09-02-2009 09:42 AM - edited 03-11-2019 09:11 AM
I have been reading through the documentation on implimenting CABC. I want to confirm what I think I know. A simple example - SMTP. Email server on the inside needs to talk to external email servers and vice versa. SMTP needs two way port 25. If I implement CBAC on the border router inspecting SMTP from the inside heading out, no external email servers would be able to initiate and make contact with the internal email server as CBAC would not see a session initiated from the inside and block the attempt.
Correct?
Solved! Go to Solution.
09-02-2009 09:46 AM
Jeffrey
Yes. Basically with CBAC dynamic acl entries are made and removed for each connection. If you wanted to allow incoming connections to your mail server your acl would look something like
access-list CBAC permit tcp any host
access-list CBAC deny ip any any
Jon
09-02-2009 09:46 AM
Jeffrey
Yes. Basically with CBAC dynamic acl entries are made and removed for each connection. If you wanted to allow incoming connections to your mail server your acl would look something like
access-list CBAC permit tcp any host
access-list CBAC deny ip any any
Jon
09-02-2009 09:55 AM
Jon - Thanks for the response. I have been pouring through reflexive ACL docs and CBAC docs and this is essentially what I came up with: they appear to be only useful in the following scenario: When I want to intiate a session from the inside going out, but I dont ever want that same thing to be intiated from the outside coming back in.
Seems to me that these (RACLS and CBAC) would have very little utility.
What am I missing?
09-02-2009 10:17 AM
I think in your case, Reflexive ACL is already enough.
CBAC is more advanced because it can inspect protocol traffic and open corresponding ports for application need separated session for bulk data transfer, say FTP, VOIP etc.
In your case, the requirement is just SMTP. So I trust RACL is enough.
Feel free comment
09-02-2009 10:47 AM
Jeffrey
"Seems to me that these (RACLS and CBAC) would have very little utility.
What am i missing?"
CBAC will also do stateful inspection unlike the RACLs.
But in answer to your main point i'm not sure you are missing anything. There really is very little difference between how CBAC handles incoming connections and how a pix/ASA would do it ie. if on an ASA you want to allow SMTP back in then you still have to add a rule to an acl allowing that traffic back in which is really no different to what we did with the CBAC acl.
The key thing is that just like a firewall if you don't allow it in specifically then only return connections for traffic initiated from inside is allowed back in.
Whether or not a RACL would be enough - well CBAC does do TCP stateful checking and a RACL doesn't.
Jon
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide