Trapti Gupta

Context-based Access Control

Context Based Access Control abbreviated as CBAC is part of the Cisco IOS and this functions as an application and stateful firewall and filtering of traffic is performed by it at the different OSI model layers. Traffic Filtering, Traffic Examine, Intrusion Prevention, and alert and audit traits are done by the CBAC.

Introduction

Context Based Access Control abbreviated as CBAC is part of the Cisco IOS and this functions as an application and stateful firewall filtering of traffic is performed by it at the network layer(IP protocols and addresses), Transport layer(UDP and sessions, ports), Session layer(conversation state) and the application layer( particular application protocols).
Access-list is abbreviated as ACL and it is a list that defines a set of 8 rules for network traffic control and network attack reduction.

Context-based access control (CBAC) is one of the firewall software features that filters the packets of TCP and UDP intelligently. It performs filtering based on the application layer protocol session information.

What CBAC (Context Based Access Control) Can Do?

Context Based Access Control provides us with the functionality of network protection on various levels with the help of the following functions:

  • Intelligent filtering is not provided by CBAC for all the protocols.
  • CBAC works for the specified protocols.
  • If the protocol is not specified by you for CBAC then how to filter the protocol is decided based on the existing access lists.
  • No temporary openings are created for the protocols whose CBAC inspection is not specified.

Traffic Filtering

Only those replies are permitted by CBAC that are in the state table. Traffic originated from the trusted network and the firewall was filtered by it. It has the potential of filtering the traffic intelligently up to layer 7.

Traffic Inspection

Tracking of Information of TCP/UDP needed for the more thorough inspection of packet payload is done by Context Based Access Control.

Alerts and Audit Trails

Information related to the established connections, source and destination IP addresses, and amount of data sent is recorded by the Context Based Access Control mechanism of the router.

Intrusion Prevention

Connection establishment speed is monitored by CBAC for the identification of the attacks such as TCP syn attacks, and DOS attacks. Based on information collected from the monitoring CBAC has the potential of connection dropping or reestablishment for responding to malicious packets.

How CBAC?

CBAC works similarly to the reflexive Access list but the only difference is that in addition the state table is also maintained by it for maintaining the sessions in the memory. When the device within the network initiates the session then in the state table a dynamic entry is put and outgoing (outbound) traffic is permitted to pass through the router(firewall based on the IoS). With the help of this dynamic entry, outbound traffic replies can be passed from the router because there is a traffic entry that is initiated within the network. CBAC mechanism of the firewall based on the IoS allows to achieve this as on the access list temporary holes are opened by it so that it allows the reply packets.

CBAC Configuration

Refer to the below image for the configuration of the CBAC

cbac configuration

The name of the three routers are given below:

  • router1 has 10.1.1.1/24 IP address on the port fa0/0
  • router2 has a 10.1.1.2/24 IP address on port fa0/0 and it has a 10.1.2.1/24 IP address on port fa0/1.
  • router3 has 10.1.2.2/24 IP address.

Firstly, all the routers get their routes using the Enhanced Interior Gateway Routing Protocol (EIGRP) and this helps the routers ping each other.

Then, we will consider router3 as an SSH server and router2 is the router on which Context Based Access Control performs its operations and it only allows traffic that is checked by router2.

First, we perform router1 EIGRP configuration:

router1(config)#router eigrp 100
router1(config-router)#network 10.1.1.0
router1(config-router)#no auto-summary

After that, we perform router2 EIGRP configuration so that router2 can reach other networks:

router2(config)#router eigrp 100
router2(config-router)#network 10.1.1.0
router2(config-router)#network 10.1.2.0
router2(config-router)#no auto-summary

Then, we perform router3 EIGRP configuration.

router3(config)#router eigrp 100
router3(config-router)#network 10.1.2.0
router3(config-router)#no auto-summary

After it, we perform router3 ssh configuration.

router3(config)#ip domain-name abc.com
router3(config)#username Saurabh password cisco
router3(config)#line vty 0 4
router3(config-line)#transport input ssh
router3(config-line)#login local 
router3(config)#crypto key generate rsa label Cisco.com modulus 1024

After all this, on router2 we are going to create an Access list. This will not accept any traffic except EIGRP as it makes it possible to reach all the routers in the networks.

router2(config)#ip Access-list extended 100
router2(config-ext-nacl)#permit eigrp any any 
router2(config-ext-nacl)#deny ip any any

Then, perform it to the interface.

router2(config)#int fa0/1
router2(config-if)#ip access-group 100 in

As we applied access-list on router1 so it cannot ssh router3 and this access list will not accept any other packet except EIGRP.
So now for the inspection of the ssh traffic, we perform the configuration of the CBAC on router2. CBAC operating on the IoS router inspected traffic is allowed only.

router2(config)#!cbac
router2(config)#ip inspect name Cisco ssh

The above-given first command !cbac is to enable the feature cbac and for inspection of ssh traffic, we use the second command.

So, now inspection is applied to the interface:

router2(config)#int fa0/1
router2(config-if)#ip inspect cisco out

As firstly the router2 inspected the packet of ssh while leaving the outbound interface i.e. fa0/1. So now router1 can ssh the router3.

Verification can be commanded by the following command:

router2#show ip inspect all

Limitations of CBAC

  • Due to the need for detailed protocols and knowledge of how operations are performed, understanding CBAC can be difficult.
  • Traffic derived from itself(the router at which we have performed configuration of CBAC) is not inspected by the mechanism of the Context Based Access Control.
  • It does not inspect encrypted packets like IPsec.

Conclusion

  • Contex Based Access Control abbreviated as CBAC is part of the Cisco IOS and this functions as an application and stateful firewall and filtering of traffic is performed by it at the different OSI model layers.
  • Traffic Filtering, Traffic Examine, Intrusion Prevention, and alert and audit traits are done by the CBAC.
  • CBAC works similarly to the reflexive Access-list but the only difference is that in addition the state table is also maintained by it.
  • In the configuration of the CBAC, initially all the routers get their routes using the Enhanced Interior Gateway Routing Protocol (EIGRP) and this helps the routers ping each other.
  • Due to the need for detailed protocols and knowledge of how operations are performed, understanding CBAC can be difficult.

Author

It is native to Northern Africa and South-Western Asia, and is cultivated in many tropical and sub-tropical regions. Many of the earlier public schools in the United States and elsewhere were one-room schools where a single teacher taught seven grades of boys and girls in the same classroom. The colors in both of our eyes bled out, knowing that sometimes the most beautiful pieces of art were created from the darkest of souls. Day 36 Saturday, May 9th Stadium Date to be confirmed. If a proven issue were to arise that parent s would not be bred again. And so, if we could talk about that work a little bit. Randy Marsh is publicly chastised for using the N-word on national television. Thousands line the banks to greet the swimmers at the finish. Choose one of applications in the list above and mark it on this page by adding your name into "Taken by" column. As we have already discussed, TN has been described by the sufferers as the worst pain mankind knows and there is no exaggeration here. We derive the separatrix between the two phases analytically. Cyber Monday is now the biggest shopping day in history businessinsider. Cunning Surge grants an extra standard action which can be used for Manyshot. Global health improvement and WHO: shaping the future. The season of suburban summer festivals kicks-off with a bang this weekend when the annual Taste of Des Plaines is held Friday evening and most of the day and night on Saturday. The trackage used by both railroads is called a "joint facility. Drawing in Adobe Photoshop involves creating vector shapes and paths. Due to his more serious personality, Izumi tends to get annoyed quickly, especially at Abe's constant bickering. Entries will be judged on design, execution and level of difficulty in more than 25 categories, with a gold, silver and bronze award presented in each category. Persisting atypical and cystic forms of Borrelia burgdorferi and local inflammation in Lyme neuroborreliosis.