Cut through proxy

From: 2nd CCIE (doubleccie@yahoo.com)
Date: Fri Sep 15 2006 - 01:52:07 ART


Guys ;
  I am trying to understand the concept of Cut through proxy.
  lets say i want to authenticate traffic passing through the pix which is not http or telnet .
   
  the documents give two options , either i need to telnet (or http) first or i can enable the virtual telnet .
   
  is this something like lock and key ..where i need to telnet to the device first to get some dynamic entries after that ?
   
   
  say i want to authenicate any traffic other than telnet or http (say smtp) from inside to outside
   
  R1--------pix>>-------------R2
   
  access-list cut_through permit tcp any any eq 25
  access-list cut_through permit tcp any any eq 23
   
  aaa authentication match cut_through inside local
   
  does this mean everytime i need to access email , i have to telnet to an outside device first to get the authentication of SMTP?
   
   
   
   
   

                 
---------------------------------
Get your email and more, right on the new Yahoo.com



This archive was generated by hypermail 2.1.4 : Sun Oct 01 2006 - 16:55:40 ART