1.2 Flashcards
ACLs(Access Control Lists)
It’s the VIP list. Designed to explicitly permit certain IP address, IP ranges, or protocols. Implicitly denies the rest.
Port Security
You can configure a switch so that it only learns one MAC address per port.
802.1x (EAPOL)
Extensible Authentication Access Protocol over LAN
Allows only EAPOL traffic over port until client authenticates with a RADIUS or authentication server
RBAC (Role Based Access Control)
Popular method of enabling access to a resource and is based on pre-defined policies set by an administrator
Loop Protection
Layer 3 Routers implement Time to live (TTL). Each router hop decrements the TTL. Basically packets have a life span. If they don’t reach their destination they are dropped permanently.
Log Analysis
Logs are generated by a number of devices:
Firewalls
Routers
Switches
IDS/IPS Systems
RBAC (Role Based Access Control)
Popular method of enabling access to a resource and is based on pre-defined policies set by an administrator
STP
Spanning Tree Protocol
For layer2 devices like switches. Different type of loop protection.