Module 4: ACL Concepts Flashcards
What do routers make routing decisions based on?
Information in the packet header
How is traffic routed when entering a router interface?
Solely based on information within the routing table
What does the router compare to find the best match for routing?
The destination IP address with routes in the routing table
What is the purpose of an access control list (ACL)?
To filter packets based on information found in the packet header
By default, do routers have any ACLs configured?
No
What happens when an ACL is applied to a router interface?
The router evaluates all network packets as they pass through the interface
What is the role of access control entries (ACEs) in an ACL?
A sequential list of permit or deny statements
Fill in the blank: An ACL is a series of _______ commands used to filter packets.
lOS
True or False: A router forwards packets based on the best match route found in the routing table.
True
What are ACEs commonly referred to as?
ACEs are also commonly called ACL statements.
ACL stands for Access Control List.
What happens when network traffic passes through an interface configured with an ACL?
The router compares the information within the packet against each ACE, in sequential order.
This is essential for determining if the packet matches one of the ACEs.
What is the process called when a router checks packets against ACEs?
Packet filtering.
Packet filtering is crucial for managing network traffic and security.
What do several tasks performed by routers require?
The use of ACLs to identify traffic.
ACLs help in controlling the flow of traffic based on defined rules.
What is the purpose of limiting in unnecessary network traffic?
To increase network performance
Reducing unnecessary traffic allows for better bandwidth management and improved application responsiveness.
What type of high bandwidth traffic is often prohibited by a corporate policy to reduce network load?
Video traffic
Video traffic can consume significant bandwidth, impacting overall network performance.
How can a policy to block video traffic be enforced?
Using ACLs (Access Control Lists)
ACLs can specify which types of traffic are allowed or denied on a network.
What is traffic flow control?
A corporate policy that requires routing protocol traffic to be limited to certain links only.
Traffic flow control helps manage network efficiency and security.
How can a corporate policy be implemented to control routing protocol traffic?
Using ACLs to restrict the delivery of routing updates to only those that come from a known source.
ACLs (Access Control Lists) are used to enhance network security by defining permissions for traffic.
What is the basic level of security for network access?
Restricted access to authorized users only
This ensures that only individuals with permission can access sensitive information.
What does corporate policy demand regarding access to confidential networks?
Access must be restricted to authorized users only
This policy is crucial for protecting sensitive employee information.
How can a policy be enforced to limit access to specified networks?
Using Access Control Lists (ACLs)
ACLs are used to define which users or systems are granted or denied access to specific resources.
What does corporate policy require regarding network traffic?
Certain traffic, such as email, must be permitted while other traffic, like Telnet access, must be denied.
This reflects the need to control access and protect network integrity.
How can a policy be implemented to filter traffic by type?
Using ACLs (Access Control Lists) to filter traffic.
ACLs are a set of rules that determine what traffic is allowed or denied on a network.
True or False: All traffic types should be allowed into a network in order to not impact usability.
False
Some traffic must be denied, such as Telnet access because it’s not secure.