Podcast
Questions and Answers
Which of the following is the MOST accurate definition of a 'threat' in network security?
Which of the following is the MOST accurate definition of a 'threat' in network security?
- A potential danger that can exploit a vulnerability. (correct)
- A weakness in a system that can be exploited.
- The mitigation strategy employed to reduce risk.
- The calculated probability of an event occurring.
Which of the following is NOT a typical vector for data loss?
Which of the following is NOT a typical vector for data loss?
- Removable Media.
- Cloud Storage Devices.
- Encrypted devices. (correct)
- Email/Webmail.
A network consisting of interconnected LANs within a limited geographical area, such as a university campus or business park, is best described as a:
A network consisting of interconnected LANs within a limited geographical area, such as a university campus or business park, is best described as a:
- Personal Area Network (PAN).
- Small Office/Home Office Network (SOHO).
- Wide Area Network (WAN).
- Campus Area Network (CAN). (correct)
Which of the following is a key characteristic that differentiates a worm from a virus?
Which of the following is a key characteristic that differentiates a worm from a virus?
Which of the following attack types involves an attacker intercepting communications between two parties without their knowledge?
Which of the following attack types involves an attacker intercepting communications between two parties without their knowledge?
Which of the following professional roles is primarily responsible for overseeing an organization's security policies and procedures?
Which of the following professional roles is primarily responsible for overseeing an organization's security policies and procedures?
Which of the CIA triad components is best addressed by implementing network hardening mechanisms and backup systems?
Which of the CIA triad components is best addressed by implementing network hardening mechanisms and backup systems?
What is the primary goal of 'Control Plane Policing' (CoPP)?
What is the primary goal of 'Control Plane Policing' (CoPP)?
Which security measure is MOST effective in preventing eavesdropping attacks?
Which security measure is MOST effective in preventing eavesdropping attacks?
What is the function of a 'fuzzer' in the context of security tools?
What is the function of a 'fuzzer' in the context of security tools?
An attacker is using social engineering to convince a user to provide their password over the phone. What type of social engineering attack is this?
An attacker is using social engineering to convince a user to provide their password over the phone. What type of social engineering attack is this?
Which security domain includes security breach alarms, fences, and gates?
Which security domain includes security breach alarms, fences, and gates?
An organization discovers it has been infected with a 'zero-day' exploit. Which course of action is the MOST appropriate?
An organization discovers it has been infected with a 'zero-day' exploit. Which course of action is the MOST appropriate?
An organization implements a new security protocol that mandates multi-factor authentication for all employees, regardless of their role or access level. This decision MOST directly supports which security principle?
An organization implements a new security protocol that mandates multi-factor authentication for all employees, regardless of their role or access level. This decision MOST directly supports which security principle?
A network administrator observes unusually high UDP traffic originating from a single internal host destined for random ports on multiple external servers. Further investigation reveals that the host is also attempting to resolve numerous nonexistent domain names. Which of the following is the MOST likely cause?
A network administrator observes unusually high UDP traffic originating from a single internal host destined for random ports on multiple external servers. Further investigation reveals that the host is also attempting to resolve numerous nonexistent domain names. Which of the following is the MOST likely cause?
The primary goal of a network security vulnerability scan is to identify potential weaknesses before they can be exploited.
The primary goal of a network security vulnerability scan is to identify potential weaknesses before they can be exploited.
A worm requires a host program to execute and replicate.
A worm requires a host program to execute and replicate.
A modern method to secure data in transit is to utilize the FTPS protocol.
A modern method to secure data in transit is to utilize the FTPS protocol.
Social Engineering attacks target the technical infrastructure of a network to gain unauthorized access.
Social Engineering attacks target the technical infrastructure of a network to gain unauthorized access.
The primary goal of a DDoS attack is to disrupt the availability of a service.
The primary goal of a DDoS attack is to disrupt the availability of a service.
In the context of network security, the term 'integrity' refers to ensuring that data is only accessible to authorized individuals.
In the context of network security, the term 'integrity' refers to ensuring that data is only accessible to authorized individuals.
A 'script kiddie' is a highly skilled hacker who develops sophisticated exploits.
A 'script kiddie' is a highly skilled hacker who develops sophisticated exploits.
Implementing a DMZ (Demilitarized Zone) is unnecessary for a campus area network as internal threats are negligible.
Implementing a DMZ (Demilitarized Zone) is unnecessary for a campus area network as internal threats are negligible.
'Grey hat' hackers exclusively use their skills for malicious purposes.
'Grey hat' hackers exclusively use their skills for malicious purposes.
A keylogger is a type of malware that specifically targets web servers to steal sensitive data.
A keylogger is a type of malware that specifically targets web servers to steal sensitive data.
In network security, rate limiting on a firewall is an effective method to prevent brute-force attacks.
In network security, rate limiting on a firewall is an effective method to prevent brute-force attacks.
State-sponsored hackers only target military and governmental infrastructure.
State-sponsored hackers only target military and governmental infrastructure.
The Common Vulnerability Scoring System (CVSS) is a proprietary framework exclusively used by Cisco for rating IT vulnerabilities.
The Common Vulnerability Scoring System (CVSS) is a proprietary framework exclusively used by Cisco for rating IT vulnerabilities.
Increasing the salt size to at least 256-bits is computationally guaranteed to prevent rainbow table attacks.
Increasing the salt size to at least 256-bits is computationally guaranteed to prevent rainbow table attacks.
In the context of mitigating network attacks, perfect forward secrecy (PFS) makes past session keys invulnerable even if the private key of the server is compromised years later.
In the context of mitigating network attacks, perfect forward secrecy (PFS) makes past session keys invulnerable even if the private key of the server is compromised years later.
Which of the following is NOT a recommended guideline for creating strong passwords?
Which of the following is NOT a recommended guideline for creating strong passwords?
What is the primary purpose of the 'Cisco IOS Resilient Configuration' feature?
What is the primary purpose of the 'Cisco IOS Resilient Configuration' feature?
What is a key benefit of using 'Role-Based CLI Access'?
What is a key benefit of using 'Role-Based CLI Access'?
Which of the following best describes the use of banners in network device security?
Which of the following best describes the use of banners in network device security?
What is the purpose of the login block-for
command?
What is the purpose of the login block-for
command?
Which of the following is a potential consequence of routing protocol spoofing?
Which of the following is a potential consequence of routing protocol spoofing?
Which of the following describes the function of a 'Syslog' server in network security?
Which of the following describes the function of a 'Syslog' server in network security?
What is the recommendation regarding the configuration of secret passwords on network devices?
What is the recommendation regarding the configuration of secret passwords on network devices?
Which protocol is preferred for secure remote management of Cisco routers?
Which protocol is preferred for secure remote management of Cisco routers?
Which of the following describes the 'Defense in Depth' approach to securing a network perimeter?
Which of the following describes the 'Defense in Depth' approach to securing a network perimeter?
What is the purpose of configuring NTP (Network Time Protocol) on network devices?
What is the purpose of configuring NTP (Network Time Protocol) on network devices?
In the context of privilege levels on Cisco devices, what is the significance of level 15?
In the context of privilege levels on Cisco devices, what is the significance of level 15?
How is 'AutoSecure' best described regarding the topic of router hardening?
How is 'AutoSecure' best described regarding the topic of router hardening?
What is the most secure method for authenticating OSPF routing protocol updates, considering both computational overhead and resistance to collision attacks?
What is the most secure method for authenticating OSPF routing protocol updates, considering both computational overhead and resistance to collision attacks?
An organization is implementing role-based access control (RBAC) on their Cisco routers using CLI views. A junior network engineer requires access to only monitor interface status and check basic network connectivity. Which of the following view configurations is least appropriate, considering the principle of least privilege and minimizing potential for unintended configuration changes?
An organization is implementing role-based access control (RBAC) on their Cisco routers using CLI views. A junior network engineer requires access to only monitor interface status and check basic network connectivity. Which of the following view configurations is least appropriate, considering the principle of least privilege and minimizing potential for unintended configuration changes?
In a defense in depth approach to edge router security, only one router is used to protect the internal network.
In a defense in depth approach to edge router security, only one router is used to protect the internal network.
Enabling service password-encryption
is sufficient to protect against sophisticated password cracking techniques.
Enabling service password-encryption
is sufficient to protect against sophisticated password cracking techniques.
A strong password should be based on easily identifiable information such as names or birthdays.
A strong password should be based on easily identifiable information such as names or birthdays.
The command login block-for 30 attempts 3 within 10
will block login attempts for 30 seconds if there are 3 failed login attempts within 10 seconds.
The command login block-for 30 attempts 3 within 10
will block login attempts for 30 seconds if there are 3 failed login attempts within 10 seconds.
Configuring transport input ssh
on the vty lines allows only SSH connections, enhancing the security of remote access.
Configuring transport input ssh
on the vty lines allows only SSH connections, enhancing the security of remote access.
Privilege levels on a Cisco router range from 1 to 32, allowing for fine-grained control over command availability.
Privilege levels on a Cisco router range from 1 to 32, allowing for fine-grained control over command availability.
Commands available at lower privilege levels are not executable at higher privilege levels.
Commands available at lower privilege levels are not executable at higher privilege levels.
The Cisco IOS Resilient Configuration feature can be disabled through any type of session, including Telnet or SSH.
The Cisco IOS Resilient Configuration feature can be disabled through any type of session, including Telnet or SSH.
In Syslog messages, a severity level of 0 indicates debugging messages.
In Syslog messages, a severity level of 0 indicates debugging messages.
The crypto key zeroize rsa
command, when executed, will remove all RSA keys, including router certificates issued using those keys after prompting for confirmation.
The crypto key zeroize rsa
command, when executed, will remove all RSA keys, including router certificates issued using those keys after prompting for confirmation.
In the context of AAA, what is the primary function of 'Authorization'?
In the context of AAA, what is the primary function of 'Authorization'?
Which of the following is the correct order of the primary AAA elements when a user attempts network access?
Which of the following is the correct order of the primary AAA elements when a user attempts network access?
What is the purpose of 'Accounting' in the AAA framework?
What is the purpose of 'Accounting' in the AAA framework?
When AAA is not implemented, what vulnerability commonly affects Telnet?
When AAA is not implemented, what vulnerability commonly affects Telnet?
What is the initial step to enable local AAA on a Cisco router?
What is the initial step to enable local AAA on a Cisco router?
Which command configures local AAA authentication for console login?
Which command configures local AAA authentication for console login?
What is the maximum number of authentication methods that can be defined in a single AAA authentication list?
What is the maximum number of authentication methods that can be defined in a single AAA authentication list?
Which command is used to set the maximum number of failed login attempts before a user account is locked locally?
Which command is used to set the maximum number of failed login attempts before a user account is locked locally?
What is the primary benefit of using server-based AAA compared to local AAA?
What is the primary benefit of using server-based AAA compared to local AAA?
Which protocol is preferred for AAA because it encrypts the entire packet, providing greater security?
Which protocol is preferred for AAA because it encrypts the entire packet, providing greater security?
What is a key difference between TACACS+ and RADIUS protocols, in terms of authentication and authorization?
What is a key difference between TACACS+ and RADIUS protocols, in terms of authentication and authorization?
Which of the following protocols is commonly used to integrate AAA with Microsoft's Active Directory?
Which of the following protocols is commonly used to integrate AAA with Microsoft's Active Directory?
After configuring a router to use a RADIUS server for authentication, users are still being authenticated locally. What is the most likely cause?
After configuring a router to use a RADIUS server for authentication, users are still being authenticated locally. What is the most likely cause?
A network administrator configures AAA with TACACS+ for device administration. However, they notice that command authorization is not functioning as expected; users are able to execute commands they should not have access to. What is the most probable cause?
A network administrator configures AAA with TACACS+ for device administration. However, they notice that command authorization is not functioning as expected; users are able to execute commands they should not have access to. What is the most probable cause?
An organization wants to implement the most secure method for verifying the integrity of their AAA accounting logs sent to a central server. They are particularly concerned about non-repudiation. Which of the of the following would provide the strongest guarantees, assuming all systems are properly configured?
An organization wants to implement the most secure method for verifying the integrity of their AAA accounting logs sent to a central server. They are particularly concerned about non-repudiation. Which of the of the following would provide the strongest guarantees, assuming all systems are properly configured?
AAA is a framework used to control user access to network resources.
AAA is a framework used to control user access to network resources.
Identification involves proving that you are that identity.
Identification involves proving that you are that identity.
Authorization defines what a user can and cannot do on the network.
Authorization defines what a user can and cannot do on the network.
Accounting involves reviewing log files to check for compliance and hold subjects accountable for their actions.
Accounting involves reviewing log files to check for compliance and hold subjects accountable for their actions.
When using local AAA authentication, the router uses a remote server to authenticate users.
When using local AAA authentication, the router uses a remote server to authenticate users.
TACACS+ encrypts only the password within its packets, providing limited security.
TACACS+ encrypts only the password within its packets, providing limited security.
RADIUS combines authentication and authorization into a single process.
RADIUS combines authentication and authorization into a single process.
To configure server-based AAA, you must first enable AAA, specify the ACS server's IP address, configure the secret key and configure authentication to use either RADIUS or TACACS+.
To configure server-based AAA, you must first enable AAA, specify the ACS server's IP address, configure the secret key and configure authentication to use either RADIUS or TACACS+.
In the context of AAA authorization with CLI, the command aaa authorization exec default group tacacs+
configures authorization to use the TACACS+ server group for network access.
In the context of AAA authorization with CLI, the command aaa authorization exec default group tacacs+
configures authorization to use the TACACS+ server group for network access.
AAA accounting with the stop-only
parameter initiates the logging of user activities exclusively upon session inception.
AAA accounting with the stop-only
parameter initiates the logging of user activities exclusively upon session inception.
Which of the following is the most accurate statement regarding the implicit deny?
Which of the following is the most accurate statement regarding the implicit deny?
What is the result of configuring an ACL with only deny
statements and no permit
statements?
What is the result of configuring an ACL with only deny
statements and no permit
statements?
What is the key differentiator between standard and extended IPv4 ACLs?
What is the key differentiator between standard and extended IPv4 ACLs?
Which of the following ACL number ranges represents extended access lists?
Which of the following ACL number ranges represents extended access lists?
What is the primary function of a wildcard mask in an ACL?
What is the primary function of a wildcard mask in an ACL?
When configuring an ACL, what does a wildcard mask bit of '0' indicate?
When configuring an ACL, what does a wildcard mask bit of '0' indicate?
Which keyword can be used in an ACL statement to match any IP address?
Which keyword can be used in an ACL statement to match any IP address?
Which of the following is a best practice regarding ACL placement?
Which of the following is a best practice regarding ACL placement?
Which command is used to apply a named ACL to a router interface?
Which command is used to apply a named ACL to a router interface?
Considering the complexities of network security, which of these scenarios represents the most secure and efficient application of ACLs on a router with multiple interfaces?
Considering the complexities of network security, which of these scenarios represents the most secure and efficient application of ACLs on a router with multiple interfaces?
By default, a router automatically filters all traffic.
By default, a router automatically filters all traffic.
The last statement of an ACL is an explicit permit statement.
The last statement of an ACL is an explicit permit statement.
Standard ACLs filter IP packets based on both the source and destination address.
Standard ACLs filter IP packets based on both the source and destination address.
Using a wildcard mask bit of 1
means 'match the corresponding bit value in the address'.
Using a wildcard mask bit of 1
means 'match the corresponding bit value in the address'.
Extended ACLs should be located as close as reasonably possible to the destination of the traffic.
Extended ACLs should be located as close as reasonably possible to the destination of the traffic.
A single ACL can control traffic in both inbound and outbound directions simultaneously on an interface.
A single ACL can control traffic in both inbound and outbound directions simultaneously on an interface.
If an ACL does not have at least one permit statement, it will block all traffic due to the implicit deny.
If an ACL does not have at least one permit statement, it will block all traffic due to the implicit deny.
When configuring numbered ACLs, numbers 1 to 99 and 2000 to 2699 are for standard IP ACLs and numbers from 100 to 199 and 1300 to 1999 are for extended IP ACLs.
When configuring numbered ACLs, numbers 1 to 99 and 2000 to 2699 are for standard IP ACLs and numbers from 100 to 199 and 1300 to 1999 are for extended IP ACLs.
The command access-list 101 deny tcp any eq telnet any
will deny packets with a destination port of 23, from anywhere to anywhere.
The command access-list 101 deny tcp any eq telnet any
will deny packets with a destination port of 23, from anywhere to anywhere.
What is the effect of the following configuration commands:
R1(config)# access-list 5 remark Block all traffic from 192.168.10.0/24
R1(config)# access-list 5 deny 192.168.10.0 0.0.0.255
R1(config)# access-list 5 permit any
R1(config)# interface GigabitEthernet0/1
R1(config-if)# ip access-group 5 in
Subsequently, hosts on the 192.168.10.0/24 network attempting to communicate outbound via GigabitEthernet0/1 will intermittently succeed due to the permit any
statement.
What is the effect of the following configuration commands:
R1(config)# access-list 5 remark Block all traffic from 192.168.10.0/24
R1(config)# access-list 5 deny 192.168.10.0 0.0.0.255
R1(config)# access-list 5 permit any
R1(config)# interface GigabitEthernet0/1
R1(config-if)# ip access-group 5 in
Subsequently, hosts on the 192.168.10.0/24 network attempting to communicate outbound via GigabitEthernet0/1 will intermittently succeed due to the permit any
statement.
Flashcards
What is a virus?
What is a virus?
A malicious software that executes specific unwanted functions on a computer.
What is a worm?
What is a worm?
Malware that replicates and spreads across a network from system to system.
What is a Trojan horse?
What is a Trojan horse?
A non-replicating malware disguised as legitimate software to deceive users.
Who are script kiddies?
Who are script kiddies?
Signup and view all the flashcards
What are vulnerability brokers?
What are vulnerability brokers?
Signup and view all the flashcards
What is eavesdropping?
What is eavesdropping?
Signup and view all the flashcards
What is data modification?
What is data modification?
Signup and view all the flashcards
What is a Denial-of-Service attack?
What is a Denial-of-Service attack?
Signup and view all the flashcards
What is a Man-in-the-Middle attack?
What is a Man-in-the-Middle attack?
Signup and view all the flashcards
What is a Buffer Overflow?
What is a Buffer Overflow?
Signup and view all the flashcards
What are Reconnaissance Attacks?
What are Reconnaissance Attacks?
Signup and view all the flashcards
What are Access Attacks used for?
What are Access Attacks used for?
Signup and view all the flashcards
What are Social Engineering Attacks?
What are Social Engineering Attacks?
Signup and view all the flashcards
What is Availability?
What is Availability?
Signup and view all the flashcards
What is Confidentiality?
What is Confidentiality?
Signup and view all the flashcards
Malware
Malware
Signup and view all the flashcards
Hackers
Hackers
Signup and view all the flashcards
White Hat Hackers
White Hat Hackers
Signup and view all the flashcards
Black Hat Hackers
Black Hat Hackers
Signup and view all the flashcards
Hacktivists
Hacktivists
Signup and view all the flashcards
Cyber Criminals
Cyber Criminals
Signup and view all the flashcards
State-Sponsored Hackers
State-Sponsored Hackers
Signup and view all the flashcards
Penetration Testing Tools
Penetration Testing Tools
Signup and view all the flashcards
Forensic Tools
Forensic Tools
Signup and view all the flashcards
IP Address Spoofing
IP Address Spoofing
Signup and view all the flashcards
Identity Validation
Identity Validation
Signup and view all the flashcards
DDoS Attack
DDoS Attack
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Security Policy
Security Policy
Signup and view all the flashcards
Single Router Approach
Single Router Approach
Signup and view all the flashcards
Defense in Depth Approach
Defense in Depth Approach
Signup and view all the flashcards
DMZ Approach
DMZ Approach
Signup and view all the flashcards
Physical Security (Router)
Physical Security (Router)
Signup and view all the flashcards
Router OS & Config Security
Router OS & Config Security
Signup and view all the flashcards
Router Hardening
Router Hardening
Signup and view all the flashcards
Secure Admin Access
Secure Admin Access
Signup and view all the flashcards
Strong Passwords
Strong Passwords
Signup and view all the flashcards
Service Password Encryption
Service Password Encryption
Signup and view all the flashcards
Login Block-For
Login Block-For
Signup and view all the flashcards
Login Syslog Messages
Login Syslog Messages
Signup and view all the flashcards
SSH
SSH
Signup and view all the flashcards
Privilege Levels
Privilege Levels
Signup and view all the flashcards
Role-Based CLI Access
Role-Based CLI Access
Signup and view all the flashcards
Cisco IOS Resilient Config
Cisco IOS Resilient Config
Signup and view all the flashcards
Syslog
Syslog
Signup and view all the flashcards
NTP
NTP
Signup and view all the flashcards
AutoSecure
AutoSecure
Signup and view all the flashcards
Route Protocol Auth
Route Protocol Auth
Signup and view all the flashcards
Control Plane Policing
Control Plane Policing
Signup and view all the flashcards
Single Router Security
Single Router Security
Signup and view all the flashcards
Router Security Areas
Router Security Areas
Signup and view all the flashcards
Administrative Access Tasks
Administrative Access Tasks
Signup and view all the flashcards
Password Creation
Password Creation
Signup and view all the flashcards
IOS Resilient Configuration
IOS Resilient Configuration
Signup and view all the flashcards
What is Syslog?
What is Syslog?
Signup and view all the flashcards
What is NTP?
What is NTP?
Signup and view all the flashcards
What is Route Protocol Authentication
What is Route Protocol Authentication
Signup and view all the flashcards
What is Authentication?
What is Authentication?
Signup and view all the flashcards
What is Authorization?
What is Authorization?
Signup and view all the flashcards
What is Accounting?
What is Accounting?
Signup and view all the flashcards
What is Identification?
What is Identification?
Signup and view all the flashcards
What is Local AAA Authentication?
What is Local AAA Authentication?
Signup and view all the flashcards
What is Server-Based AAA?
What is Server-Based AAA?
Signup and view all the flashcards
What is TACACS+?
What is TACACS+?
Signup and view all the flashcards
What is RADIUS?
What is RADIUS?
Signup and view all the flashcards
What does Authentication ensure?
What does Authentication ensure?
Signup and view all the flashcards
What does Authorization determine?
What does Authorization determine?
Signup and view all the flashcards
What is the first step in AAA?
What is the first step in AAA?
Signup and view all the flashcards
What is the second step in Server-Based AAA?
What is the second step in Server-Based AAA?
Signup and view all the flashcards
AAA Authentication Attempts Max Fail
AAA Authentication Attempts Max Fail
Signup and view all the flashcards
AAA Accounting Messages
AAA Accounting Messages
Signup and view all the flashcards
RADIUS and Active Directory Integration
RADIUS and Active Directory Integration
Signup and view all the flashcards
What is Accounting (AAA)?
What is Accounting (AAA)?
Signup and view all the flashcards
What is Authentication (AAA)?
What is Authentication (AAA)?
Signup and view all the flashcards
What is Authorization (AAA)?
What is Authorization (AAA)?
Signup and view all the flashcards
What is Local Authentication?
What is Local Authentication?
Signup and view all the flashcards
What is the first step in local AAA configuration?
What is the first step in local AAA configuration?
Signup and view all the flashcards
What is group (AAA)?
What is group (AAA)?
Signup and view all the flashcards
What is the second step in local AAA configuration?
What is the second step in local AAA configuration?
Signup and view all the flashcards
What transport protocols do TACACS+ and RADIUS use?
What transport protocols do TACACS+ and RADIUS use?
Signup and view all the flashcards
What is an ACL?
What is an ACL?
Signup and view all the flashcards
What does an inbound ACL do?
What does an inbound ACL do?
Signup and view all the flashcards
What does an outbound ACL do?
What does an outbound ACL do?
Signup and view all the flashcards
What is an Implicit Deny?
What is an Implicit Deny?
Signup and view all the flashcards
What do standard ACLs filter by?
What do standard ACLs filter by?
Signup and view all the flashcards
What do extended ACLs filter by?
What do extended ACLs filter by?
Signup and view all the flashcards
What is a wildcard mask?
What is a wildcard mask?
Signup and view all the flashcards
Where are ACLs used?
Where are ACLs used?
Signup and view all the flashcards
What are the benefits of ACL best practices?
What are the benefits of ACL best practices?
Signup and view all the flashcards
What is the command to apply an ACL to an interface?
What is the command to apply an ACL to an interface?
Signup and view all the flashcards
Access Control List (ACL)
Access Control List (ACL)
Signup and view all the flashcards
Implicit Deny
Implicit Deny
Signup and view all the flashcards
Standard ACL
Standard ACL
Signup and view all the flashcards
Extended ACL
Extended ACL
Signup and view all the flashcards
Wildcard Mask
Wildcard Mask
Signup and view all the flashcards
ACL Deployment
ACL Deployment
Signup and view all the flashcards
ip access-group
ip access-group
Signup and view all the flashcards
One ACL per protocol
One ACL per protocol
Signup and view all the flashcards
One ACL per direction
One ACL per direction
Signup and view all the flashcards
Extended ACL Placement
Extended ACL Placement
Signup and view all the flashcards
Study Notes
- Chapter 4 covers implementing Firewall technologies (Access Control Lists) part 1.
- Topics include IP ACL operation, standard IPv4 ACLs, extended IPv4 ACLs, and troubleshooting ACLs.
- Objectives are to explain how ACLs filter traffic, compare standard and extended IPv4 ACLs, explain wildcard masks, and explain the guidelines for creating and placing ACLs.
- Objectives continue with configuring standard IPv4 ACLs, modifying a standard IPv4 ACL using sequence numbers, and configuring a standard ACL to secure vty access.
- More objectives are to explain the ACE structure, configure extended IPv4 ACLs, configure an ACL to limit debug output, explain how a router processes packets when an ACL is applied, and troubleshoot common ACL errors.
- An ACL's final statement is an implicit deny, automatically inserted at the end.
- This implicit deny will block all traffic if there is no permit statement.
- Cisco IPv4 ACLs come in Standard and Extended Types.
- Standard ACLs can filter IP packets based on the source address only.
Numbering and Naming ACLs
- Assign a number based on the protocol filtered to a numbered ACL.
- Standard IP ACLs numbers can be (1 to 99) and (1300 and 1999).
- Extended IP ACL numbers can be (100 to 199) and (2000 to 2699).
- You assign a name when providing the name of the ACL within a Named ACL.
- Named ACL names can contain alphanumeric characters, be written in CAPITAL LETTERS (suggested), cannot contain spaces or punctuation, and you can add or delete entries.
Wildcard Masking
- Wildcard masks and subnet masks match binary 1s and 0s differently.
- Wildcard masks use the following rules to match binary 1s and 0s:
- Wildcard mask bit 0 matches the corresponding bit value in the address.
- Wildcard mask bit 1 ignores the corresponding bit value in the address.
- Wildcard masks are often inverse masks.
- Unlike a subnet mask (binary 1 equals a match, binary 0 is not a match), a wildcard mask has the reverse true.
- Calculating wildcard masks can be challenging, one shortcut method is to subtract the subnet mask from 255.255.255.255.
access-list 1 permit 192.168.10.10 0.0.0.0
oraccess-list 1 permit host 192.168.10.10
access-list 1 permit 0.0.0.0 255.255.255.255
oraccess-list 1 permit any
Guidelines for ACL Creation
- Use ACLs in firewall routers between internal and external networks (like the Internet).
- Use ACLs on a router between two parts of your network to control traffic entering or exiting a specific part.
- Configure ACLs on border routers (routers at the edges of your networks).
- Configure ACLs for each network protocol configured on the border router interfaces.
The Three Ps for ACL Creation:
- One ACL per protocol - An ACL must be defined for each protocol if you want to control traffic flow on an interface.
- One ACL per direction - ACLs control traffic in one direction, so create two separate ACLs to control inbound and outbound traffic.
- One ACL per interface - ACLs control traffic for an interface (e.g., Gigabit Ethernet 0/0).
ACL Best Practices:
- Guideline: Base your ACLs on your organization's security policy.
- Benefit: Enables organizational security guidelines.
- Guideline: Prepare a description of what you want your ACLs to do.
- Benefit: Helps avoid inadvertently creating potential access problems.
- Guideline: Use a text editor to create, edit, and save ACLs.
- Benefit: This helps you create a library of reusable ACLs.
- Guideline: Test your ACLs on a development network before implementing them on a production network.
- Benefit: Avoid costly errors.
ACL Placement Rules:
- It should be placed where it will have the greatest impact on efficiency.
- Extended ACLs should be located as close as possible to the traffic source.
- Standard ACLs should be placed as close to the destination as possible.
- Placement may depend on the network administrator's control, bandwidth, and ease of configuration.
Configuring Standard ACLs
- The command syntax is:
Router(config)# access-list access-list-number deny | permit remark source [source-wildcard] [log]
- To remove the ACL, use the global configuration command
no access-list
. - The
remark
keyword is used for documentation and eases understanding access lists. - Cisco IOS applies an internal logic when accepting and processing Standard ACL statements. As discussed previously, access list statements are processed sequentially, so the order in which statements are entered is important.
- Link a standard ACL to an interface using the
ip access-group
command in interface configuration mode. - Remove with command
no ip access-group
- Use the global
no access-list
command to remove the entire ACL,. - Creating Named ACLs:
Router(config)#ip access-list {standard | extended} name
- The syntax for the numbered ACL is
Router(config-std-nacl)# {permit | deny | remark} {source [source-wildcard]} [log]
. The named one is used to activate the IP ACL on an interfaceRouter(config-if)#ip access-group name [in | out]
.
Extended ACLS
- Filtering options include source address, destination address, protocol, and port numbers.
- Extended ACLs are used more often than standard ACLs because they provide a greater degree of control and more precise traffic-filtering control, also referred to as "increased granular control".
- All extended ACLs filter on Source IP address AND Destination IP address.
- Characteristics are Upper layer protocols (e.g., IP, TCP, UDP, ICMP, EIGRP, ...), source port and the destination port.
- The procedural steps for configuring extended ACLs are the same as for standard ACLs:
access-list access-list-number {deny | permit | remark} protocol {source [source-wildcard] [operator operand] [port port-number or name]} destination {destination-wildcard} [operator operand] [port port-number or name] [established]}
. - Editing standard ACLs involves using a Text editor or using sequence Number
- Editing can be accomplished using sequence numbers or a text editor.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.