Context-based Access Control
Context-based access control (CBAC) intelligently filters TCP and UDP packets based on application layer
protocol session information and can be used for intranets, extranets
and internets. CBAC can be configured to permit specified TCP and UDP
traffic through a firewall
only when the connection is initiated from within the network needing
protection. (In other words, CBAC can inspect traffic for sessions that
originate from the external network.) However, while this example
discusses inspecting traffic for sessions that originate from the
external network, CBAC can inspect traffic for sessions that originate
from either side of the firewall. This is the basic function of a stateful inspection firewall.
CBAC can also be used with Network Address Translation (NAT), but the
configuration in this document deals primarily with pure inspection. If you
perform NAT, your access lists need to reflect the global addresses, not the
real addresses.
Without CBAC, traffic filtering is limited to access list implementations that examine packets at the network layer, or at most, the transport layer. However, CBAC examines not only network layer and transport layer information but also examines the application-layer protocol information (such as FTP
connection information) to learn about the state of the TCP or UDP
session. This allows support of protocols that involve multiple channels
created as a result of negotiations in the FTP control channel. Most of
the multimedia protocols as well as some other protocols (such as FTP,
RPC, and SQL*Net) involve multiple control channels.
References : http://en.wikipedia.org/wiki/Context-based_access_control
This post is very well written as it has allowed me to better understand the concept of Context-based access control through simple yet effective explanations.
ReplyDeletepublic key infrastructure