Summary


CBAC has its pros and cons. You can use CBAC to enhance security for TCP and UDP applications that use well-known ports and for mitigation of some DOS attacks. Typical examples are WWW, FTP, SMTP, TFTP, SNMP, and Telnet. Bottom line: CBAC works well in all kinds of network environments.



CCSP SECUR Exam Cram 2
CCSP SECUR Exam Cram 2 (642-501)
ISBN: B000MU86IQ
EAN: N/A
Year: 2003
Pages: 291
Authors: Raman Sud

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net