5.0 Security Fundamentals Flashcards

1
Q

What is are the differences between standard and extended ACLs?

A
  1. Standard ACLs can only filter at Layer 3 using the source IP address
  2. Extended ACLs can also include destination IP address and Layer 4 attributes, such as protocol and port number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an advantage of using an ACL inbound on an interface and best use scenario?

A
  1. It will discard denied traffic before processing the packets for routing
  2. Best used when the source of traffic to filter only comes to/from a single interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How are outbound ACLs different than inbound ACLs and best scenario?

A
  1. Rules are processed after packets have been routed and allowed/discarded at the outbound interface before putting on the wire
  2. Best when traffic source is from multiple interfaces going out a single interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can be omitted from an ACE when the “host” keyword is used?

A

The wildcard mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What keyword can be substituted for a source or destination IP address in an ACE?

A

any

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the limit on the number of ACLs that can be applied to a single interface?

A

One inbound + one outbound = 2 for single stack IP
4 total if dual-stack IP (IPv4 & IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command can be used to document an ACE?

A

remark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 number ranges for standard ACLs

A

1-99, 1300-1999

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

2 number ranges for extended ACLs

A

100-199, 2000-2699

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which is preferred, using numbered or named ACLs and why?

A

Named ACLs, because the name can provide information about the purpose of the ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference in the commands used to create numbered and named ACLs?

A

Numbered ACLs: access-list [x] ….
Named ACLs: ip access-list [name]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where are the optimal places to put standard and extended ACLs?

A

Standard ACLs - at the destination
Extended ACLs - at the source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the full syntax to create a standard numbered ACL?

A

access-list [access-list-number] {deny | permit | remark text} source [source-wildcard] [log]
*note whole command is repeated for every ACE added to the list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What part of the command to create a standard ACL is optional and what effect does it have?

A

log - generates a informational message for the first matched packet a rule is applied to, should only be used for troubleshooting or security reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What command removes a numbered ACL?

A

no access-list [number]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What command creates a standard named ACL?

A

R1(config)#ip access-list standard [name]
R1(config-std-nacl)#[permit | deny | remark] [source address]

17
Q

What are the 2 methods to modify ACL ACE?

A
  1. Delete the ACL and then recreate it using copy/paste and a text editor
  2. Using sequence numbers to modify specific entries
18
Q

What are the commands to modify an ACL ACE using the delete/recreate method?

A
  1. R1# show run | section access-list
  2. Copy the output into a text editor and modify it
  3. R1(config)# no access-list 1
  4. R1(config)# [paste content copied from text editor]
19
Q

What are the commands to modify an ACL ACE using sequence numbers?

A
  1. R1# show access-lists [to get the sequence # of the ACE to modify]
  2. R1(config)# ip access-list standard 1
    R1(config-std-nacl)# no 10 [remove incorrect entry]
  3. R1(config-std-nacl)# 10 deny host 192.168.10.10 [add the correct entry]
20
Q

What command shows access-lists and match counters?

A

R1# show access-lists

21
Q

What command clears/resets the match counters?

A

R1# clear access-list counters [ACL name/number]

22
Q

What are the steps/commands to secure telnet/ssh access via ACL?

A
  1. Create ACL, add a final deny any statement to track unauthorized attempts
    2.