Core Routing Concepts Flashcards
A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.
Used with routers, switches, and firewalls
Add layer 3 & 4 security protecting our network from outside attackers.
Access lists can define the protocol such as IP, Source Network, Destination network, and the TCP/UDP port number matching traffic
Access Control List (ACL)
1st create the access-list
2nd apply the access-list
Standard List 2020:
1.Permit - Name of Person
2.Deny - Any
You need at least one permit statement in the list otherwise all traffic is denied (implicit deny)
Analogy of a Bouncer and Bar scenario: if you are not on the list you can’t get in.
Rules of ACLs
filtering based on the protocol source, destination, and port
Apply the ACL closest to the Source
Extended ACL
dumb and static in nature
employs only Access control lists to control inbound and outbound traffic
Stateless Firewall
dynamic in nature
watches all traffic and can change the state of the firewall
keeps track of the connections and can allow return traffic as long as it was first generated from inside the network.
Modern firewalls are both stateful and stateless because they use ACLs and also keep track of connections
Statefull Firewall
Advanced firewalls are capable of inspecting the content of packets
Deep Packet Inspection (DPI)
both mean the same thing
Examine traffic in real-time and not slow anything down
it does use a lot of CPU
this means the firewall can understand what services and applications the packets are for and how the services such as anti-malware are possible.
It also allows us to have even more control over what happens in our networks
Decisions can be made based on what is deep inside the packets rather than just where it’s coming from and where it’s going to.
Application Aware Firewall
and
Context Aware Firewall
(dissect packets)