|
Author |
|
BosonMichael
Platinum
Certification Guru
Joined: 30 August 2005
Location: United States
Posts: 6046
|
Posted: 15 July 2007 at 7:30pm | IP Logged |
|
|
aljph wrote:
TMichael, that is cool. what WAS the point, anyways? |
|
|
The point was, you said "if Cisco implemented... a stateful firewall into their enterprise routers":
Quote:
I also wonder if the cisco implemented Ciscripto or C-Web or even a stateful firewall into their enterprise routers if the smE's could make the questions hard on the CCNA? |
|
|
And my point was that Cisco *has* implemented a stateful firewall into most of their *basic* model routers. It doesn't matter whether those questions are on the CCNA or not... a firewall exists on most current Cisco router models... there's no "if" to it.
__________________
BosonMichael
MCSE+I, MCSE: Security, MCSE: Messaging, MCDST, MCDBA, MCTS, OCP, CCNP, CCDP, CNE, SCSA, Security+, Linux+, Server+, Network+, A+
Served proudly, US Army, 98C Analyst, '89-'92
|
top
|
|
|
aljph
Platinum
Joined: 27 December 2005
Location: United States
Posts: 355
|
Posted: 15 July 2007 at 9:13pm | IP Logged |
|
|
I understand what you are saying. I hear you and,
I agree with the "Cisco IOS Firewall" being stateful
with the included CBAC, which is *only included in the IOS firewall feature set. So if most every basic model includes the IOS firewall feature set then yes you would be correct.
"Context-based Access Control (CBAC) examines not only network layer and transport layer information, but also examines the application-layer protocol information (such as FTP information) to learn about the state of TCP and UDP connections. CBAC maintains connection state information for individual connections. This state information is used to make intelligent decisions about whether packets should be permitted or denied, and dynamically creates and deletes temporary openings in the firewall.
CBAC also generates real-time alerts and audit trails. Enhanced audit trail features use SYSLOG to track all network transactions. Real-time alerts send SYSLOG error messages to central management consoles upon detecting suspicious activity. Using CBAC inspection rules, you can configure alerts and audit trail information on a per-application protocol basis.
CBAC is only available in the Cisco IOS Firewall feature set."
I wonder if stateful firewall will be included in the August update to the CCNA,? Would the questions be harder on CCNA if questioned or JNCIA's?
Edited by aljph on 15 July 2007 at 10:21pm
__________________
CCVP, CS-CRMCs, CCNA, JNCIA-ER
|
top
|
|
|
JDog0254
Gold
Joined: 12 January 2006
Location: United States
Posts: 42
|
Posted: 15 July 2007 at 10:27pm | IP Logged |
|
|
aljph wrote:
I understand what you are saying. I hear you and,
I agree with the "Cisco IOS Firewall" being stateful
with the included CBAC, which is *only included in the IOS firewall feature set. So if most every basic model includes the IOS firewall feature set then yes you would be correct.
"Context-based Access Control (CBAC) examines not only network layer and transport layer information, but also examines the application-layer protocol information (such as FTP information) to learn about the state of TCP and UDP connections. CBAC maintains connection state information for individual connections. This state information is used to make intelligent decisions about whether packets should be permitted or denied, and dynamically creates and deletes temporary openings in the firewall.
CBAC also generates real-time alerts and audit trails. Enhanced audit trail features use SYSLOG to track all network transactions. Real-time alerts send SYSLOG error messages to central management consoles upon detecting suspicious activity. Using CBAC inspection rules, you can configure alerts and audit trail information on a per-application protocol basis.
CBAC is only available in the Cisco IOS Firewall feature set."
I wonder if stateful firewall will be included in the August update to the CCNA,? Would the questions be harder on CCNA if questioned or JNCIA's?
|
|
|
This argument seems to be completely pointless...
I'm sure whatever brand you have the most experience with would be the easier test, but what relevence does that have to anything???
__________________
JDog0254
CCNP,CCSP,A+,Network+,Server+
|
top
|
|
|
aljph
Platinum
Joined: 27 December 2005
Location: United States
Posts: 355
|
Posted: 15 July 2007 at 10:36pm | IP Logged |
|
|
for discussion only and
that is a good point.
I mean that what you said about whatever brand you have the most experience with would be the easier test, which is the good point.
we have three points now; the topics included, the writers and how they write the questions and now which brand you have the most experience with.
Edited by aljph on 15 July 2007 at 11:09pm
__________________
CCVP, CS-CRMCs, CCNA, JNCIA-ER
|
top
|
|
|
BosonMichael
Platinum
Certification Guru
Joined: 30 August 2005
Location: United States
Posts: 6046
|
Posted: 15 July 2007 at 11:45pm | IP Logged |
|
|
aljph wrote:
I wonder if stateful firewall will be included in the August update to the CCNA,? Would the questions be harder on CCNA if questioned or JNCIA's?
|
|
|
I'd expect that sort of information to be on a CCSP exam, not on a CCNA exam.
__________________
BosonMichael
MCSE+I, MCSE: Security, MCSE: Messaging, MCDST, MCDBA, MCTS, OCP, CCNP, CCDP, CNE, SCSA, Security+, Linux+, Server+, Network+, A+
Served proudly, US Army, 98C Analyst, '89-'92
|
top
|
|
|
|
|
If you wish to post a reply to this topic you must first login
If you are not already registered you must first register
|
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot delete your posts in this forum
You cannot edit your posts in this forum
You cannot create polls in this forum
You can vote in polls in this forum
|
top
|
|