Ch25 Basic IPv4 Access Control Lists Flashcards

1
Q

The mask used in Cisco IOS ACL commands (and OSPF and EIGRP network commands). Also referred to as an inverse mask. Used to match (or ignore) parts of an an address when making comparisons

A

wildcard mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A list of IOS global configuration commands that can match only the source address of a packet, for the purpose of deciding which packets to discard and which packets to allow through a router

A

standard access list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Command reference:

Global command for standard numbered access lists. Uses numbers between 1-99 and 1300-1999, inclusive

A

access-list <i>list-number</i> [deny | permit] <i>source-addr</i> [<i>source-wildcard</i>] [log]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Command reference:

defines a descriptive remark indicating what the access list is supposed to do

A

access-list <i>list-number</i> remark <i>text</i>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Command reference:

Interface subcommand to enable access lists and bind them to the interface.

A

ip access-group <i>[number | name</i> [in | out]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command reference:

This show command reveals the presence or absence of access lists in and/or out of an interface

A

show ip interface <i>int</i>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Command reference

Lists details of configured access lists for all protocols

A

show access-lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Command reference:

Shows IP access lists

A

show ip access-lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When preparing to create an access list, what must be considered prior to applying it to an interface?

A

ACLs must be enabled on an interface that will process the packet, in the direction of traffic flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What packet header(s) are standard access lists capable of inspecting and matching?

A

Source address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What packet header(s) are extended access list capable of inspecting and matching?

A

Source address, destination address, protocol, source port, destination port, etc (any L3 or L4 header)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Standard access lists filter at which layer(s)?

A

Layer 3 only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Extended access lists filter at which layer(s)?

A

L3 and L4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When configuring standard numbered access lists, what ranges are available to identify the ACL?

A

1-99, 1300-1999

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When configuring extended numbered access lists, what ranges are available to identify the ACL?

A

100-199, 2000-2699

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

On which interface should a standard ACL be placed?

A

Standard ACLs should be placed closest to their destination.

17
Q

What search logic is implemented by ACLs?

A

First-match logic The router will take the listed action on the first ACE that matches the packet.