May 2001
Intermediate to advanced
528 pages
12h 59m
English
This section will discuss the configuration of CBAC.
Several steps are required to make CBAC effectively secure the corporate network:
Step 1. |
Choose an interface.
|
Step 2. |
Configure IP access lists on the interface.
|
Step 3. |
Configure global timeouts and thresholds.
|
Step 4. |
Define inspection rules and apply the inspection rule to the interface.
|
Step 5. |
Configure logging and audit trail.
|
Each of these will be discussed in turn.
The first step of configuring CBAC poses the administrator with a dilemma: Should CBAC be configured on the inside or outside interface? Should a demilitarized zone (DMZ) be created? No matter what configuration is ultimately chosen, one direction should always be configured first. ...
Read now
Unlock full access