Outbound Access Control
Before performing advanced configuration, we recommend completing the information on Tables A-1 to A-4 and completing the instructions provided in Basic Firewall Configuration." After completing and testing the basic configuration, complete the information in Table A-6, which defines advanced configuration settings for inbound access control. Then refer to Managing Network Access and Use," for instructions about how to use this information.
To configure access control by IP address, complete the form provided in Table A-7. To control access by user, set up authentication, as defined in Table A-8.
Table A-7: Outbound Access Control
Access List Identifier Permit or Deny Network Protocol Source Address Destination Address Destination Ports 2 Interface To Bind Access List To
Destination Address Network IP and Network Mask from Table A-5. Use the keyword "any" to specify all global IP addresses.2 To specify a single port or a range of ports, you can use operands: greater than, less than, equal, not equal, and range.
Source Address:i
External Host or Network IP Address(es) and Network MaskYou can also specify a port with the source address, but this is seldom used.
Precede host addresses with the host parameter.
Use the interface name with the access-group command.
Refer to "TCP/IP Reference Information," for a list of protocol values. In addition, you can specify protocols by number.