From: 2nd CCIE (doubleccie@yahoo.com)
Date: Fri Sep 15 2006 - 01:52:07 ART
Guys ;
I am trying to understand the concept of Cut through proxy.
lets say i want to authenticate traffic passing through the pix which is not http or telnet .
the documents give two options , either i need to telnet (or http) first or i can enable the virtual telnet .
is this something like lock and key ..where i need to telnet to the device first to get some dynamic entries after that ?
say i want to authenicate any traffic other than telnet or http (say smtp) from inside to outside
R1--------pix>>-------------R2
access-list cut_through permit tcp any any eq 25
access-list cut_through permit tcp any any eq 23
aaa authentication match cut_through inside local
does this mean everytime i need to access email , i have to telnet to an outside device first to get the authentication of SMTP?
---------------------------------
Get your email and more, right on the new Yahoo.com
This archive was generated by hypermail 2.1.4 : Sun Oct 01 2006 - 16:55:40 ART