Device Security Flashcards

1
Q

What are the ranges for standard ACLs?

A

1-99

1300-1999

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Syntax for an extended numbered ACL

A

access-list access-list-number {deny | permit} protocol source IP wildcard mask destination IP wildcard mask [log]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 primary differences that named ACLs have vs numbered

A
  1. Names instead of numbers
  2. Uses ACL subcommands vs global commands to define the ACL
  3. ACL editing allows users to edit delete and add individual lines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Command to delete a line from a numbered ACL with sequence numbers.

A

conf t
ip access-list {standard | extended} number
no seq number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Syntax to assign an ACL to a vty

A

access-class number {in | out}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TCP version of an extended ACL

A

access-list access-list-number {deny | permit}tcp source source-wildcard [operator [port]] destination destination-wildcard [operator [port]] [log]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If an ACL omits the wildcard mask, what is the implied mask?

A

0.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the ranges for extended ACLs?

A

100 - 199

2000 - 2699

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Syntax for a standard numbered ACL

A

access-list {1-99 | 1300-1999} {permit | deny} [subnet wildcard mask | any ]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operational command to see: -IPv4 ACLs -All ACLs

A

show ip access-lists

show access-list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Command to see access list application status on an interface

A

show ip interface interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Keyword to add to an ACL to help keep track of it’s activity

A

log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 types of ACLs?

A

Standard
Extended
Named

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Are named ACLs standard or extended?

A

Either, depends on how they are configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the difference between standard and extended ACLs?

A
Standard ACLs filter on source address
Extended ACLs filter on:    
  Source and Dest IP    
  Source and Dest Port    
  Other criteria
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do extended ACLs filter on?

A

Source & Dest. IP

Source & Dest. Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Command to implement an ACL on an interface

A

ip access-group number|name {in | out}

18
Q

ACL keyword that means “0.0.0.0” wildcard

19
Q

ACL keyword that means 0.0.0.0 255.255.255.255

20
Q

ACL keywords for
greater than
less than
equal to

21
Q

Command to instantiate a named ACL

A

ip access-list {standard | extended} name

22
Q

If a numbered ACL doesn’t use sequence numbers, how would a user remove one of it’s lines?

A

They can’t. The ACL must be deleted and re-added entirely.

23
Q

What effect does the log keyword have on an ACL?

A

It sends messages to the log file about the activity pertinent to that line in the ACL

24
Q

What advantage does SNMPv3 have over older versions?

25
What 3 features in SNMPv3 support higher levels of security?
1. Message integrity (tamper detection) 2. Authentication 3. Encryption
26
What are the 3 security modes for SNMPv3?
noAuthNoPriv authNoPriv authPriv
27
Configuration keyword for the noAuthNoPriv level of SNMPv3 security
noauth
28
Configuration keyword for the authNoPriv level of SNMPv3 security
auth
29
Configuration keyword for the authPriv level of SNMPv3 security
priv
30
Command to see the status of the SSH service on the device
show ip ssh
31
5 steps to enabling SSH
1. Configure VTY lines to use either local or AAA security 2. If local, add usernames 3. Configure the ip domain-name 4. Create the encryption key 5. Enable version 1 or version 2
32
Command to enable port security on an interface
switchport port-security
33
2 mandatory and 4 optional steps to enabling port security
1. Set a port to either trunk or access mode 2. enable port security Optional 3. Change the default number of MAC addresses allowed 4. Change the default port security violation behavior 5. Define any permitted MAC addresses 6. Tell the switch to sticky-learn any dynamically learned mac addresses
34
Command to see the security state of switch ports
show port-security [interface *interface*]
35
What are the 3 port security violation options, and which is default?
1. Shutdown (default) 2. Protect 3. Restrict
36
3 steps to create a key for use in routing authentication
1. Create the key chain 2. Create the key 3. Set the key string
37
Syntax to create a key chain
conf t | key chain *name*
38
Syntax to create a key under a key chain
key *#*
39
Syntax to set a text string for a key
key-string *text-string*
40
Command to create the encryption key for SSH
crypto key generate rsa
41
Command to set the device to use SSH2
ip ssh version 2