10-16
How Data Moves Through the ASA in Routed Firewall Mode 10-16
An Inside User Visits a Web Server 10-17
An Outside User Visits a Web Server on the DMZ 10-18
An Inside User Visits a Web Server on the DMZ 10-19
An Outside User Attempts to Access an Inside Host 10-20
A DMZ User Attempts to Access an Inside Host 10-21
How Data Moves Through the Transparent Firewall 10-22
An Inside User Visits a Web Server 10-23
An Inside User Visits a Web Server Using NAT 10-24
An Outside User Visits a Web Server on the Inside Network 10-25
An Outside User Attempts to Access an Inside Host 10-26
CHAPTER
11 Configuring Multiple Context Mode 11-1
Information About Security Contexts 11-1
Common Uses for Security Contexts 11-2
Context Configuration Files 11-2
Context Configurations 11-2
System Configuration 11-2
Admin Context Configuration 11-2
How the ASA Classifies Packets 11-3
Valid Classifier Criteria 11-3
Classification Examples 11-4
Cascading Security Contexts 11-6
Management Access to Security Contexts 11-7
System Administrator Access 11-7
Context Administrator Access 11-8
Information About Resource Management 11-8
Resource Limits 11-8
Default Class 11-9
ClassMemb ers 11-10
Information About MAC Addresses 11-11
Default MAC Address 11-11
Interaction with Manual MAC Addresses 11-11
Failover MAC Addresses 11-12
MAC Address Format 11-12
Licensing Requirements for Multiple Context Mode 11-12
Guidelines and Limitations 11-13
Default Settings 11-14