Core Routing Concepts Flashcards

1
Q

A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.
Used with routers, switches, and firewalls
Add layer 3 & 4 security protecting our network from outside attackers.
Access lists can define the protocol such as IP, Source Network, Destination network, and the TCP/UDP port number matching traffic

A

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1st create the access-list
2nd apply the access-list
Standard List 2020:
1.Permit - Name of Person
2.Deny - Any
You need at least one permit statement in the list otherwise all traffic is denied (implicit deny)
Analogy of a Bouncer and Bar scenario: if you are not on the list you can’t get in.

A

Rules of ACLs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

filtering based on the protocol source, destination, and port
Apply the ACL closest to the Source

A

Extended ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

dumb and static in nature

employs only Access control lists to control inbound and outbound traffic

A

Stateless Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

dynamic in nature
watches all traffic and can change the state of the firewall
keeps track of the connections and can allow return traffic as long as it was first generated from inside the network.
Modern firewalls are both stateful and stateless because they use ACLs and also keep track of connections

A

Statefull Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advanced firewalls are capable of inspecting the content of packets

A

Deep Packet Inspection (DPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

both mean the same thing
Examine traffic in real-time and not slow anything down
it does use a lot of CPU
this means the firewall can understand what services and applications the packets are for and how the services such as anti-malware are possible.
It also allows us to have even more control over what happens in our networks
Decisions can be made based on what is deep inside the packets rather than just where it’s coming from and where it’s going to.

A

Application Aware Firewall

and

Context Aware Firewall

(dissect packets)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly