Increasing reliance on the Internet in both work and home environments has radically increased the vulnerability of computing systems to attack from a wide variety of threats. Firewall technology continues to be the most prevalent form of protection against existing and new threats to computers and networks. A full understanding of what firewalls can do, how they can be deployed to maximum effect, and the differences among firewall types can make the difference between continued network integrity and complete network or computer failure. Firewall Fundamentals introduces readers to firewall concepts and explores various commercial and open source firewall implementations--including Cisco, Linksys, and Linux--allowing network administrators and small office/home office computer users to effectively choose and configure their devices.Access list webtypea This ACL is used for Web VPN filtering and is only supported on PIX/ ASA 7.1 and newer. You can ... Table 6-2 access-list Parameters Table 6-2 access-list Parameters (Continued) continues Table 6-2 access-list Parameters 148 Chapter 6: Cisco PIX Firewall and ASA Security Appliance ... See the command documentation for each feature that uses an ACL for more information.
|Author||:||Wesley J. Noonan, Wes Noonan, Ido Dubrawsky|
|Publisher||:||Cisco Press - 2006|