IP Inspect

From: Guyler, Rik (rguyler@shp-dayton.org)
Date: Wed Jun 01 2005 - 15:56:19 GMT-3


I'm having a little trouble following the logic for "ip inspect" statements.
As I understand it you apply these to a public interface and the inspection
tracks sessions between hosts to allow for temporary access. That said, the
part that is a bit gray for me is the ACL that the docs mention and what
direction the inspect should go. Should I create an ACL that basically
denies everything and then let the inspect handle what goes out? Should I
also be inspecting traffic coming in? I think I'm too PIX-concentric to
understand the logic here.

If anybody can explain this to me or provide a link that explains it better
than CCO that would be great

Thanks in advance,

---
Rik


This archive was generated by hypermail 2.1.4 : Wed Jul 06 2005 - 14:43:40 GMT-3