Summary

CBAC has its pros and cons. You can use CBAC to enhance security for TCP and UDP applications that use well-known ports and for mitigation of some DOS attacks. Typical examples are WWW, FTP, SMTP, TFTP, SNMP, and Telnet. Bottom line: CBAC works well in all kinds of network environments.

Get SECUR Exam Cram™ 2 (Exam 642-501) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.