Configuring CBAC
This section will discuss the configuration of CBAC.
Several steps are required to make CBAC effectively secure the corporate network:
Step 1. |
Choose an interface.
|
Step 2. |
Configure IP access lists on the interface.
|
Step 3. |
Configure global timeouts and thresholds.
|
Step 4. |
Define inspection rules and apply the inspection rule to the interface.
|
Step 5. |
Configure logging and audit trail.
|
Each of these will be discussed in turn.
Choose an Interface
The first step of configuring CBAC poses the administrator with a dilemma: Should CBAC be configured on the inside or outside interface? Should a demilitarized zone (DMZ) be created? No matter what configuration is ultimately chosen, one direction should always be configured first. ...
Get Cisco® Secure Internet Security Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.