O'Reilly logo

Network Security Principles and Practices by Saadat Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Case Study: CBAC on a Router Configured with NAT

This section covers a case study showing how CBAC is implemented in a real-world situation. This case study is used to further delineate some of the ideas explored in this chapter.

CBAC on a router configured with NAT is one of the most common CBAC setups. One of the important issues to realize in a NAT setup is that for traffic entering the router's public interface, such as coming from the Internet, the packets are first processed through the access list applied to the interface, and then denatting occurs. This is why the incoming access list is opened for the PAT pool addresses of the machines sitting on the private network behind the router. Table 9-2 outlines the general order of operation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required