Flashcards in Vol 2 Part 1: IP Access Control Lists Deck (29)
What layer does error recover and flow control happen at?
Between UDP and TCP, which provides error recover?
TCP is defined in RFC# what?
Multiplexing relies on a concept known as a *BLANK*
What are the 3 things inside of a socket?
IP Address, Transport Protocol, and Port Number
What is multiplexing?
Streaming multiple pieces of data within a single stream.
What do the port numbers determine when multiplexing?
Port numbers are used to determine the data and its destined application
What range of ports are the well known ports that are assigned by the Internet Assigned Numbers Authority (IANA)?
What range of ports are considered user registered ports?
What are the two types of general protocols used with connections?
Connection-oriented (TCP) and connectionless (UDP)
Connection-oriented protocols require an exchange of messages before or after data transfer begins?
Before. A pre established correlation is made between two endpoints. This is TCP.
True or Fales: Connectionless protocols do NOT require an exchange of messages or correlation?
What fields within the TCP header are used to ensure reliability of data transfer?
SEQ and ACK
Windowing allows the receiving end to let the sending end know what?
How much data it can receive at the current moment
The receiving device will send a *BLANK* message to the sender to indicate either an increase or a decrease in its availability to receive data.
What is the uniform resource identifier (URI)?
The web address typed or clicked ot access a page
What are the three key components of a URI?
Protocol, Server Name, and Web Page
Web pages typically have multiple files called *BLANK*
What are the two basic types of Access Control Lists (ACLs)?
Standard and Extended
Standard and Extended ACLs have two main sub types; what are they?
Numbered and Named
What is the difference between a standard and an extended ACL?
A standard ACL just uses a matching Source IP
An extended ACL using a matching source AND destination IP, as well as a source and destination port.
Where do ACLs reside?
On the router
What command is used to create an ACL?
ip access-list *standard or extended* *name of ACL*
When creating a rule to permit/deny a range of IP addresses, what is typed in after the IP address to signify the range of IPs?
Explain how a wild card works with regards to the permitted/denied range of IPs?
An octet in the wild card containing a number other than 0 corresponds to the octet in the IP address. This octet will be ignored when the ACL is choosing to permit or deny an IP address. For example. the command "access-list 1 permit 10.1.1.1" will permit that IP address only. However, the command "access-list 1 permit 10.1.1.0 0.0.0.255" will permit any IP address in the range 10.1.1.0-10.1.1.255
A standard access list has what for a default initial range?
A standard ACL should always be placed where in relation to the source and destination?
As close to the destination as possible
An extended ACL should always be placed where in relation to the source and destination?
As close to the source as possible