This chapter covers types of access lists. There are three main types of access lists in FWSM: standard, extended, and EtherType. ACE is a component that defines the access list in hardware. It is important to understand ACE for resource management of access lists and rules. Object grouping helps define and structure the security policy into objects that can be reused in the access lists. This makes the security policy in the firewall easy to understand, for future integration of new policies or rules.
This page intentionally left blank
Was this article helpful?