From: chris (iannaconec@optonline.net)
Date: Fri Sep 15 2006 - 04:35:06 ART
Hey everyone I am reading the catalyst Field manual - I have learned so much
but I have a few questions
What is the difference between a class A B and C file system , the
book only covers command differences
How do they differ on a functional and technical level - are they
erased the same way ? is an A bigger then a C - I dont see why the
commands should differ
I now need an equivlent book on routers - please try and pick
something off Safari - if not provide ISBN number
At 12:52 AM 9/15/2006, you wrote:
>Guys ;
> I am trying to understand the concept of Cut through proxy.
> lets say i want to authenticate traffic passing through the pix
> which is not http or telnet .
>
> the documents give two options , either i need to telnet (or
> http) first or i can enable the virtual telnet .
>
> is this something like lock and key ..where i need to telnet to
> the device first to get some dynamic entries after that ?
>
>
> say i want to authenicate any traffic other than telnet or http
> (say smtp) from inside to outside
>
> R1--------pix>>-------------R2
>
> access-list cut_through permit tcp any any eq 25
> access-list cut_through permit tcp any any eq 23
>
> aaa authentication match cut_through inside local
>
> does this mean everytime i need to access email , i have to
> telnet to an outside device first to get the authentication of SMTP?
>
>
>
>
>
>
>
>---------------------------------
>Get your email and more, right on the new Yahoo.com
>
>_______________________________________________________________________
>Subscription information may be found at:
>http://www.groupstudy.com/list/CCIELab.html
This archive was generated by hypermail 2.1.4 : Sun Oct 01 2006 - 16:55:40 ART