TCP Established ACL - Advanced ACLs Part 2

Описание к видео TCP Established ACL - Advanced ACLs Part 2

A beginner's tutorial on advanced ACLs and creating an ACL that can detect a previously established TCP session and then permit traffic through a firewall. In part 2, I demonstrate how a hacker could create packets with masquerading source ports in order to bypass the ACL. To defend against this I use the established keyword at the end of the ACL to add the tcp-established session filter to the access list statement and demonstrate how traffic generated from outside the network is not allowed through.

The demonstration is done with Packet Tracer for a Cisco CCNA Security class.

Subscribe and visit me at http://danscourses.com

Комментарии

Информация по комментариям в разработке