CBAC has its pros and cons. You can use CBAC to enhance security for TCP and UDP applications that use well-known ports and for mitigation of some DOS attacks. Typical examples are WWW, FTP, SMTP, TFTP, SNMP, and Telnet. Bottom line: CBAC works well in all kinds of network environments. |