O'Reilly logo

Network Security Principles and Practices by Saadat Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Context-Based Access Control

CBAC is similar to the Adaptive Security Algorithm (ASA) discussed in the preceding chapter. It too is a mechanism that allows the router to look at the packets flowing through it and, based on the connections that have been established through the router, decide which traffic to allow through and which to stop. Three pieces of the puzzle come together to create the CBAC technology as we know it in the Cisco IOS Software today:

  • Dynamic modification of the extended access lists by CBAC to allow passage to the appropriate response protocols/ports for applications initiated from the inside

  • Inspection of the application level and transport level protocols

  • Control of the number and length of sessions based on the information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required