Chap 26 - Network Device Access Control and Infrastructure Security Flashcards
What are 5 types of ACLs?
- Numbered Standard
- Numbered Extended
- Named ACLs
- Port ACLs (PACLs)
- VLAN ACLs (VACLs)
What is the range for Standard Numbered ACLs?
- 1 - 99
- 1300 - 1999
What is the range for Numbered Extended ACLs?
- 100 - 199
- 2000 - 2699
What is the only thing a Numbered Standard ACL can filter on?
Source IP address
What is the command to enter ACL command mode?
ip access-list extended NAME_OF_ACL
What are the 4 restrictions for PACLs?
- They only filter inbound traffic
- They cannot filter L2 control packets (CDP, VTP, DTP, PAgP, UDLD, STP)
- They are only supported in hardware
- They do not support filtering IPv6, ARP, and MPLS
What does the Port ACL feature provide?
It provides the ability to perform access control on specific Layer 2 ports. A Layer 2 port is a physical LAN or trunk port that belongs to a VLAN. Port ACLs are applied only on the ingress traffic. The port ACL feature is supported only in hardware (port ACLs are not applied to any packets routed in software).
What are the 2 modes supported by PACLs?
- Prefer port mode
- Merge mode (default)
What is Prefer Port mode?
If a PACL is configured on a Layer 2 interface, the PACL takes effect and overwrites the effect of other ACLs (Cisco IOS ACL and VACL)
What is Merge mode?
The PACL, VACL, and Cisco IOS ACLs are merged in the ingress direction following the logical serial model shown in Figure 51-2. This is the default access group mode.
If a PACL, VACL, and RACL are applied on the same VLAN and incoming traffic is bridged what order are they processed?
- Inbound PACL on the switchport
- Inbound VACL on the VLAN 3
- Outbound VACL on the VLAN
If a PACL, VACL, and RACL are applied on the same VLAN and incoming traffic is routed what order are they processed?
- Inbound PACL on the switchport
- Inbound VACL on the VLAN
- Inbound ACL on the SVI 4) Outbound ACL on the SVI 5) Outbound VACL on the VLAN
What are the 3 methods of gaining access to the CLI on an IOS device?
- Console (cty) port - line con 0
- Aux (aux) port - line aux 0
- Virtual Terminal (vty) lines - line vty 0 4
What are the 3 ways to password-protect the lines?
- password configured directly on the line
- username-based authentication
- Using a AAA server
What is a Type 0 password?
- configured with ‘enable password’
- clear text
What is a Type 5 password?
These passwords use an improved Cisco proprietary encryption algorithm that makes use of the MD5 hashing algorithm. Only crackable by brute force attacks.
What is a Type 7 password?
These passwords use a Cisco proprietary Vigenere cypher encryption algorithm and are known to be weak. There are multiple online password utilities available that can decipher type 7 encrypted passwords in less than a second. Enabled with service password-encryption
What is a Type 8 password?
Type 8 passwords specify a Password-Based Key Derivation Function 2 (PBKDF2) with a SHA-256 hashed secret and are considered to be uncrackable.
What is a Type 9 password?
These use the SCRYPT hashing algorithm. Just like type 8 passwords, they are considered to be uncrackable.
To enable a password on line con, aux, or vty what 2 commands are required?
- password MYPASS
- login
What are 3 ways to enable username password authentication?
- username password
- username secret
- username algorithm type secret
What 2 commands will enable username password authentication on line con, aux, vty?
- global config username password
- under line configuration ‘login local’
What are 3 privilege levels?
- privilege level 0
- privilege level 1
- privilege level 15
What can you do with privilege level 0?
- disable
- enable
- exit
- help
- logout
What can you do with privilege level 1?
- User exec level
- Everything except configuration changes.
What can you do with privilege level 15?
- Privileged EXEC mode
- Highest privilege level
- You can do everything
What are the 2 versions of SSH?
- SSHv1
- SSHv2
What are the 3 steps required to enable SSHv2?
- Configure a hostname
- Configure a domain name (ip domain-name yum.tgr.net)
- Generate crypto keys (crypto key generate 768)