<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello, By encapsulation, you in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-do-transparent-firewalls-inspect-ip-traffic/m-p/2692627#M194267</link>
    <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;By encapsulation, you mean an 802.1q?&lt;/P&gt;&lt;P&gt;When a packet comes in the firewall does all the checks that it does as if it was a layer 3, it check the IPs and then revisit the MPF policy to check if something applies.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The layer 2 headers will remain intact, the firewall takes actions on what it sees on the packet, there is no need to remove headers to see what it is inside. Take for example wireshark, if you capture traffic that is not encrypted, even if it is encapsulated, you can see the information on the packet, the firewall acts the same way, see what it is in and acts on it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Jun 2015 17:44:32 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2015-06-29T17:44:32Z</dc:date>
    <item>
      <title>how do transparent firewalls inspect IP traffic?</title>
      <link>https://community.cisco.com/t5/network-security/how-do-transparent-firewalls-inspect-ip-traffic/m-p/2692626#M194266</link>
      <description>&lt;P&gt;how do transparent firewalls inspect IP traffic? Since these firewalls are a 'bump in the wire'. This means hosts sending packets destined for external networks will encapsulate it as a frame with the source mac of the host and the destination mac of the gateway (which would be the router).&lt;/P&gt;&lt;P&gt;Lets assume the host has already received an ARP reply with the MAC-Address of the gateway, and the transparent firewall has populated its CAM table and knows the destination MAC interface.&amp;nbsp; -&lt;/P&gt;&lt;P&gt;before the packet destined for a remote network comes in on the inside interface of the transparent firewall, it will be encapsulated in a frame with the destination MAC of the default gateway. In my understanding of regular forwarding, that frame will only get decapsulated when it gets to the gateway interface with the destination MAC. The gateway will then forward along the remote network destination IP traffic. My question is how does the transparent ASA inspect IP traffic? Does it decapsulate the frame on behalf of the gateway? Then inspect the IP source/dest? I appreciate any clear explanation. Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-transparent-firewalls-inspect-ip-traffic/m-p/2692626#M194266</guid>
      <dc:creator>west33637</dc:creator>
      <dc:date>2019-03-12T06:11:44Z</dc:date>
    </item>
    <item>
      <title>Hello, By encapsulation, you</title>
      <link>https://community.cisco.com/t5/network-security/how-do-transparent-firewalls-inspect-ip-traffic/m-p/2692627#M194267</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;By encapsulation, you mean an 802.1q?&lt;/P&gt;&lt;P&gt;When a packet comes in the firewall does all the checks that it does as if it was a layer 3, it check the IPs and then revisit the MPF policy to check if something applies.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The layer 2 headers will remain intact, the firewall takes actions on what it sees on the packet, there is no need to remove headers to see what it is inside. Take for example wireshark, if you capture traffic that is not encrypted, even if it is encapsulated, you can see the information on the packet, the firewall acts the same way, see what it is in and acts on it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jun 2015 17:44:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-do-transparent-firewalls-inspect-ip-traffic/m-p/2692627#M194267</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2015-06-29T17:44:32Z</dc:date>
    </item>
  </channel>
</rss>

