
Contents
viii
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Access List Guidelines 13-6
Access Control Entry Order 13-6
Access Control Implicit Deny 13-7
IP Addresses Used for Access Lists When You Use NAT 13-7
Adding an Extended Access List 13-9
Adding an EtherType Access List 13-11
Adding a Standard Access List 13-13
Simplifying Access Lists with Object Grouping 13-13
How Object Grouping Works 13-13
Adding Object Groups 13-14
Adding a Protocol Object Group 13-14
Adding a Network Object Group 13-15
Adding a Service Object Group 13-15
Adding an ICMP Type Object Group 13-16
Nesting Object Groups 13-17
Using Object Groups with an Access List 13-18
Displaying Object Groups 13-19
Removing Object Groups 13-19
Adding Remarks to Access Lists 13-20
Time Range Options 13-20
Logging Access List Activity 13-20
Access List Logging Overview 13-21
Configuring Logging for an Access Control Entry 13-22
Managing Deny Flows 13-23
CHAPTER
14 Applying NAT 14-1
NAT Overview 14-1
Introduction to NAT 14-2
NAT Control 14-3
NAT Types 14-5
Dynamic NAT 14-5
PAT 14-6
Static NAT 14-7
Static PAT 14-7
Bypassing NAT when NAT Control is Enabled 14-9
Policy NAT 14-9
NAT and Same Security Level Interfaces 14-12
Order of NAT Commands Used to Match Real Addresses 14-13
Komentáře k této Příručce