Access Control List Flashcards

(8 cards)

1
Q

Access Control Lists (ACLs)

A

■ A list of permissions associated with a given system or network resource
■ Can be applied to routers, layer three switches, or firewalls
■ Contain rules that are applied based on IP addresses, ports, or applications
■ Processed from top to bottom
● Specific rules should be at the top
● Generic rules should be at the bottom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Blocking Strategies

A

■ Block incoming requests from internal or private loopback addresses, multicast IP ranges, and experimental ranges
■ Block incoming requests from protocols that should only be used locally (e.g., ICMP, DHCP, OSPF, SMB)
■ Configure IPv6 to block all traffic or allow only authorized hosts and ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explicit Allow

A

■ Specified in ACLs using “permit” statements
■ Each “permit” statement explicitly allows a specific type of traffic from a specific source to a specific destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explicit Deny

A

■ Statement used to block specific types of traffic
■ Created by changing the “permit” keyword to “deny” in an ACL rule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Implicit Deny

A

■ Statement that is automatically applied at the end of an ACL if no explicit deny statements are present
■ Blocks all traffic that is not explicitly permitted by “permit” statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ACL Basics

A

Remember 0.0.0.255 really means the subnet mask is 255.255.255.0. Allowing for 254 usable ip addresses, 256 in total

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Impact on Security

A

■ Explicit allow statements ensure that only specified traffic is allowed, increasing security by minimizing unintended access
■ Explicit deny statements allow for precise control over which traffic is blocked
■ Implicit deny provides a default block for all traffic not explicitly permitted, adding an extra layer of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Role-Based Access Control

A

■ Defines privileges and responsibilities of administrative users
■ Users are grouped based on roles or job functions
■ Permissions are assigned based on roles (e.g., configuring firewalls, adding/removing users)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly