Discussing access control lists in detail

Assignment Help Computer Engineering
Reference no: EM132195784

Question: 1. This week we open up discussing Access Control Lists(ACLs). These important list help to provide more control with routing updates or packets as they move throughout the network. They provide an extra layer of security to ensure traffic is controlled as it goes in and out of the router. Security is the number reason to use an ACL.

As packets come in or out the router, the ACL processes in a line by line form from top to bottom of the list. Each line is testing the packets to confirm a "match." If there is a match, a "permit" or "deny" rule is applied. When a "match" occurs, no further rules are checked.

Class, in your own words and based on what you have read, what happens if there is no match?

2. Chapter 26 talks about extended access control list (ACL). This form of an ACL provides higher control over how traffic is prioritized vs. standard ACLs that look solely at the source IP. Extended ACLs can use a variety of parameters from source/destination IP, to protocol and port. One thing to remember about extended ACLs is the placement and direction which is critically important.

Class, where should an extended ACLs be placed close to and why?

Each answer should be 120 to 160 words. Please do not provide an answer that has been previously used on this or any other site.

Reference no: EM132195784

Questions Cloud

Define one or more business decisions it is making : BUS523 -Description of its key business(es), organization structure, major processes, and significant challenges/problems/opportunities
What are the functions and forms of inventory : What are the functions and forms of inventory? Select one of the functions or forms and describe it in terms of real-world supply chain, considering management,
Summarize the law that was used to support the ruling : In 750-1,000-words, summarize the following components related to the case: The law that was used to support the ruling
Child being born with fetal alcohol syndrome : For long time mothers have been warned about drinking any amount of alcohol while pregnant for fear of their child being born with Fetal Alcohol Syndrome (FAS)
Discussing access control lists in detail : This week we open up discussing Access Control Lists(ACLs). These important list help to provide more control with routing updates or packets as they move.
Large multinational corporation experiences severe data : A large multinational corporation experiences a severe data breach that results in the loss of customer data for nearly 250 million customers.
What are the modes of transportation : What are the modes of transportation? Compare and contrast two alternative modes of transportation for this particular product.
Prepare a draft of an organisational development plan : A list of the stakeholders that need to be consulted, with an outline of what their needs and competing demands may potentially include.
Summarize the curriculum history of the united states : Research and briefly summarize the curriculum history of the United States. What are the major movements in the curriculum history

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a web app that helps a player quickly calculate

The user is presented with a form that asks them to enter their jersey number, their number of completions and the number of attempts.

  Write cloud formation to deploy this minimal application

Write Terraform or cloud formation or scripts or configurations to deploy this minimal application on AWS using Linux.

  Design a java applet that draws an oval and a rectangle

Class Graphics contains method drawOval, which takes as arguments the same four arguments as process  drawRect. The arguments for method drawOval specify "bounding box for the oval - the sides of bounding box are the boundaries of the oval.

  Describe the differences between stubs and drivers

Describe the differences between stubs and drivers. Briefly describe a test plan for the telephone directory program described.

  Complete a work package in a project

Think of at one thing you must do this week. For each part of the five parts of the definition of an activity described in Section 8.1, CPM4e.

  Discuss the systems analysis and design project

The systems analysis and design project that you choose for the INFO 2401 should meet the following requirements

  Which would substitute a string for a replacement

How would I write down a shell script, change-lines, which will substitute a string for a replacement string for each occurance of the string in files specified? The original file will be saved, with the similar filename with the.

  What are the long-term problems

Business requirements are enforced by implementing database constraints on column and stables.What are the long-term problems?

  Write an application that stores five different department

Write an application that stores at least five different department and supervisor names in a two-dimensional array. Allow the user to enter a department name.

  What questions do you still have about the can bus

What questions do you still have about the synchronous peripheral interface?

  Examine the ajax model in relation to good software design

examine the AJAX model in relation to good software design, and the essence of the quoted question. Will AJAX further promote the development of Web based software, or is it just another fad.

  What criteria does your new strategy perform better or worse

Under what criteria does your new strategy perform better or worse than the strategy from this chapter?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd