Configuring CBAC

The following are the tasks that are used to configure CBAC:

  1. Set audit trails and alerts.

  2. Set global timeouts and thresholds.

  3. Define port-to-application mapping (PAM).

  4. Define inspection rules.

  5. Apply inspection rules and ACLs to interfaces.

  6. Test and verify.

Enabling Audit Trail and Alert

Turn on logging and audit trail to provide a record of network access through the firewall, including illegitimate access attempts and inbound and outbound services.

Use the ip inspect audit-trail and no ip inspect alert-off commands to enable audit trail and alert, respectively. The following example shows how you might configure logging on a router and enable the syslog server with the ip inspect audit-trail command:

Router(config)# logging on

Get CCSP Self-Study: Securing Cisco IOS Networks (SECUR) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.