Inspection of Router-Generated Traffic
The Cisco IOS Firewall affection is added to abutment analysis for cartage that was originated by or destined to the CBACconfigured
device. Analysis of router-generated cartage augments CBAC functionality to audit TCP, UDP, and H.323
connections that accept the firewall as one of the affiliation endpoints. CBAC dynamically opens acting holes for TCP,
UDP, and H.323 ascendancy approach admission to and from the router, and for the abstracts and media channels adjourned over
the H.323 ascendancy channels. For example, CBAC can be configured to audit a Telnet accomplished from the CBAC-enabled router
to a accessory in the caught zone, acceptance acknowledgment cartage dynamically after defective to absolutely admittance in the admission list.
To accredit the Router-Generated Cartage analysis feature, use the router-traffic keyword in the ip audit name
command back configuring CBAC analysis rules. This advantage is accessible for H.323, TCP, and UDP protocols only.
This affection was alien in IOS Version 12.3(14)T.