1/13/2024 0 Comments Cisco ip virtual reassembly![]() ![]() ![]() David Smith and Greg Schudel have an updated version in their CiscoPress book “Router Security Strategies: Securing IP Network Traffic Planes”, but it neglected to touch on NVI’s, crypto clear-text ACLs, virtual reassembly, and other esoteric details. You refer to the old IOS order-of-operation document - useful but very dated. Thanks for posting the ASA order-of-operation - it’ll come in handy. The author of this list (Craig Weinhold) said: I would like to have some sort of confirmation from Cisco that this is more or less correct, but it certainly looks credible. I hope Joe doesn’t mind but I would like to put a copy here for my own reference. “There is another table too, on by Joe Har ris. If you know of another location on the Cisco web site, please leave a comment so that I can reference it here.Ĭlick the following for a larger diagram. When I found this in my Networkers documentation I think this is pretty complete and so post it here for other to use. That is, there are others around (see below) but don’t have the Cisco name the bottom. However, this list is the only that I can find and there are several things missing but it’s its the only “official version” I’ve seen. NAT outside to inside (global to local translation).inspect (Context-based Access Control (CBAC)).crypto (check map and mark for encryption).NAT inside to outside (local to global translation).decryption – for CET (Cisco Encryption Technology) or IPSec.All I can find on the is this not-suitable-for-every-case table. I am often searching information on the order of operation of the different features on an interface and the packet traverses the IOS software. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |