Wednesday, 9 May 2012

E-Tutorial 3 ( Context-based access control )

Context-based access control (CBAC) intelligently filters TCP and UDP packets based on application layer protocol session information and can be used for intranets, extranets and internets. CBAC can be configured to permit specified TCP and UDP traffic through a firewall only when the connection is initiated from within the network needing protection. (In other words, CBAC can inspect traffic for sessions that originate from the external network.) However, while this example discusses inspecting traffic for sessions that originate from the external network, CBAC can inspect traffic for sessions that originate from either side of the firewall. This is the basic function of a stateful inspection firewall

CBAC inspects traffic that travels through the firewall to discover and manage state information for TCP and UDP sessions. This state information is used to create temporary openings in the firewall's access lists to allow return traffic and additional data connections for permissible sessions (sessions that originated from within the protected internal network).

CBAC does the deep packet inspection and hence it is termed to be a IOS Firewall.
CBAC also provides the following benefits:
  • Denial-of-Service prevention and detection
  • Real-time alerts and audit trails
http://en.wikipedia.org/wiki/Context-based_access_control

4 comments:

  1. From your post about Context-based Access Control, I have learned more about Context-based Access Control. Context-based Access Control intelligently filters TCP and UDP packets based on application layer protocol session information and can be used for intranets, extranets and internets. CBAC can also inspect traffic for sessions that originate from the external network.

    I have also learned that CBAC inspects traffic that travels through the firewall to discover and manage state information for TCP and UDP sessions. This state information is used to create temporary openings in the firewall's access lists to allow return traffic and additional data connections for permissible sessions.

    I have also learned about the benefits that CBAC provides.

    ReplyDelete
  2. From your post i have learned about CBAC but u can add in the supported protocols like Java
    SQL*Net
    RTSP (such as RealNetworks)
    H.323 (such as NetMeeting, ProShare, CUSeeMe)
    Other multimedia
    Microsoft NetShow
    StreamWorks
    VDOLive
    TCP (single channel)
    UDP (single channel)
    RPC
    FTP
    TFTP
    UNIX R-commands (such as rlogin, rexec, and rsh)
    SMTP
    HTTP (Java blocking)

    ReplyDelete
  3. This post is very interesting and easy to understand. I have learn a lot about how CBAC intelligently filters TCP and UDP packets based on application layer protocol session information from your post. The examples u gave on the benefits of CBAC are quite less. Hence, I would suggest that maybe you can give more examples on how to CBAC can help us. You can also elaborate more on what CBAC is so that readers like myself will be able to understand more. Also, maybe you can add pictures or videos to let readers like myself have a even better and clearer knowledge on what CBAC are all about.

    ReplyDelete
  4. This post help me understand more about CBAC, about how it is used to filter TCP and UDP packets and how it inspects traffic that travel through the firewall.However, the post will be more efficient if more examples were given to show how CBAC help us in securing the network, including pictures will also help the readers to understand more on the topic mentioned.

    ReplyDelete