Thursday 10 May 2012

Context-based Access Control

Context-based Access Control(CBAC) filters TCP and UDP packets based on application protocol session information, and actively inspects the activity happening behind the firewall. This provides a more sophisticated way of providing perimeter security. CBAC examines not only the network layer and transport layer but application layer information that is stored in the state table too, this allows them to learn about the state of TCP and UDP sessions. Context-based Access Control(CBAC) filters TCP and UDP packets based on application protocol session information, and actively inspects the activity happening behind the firewall. CBAC watches the outbound traffic determining which packet to be allowed in, making decisions based on how the application behaves instead of only the address and port number the application uses. CBCA also have the ability to open any more inbound channels required for the returning data that were being questioned by the outgoing data for any application.



Benefits of CBAC
- Prevention and detection of CBAC

- Real time alerts and audit trails
CBAC inspection rules allow a per-application protocol basis configuration of alerts and audit trail information, generating real-time alerts and auditing trails. System log is used by audit trails in order to track all network transactions. 


REFERENCE : http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a0080094e8b.shtml
http://en.wikipedia.org/wiki/Context-based_access_control
http://etutorials.org/Networking/Cisco+Certified+Security+Professional+Certification/Part+II+Securing+the+Network+Perimeter/Chapter+6+IOS+Firewall+Feature+Set+-+CBAC/Context-Based+Access+Control+CBAC/

IMAGE : http://www.google.com.sg/imgres?um=1&hl=en&sa=N&biw=1366&bih=638&tbm=isch&tbnid=tpEDewqhiCI2aM:&imgrefurl=http://cciethebeginning.wordpress.com/2008/06/13/cbac-context-based-access-control/&docid=81SLKA_Xr5XZPM&imgurl=http://cciethebeginning.files.wordpress.com/2008/06/topology.jpg&w=488&h=470&ei=vrmrT8bxJo_JrQf5ruWAAg&zoom=1&iact=hc&vpx=318&vpy=136&dur=1776&hovh=220&hovw=229&tx=149&ty=99&sig=110102777678606174354&page=1&tbnh=134&tbnw=139&start=0&ndsp=18&ved=1t:429,r:1,s:0,i:73

3 comments:

  1. Thanks for posting such an informative piece of work on Context based Access Control. I know have a deeper insight of what Context based Access Control is about. It filters the TCP and UDP packets based on application protocol session information and also actively inspects it behind a firewall. Context based Access Control also examines the network layer and transport layer of information. This allows then to learn about the state of the TCP and UDP sessions.

    ReplyDelete
  2. Jenny's post is very useful and informative. It gives a better understanding of what CBAB is and she explains them well.

    ReplyDelete
  3. Very well written blog. I got the lots of useful information by your blog. It helps me in my seminar. I discussed your blog with my friends also. They also impressed by your blog.Thanks
    digital certificates

    ReplyDelete