5.6 Access Control Lists Flashcards
Configure and verify access control lists. (51 cards)
Define:
Access Control List (ACL)
A set of rules to filter network traffic.
ACLs control traffic flow based on criteria such as IP address, protocol type, or port numbers. They can be used to permit or deny traffic entering or leaving a network or device.
What are the types of Access Control Lists (ACLs)?
- Standard
- Extended
Standard ACLs filter traffic based only on the source IP address.
Extended ACLs can filter traffic based on both source and destination IP addresses, as well as other parameters like protocol types and port numbers.
What are the two main ACL actions?
- Deny
- Permit
Deny: Blocks packets based on the ACL rules.
Permit: Allows packets to pass if they match the ACL rules.
Define:
Standard Numbered ACL
ACL filtering based on source IP address, using numbers 1-99.
Standard ACLs are basic filters and cannot inspect destination IPs, limiting their functionality compared to extended ACLs.
Where can an ACL be implemented in a network with two routers?
On any interface in the packet’s flow direction.
ACLs can be applied to any interface handling the packet as it moves in the direction of its flow, encompassing both inbound and outbound interfaces.
List the ACL commands that would allow packets from the IP address 192.168.2.5.
- access-list 1 permit any
- access-list 1 permit 192.168.2.5
- access-list 1 permit 192.168.2.0 0.0.0.255
These commands enable the acceptance of packets from the specified host IP or any address within the defined network.
Which command is used to display the details of configured access lists?
show access-lists
The command ‘show access-lists’ retrieves and displays the configuration details of access lists, including their rules and parameters.
What happens if a packet doesn’t match any ACL rule?
The packet is discarded due to implicit deny
If no ACL rule matches a packet, it is dropped by default due to the implicit deny at the end of the ACL.
What command allows all packets on an interface using an ACL?
access-list 1 permit any
This command effectively creates a rule in a standard numbered access list that permits all incoming packets on the specified interface.
What is the primary function of IPv4 access control lists (ACL)?
To filter traffic based on defined rules.
ACLs allow network administrators to specify which packets are allowed or denied, enhancing network security and traffic control.
What type of IP ACL uses simple logic matching only on the source IP address?
Standard numbered IP ACLs.
Standard ACLs can only match the source IP and are simpler compared to extended ACLs, which can inspect more packet parameters.
At which points can ACLs be applied in a router?
Inbound or outbound interfaces.
ACLs can be configured to control traffic at either the entry or exit points of a router interface.
Fill in the blanks:
The range of valid numbers for standard numbered IP ACLs is ______ to ______.
1,99
Standard ACLs are identified by numbers 1-99, which are used to match traffic based on the source IP address.
Which wildcard mask is most useful for matching all IP packets in subnet 10.1.128.0 with mask 255.255.255.0?
0.0.0.255.
The wildcard mask 0.0.0.255 allows the router to match any IP address within the 10.1.128.0 subnet.
Fill in the blank:
A standard numbered IP ACL matches only the source ______ ______ of the packet.
IP address
Standard ACLs match packets solely based on the source IP address, limiting their filtering capabilities compared to extended ACLs.
How does a router process packets with an ACL enabled?
It compares each packet against the ACL rules.
ACLs are checked in sequence; the first match found determines whether the packet is allowed or denied.
What are the two types of IP ACLs based on naming conventions?
- Numbered
- Named
Numbered ACLs (identified by numbers 1-99 or 1300-1999)
Named ACLs (identified by a custom name).
True or False:
Extended IP ACLs can match both source and destination IP addresses.
True
Extended ACLs provide more filtering power by allowing both source and destination IP addresses to be evaluated.
Fill in the blank:
The implied action at the end of an ACL if no match is found is ______ ______.
Implied deny
ACLs include an implicit deny rule at the end, meaning any unmatched packets are automatically discarded.
Which command matches packets sent from hosts in subnet 172.16.4.0/23?
access-list 1 permit 172.16.4.0 0.0.1.255.
This command matches packets within the 172.16.4.0/23 subnet using the wildcard mask 0.0.1.255.
What logic do ACLs use for packet processing?
First-match logic
ACLs evaluate packets line by line and stop processing once a match is found, taking the action defined in the matching rule.
What is the command syntax for standard numbered IP ACLs?
access-list {1-99 | 1300-1999} {permit | deny} matching-parameters
This command syntax defines the range of numbers for standard ACLs (1-99 or 1300-1999), followed by the action (permit or deny) and the matching parameters.
How do you match a specific source IP address in an ACL?
By using the command ‘access-list 1 permit [specific IP address]’.
This command allows traffic from a specific source IP address by matching it in the ACL.
What is a wildcard mask in the context of ACLs?
It tells IOS to ignore parts of the address when making comparisons.
A wildcard mask allows partial matching by instructing IOS which parts of the IP address should be ignored during comparison.