Inspection of Router-Generated Traffic

Inspection of Router-Generated Traffic

The Cisco IOS Firewall affection is added to abutment analysis for cartage that was originated by or destined to the CBACconfigured

device. Analysis of router-generated cartage augments CBAC functionality to audit TCP, UDP, and H.323

connections that accept the firewall as one of the affiliation endpoints. CBAC dynamically opens acting holes for TCP,

UDP, and H.323 ascendancy approach admission to and from the router, and for the abstracts and media channels adjourned over

the H.323 ascendancy channels. For example, CBAC can be configured to audit a Telnet accomplished from the CBAC-enabled router

to a accessory in the caught zone, acceptance acknowledgment cartage dynamically after defective to absolutely admittance in the admission list.

To accredit the Router-Generated Cartage analysis feature, use the router-traffic keyword in the ip audit name

command back configuring CBAC analysis rules. This advantage is accessible for H.323, TCP, and UDP protocols only.

This affection was alien in IOS Version 12.3(14)T.