Infrastructure Security Flashcards
ACL
(What is it?)
(Sample uses?)
(How it works?)
2023.12.28 - added clarification and revised answer
1) List of permit and deny statements used to identify traffic based on header values in IP packets
2) Uses include controling route advertisements, specifying interesting traffic for VPN, and controlling NATs
3) Evaluated top-down and stops after a match
4) Implicit deny at end
5) Only one ACL per interface, per direction, per L3 protocol allowed
ACL Wildcard Masking
0 vs 1 bits
2023.12.28 - revised answer
- 0 bits means to match the value of the corresponding address bit; all 0’s means match everything
- 1 bits means to ignore the value of the corresponding address bit; all 1’s means match exactly
ACL Abbreviations
1) ‘host’ means exact match - 0.0.0.0
2) ‘any’ means any - 255.255.255.255
ACL Types
1) Standard ACL
2) Extended ACL
Standard ACLs
(what it does?)
(number ranges?)
(best practice?)
2023.12.28 - revised clarification and answer
1) checks only source IP and permits or denies all ports
2) Number range 1-99, 1300-1999
3) Place close to destination
Extended ACLs
(what it does?)
(number ranges?)
(best practice?)
1) checks the source & dst IP, and generally permits/denies specific ports
2) Number range 100-199, 2000-2699
3) Place closest to source
Command to create Standard Numbered ACL
2023.12.28 - new card
RouterA(config)# access-list 4 permit 12.34.56.0 0.0.0.255
- global config mode
- default wildcard mask is 0.0.0.0
- numbered 1-99, or 1300-1999
- verify with “show access-lists”
- to delete, must remove entire ACL and re-add it with the revision
Command to create Extended Numbered ACL
2023.12.28 - new card
RouterA(config)# access-list 100 deny tcp 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21
- global config mode
- numbered 100-199, or 2000-2699
- to delete, must remove entire ACL and re-add it with the revision
Extended ACL Abbreviations For Specifying TCP/UDP Ports
2023.12.28 - new card
1) lt = less than
2) gt = greater than
3) eq = equals
4) neq = not equal to
5) range = inclusive range
Inbound vs Outbound ACLs
2023.12.28 - new card
Outbound - Packets are routed to the outbound interface first, and then processed by the ACL. If permitted, packets forwarded through the interface.
Inbound - Packets are processed by the ACL before being routed. If permitted, packets are processed for routing next.
Command to Apply ACL to Interface
2023.12.28 - new card
RouterA(config-if)# ip access-group 1 in
- in for inbound, out for outbound
- interface config mode
- only one ACL per protocol, per direction, per interface is allowed
Command to create Named Standard ACL
2023.12.28 - new card
RouterA(config)# ip access-list standard BLAHBLAH
RouterA(config-std-nacl)# permit 10.1.1.0 0.0.0.255
- alphanumeric string number
- sequence numbers start at 10 and increment by 10 if left blank
- can delete specific entries
Command to create Named Extended ACL
RouterA(config)# ip access-list extended BLAHBLAH
RouterA(config-std-nacl)# permit tcp 10.1.1.0 0.0.0.255 any eq 443
- alphanumeric string number
- sequence numbers start at 10 and increment by 10 if left blank
- can delete specific entries
How to resequence ACL
2023.12.28 - new card
1) access-list resequence or
2) reload the router
Logical Packet Groups
1) Data Plane Packets
2) Control Plane Packets
3) Management Plane Packets
4) Services Plane Packets