Preview

GLOBAL DISTRIBUTION INC. Information Security Policy

Good Essays
Open Document
Open Document
1110 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
GLOBAL DISTRIBUTION INC. Information Security Policy
Access List Configuration Facts
Configuring access lists involves two general steps:
1. Create the list and list entries with the access-list command.
2. Apply the list to a specific interface or line.
Use the ip access-group command to apply the list to an interface.
Use the access-class command to apply the list to a line.
When constructing access list statements, keep in mind the following:
The access list statement includes the access list number. The type of list (standard or extended) is indicated by the access list number. Use the following number ranges to define the access list:
1-99 = Standard IP access lists
100-199 = Extended IP access lists
A single access list can include multiple access list statements. The access list number groups all statements into the same access list.
List statements include an action, either permit or deny.
To identify a host address in the access list statement, use the following formats:
n.n.n.n
n.n.n.n 0.0.0.0
OR host n.n.n.n
Where n.n.n.n is the IP address of the host.
To identify a network address, use the format:
n.n.n.n w.w.w.w
Where n.n.n.n is the subnet address and w.w.w.w is the wildcard mask.
Enter access list statements in order, with the most restrictive statements at the top. Traffic is matched to access list statements in the order they appear in the list. If the traffic matches a statement high in the list, subsequent statements will not be applied to the traffic.
Each access list has an implicit deny any statement at the end of the access list. Your access list must contain at least one allow statement, or no traffic will be allowed.
When you remove an access list statement, the entire access list is deleted. Use Notepad or another text editor to construct and modify access lists, then paste the list into the router console.
A single access list can be applied to multiple interfaces.
Extended access lists include a protocol designation (such as IP, TCP, or UDP). Use IP to match any

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Appendix A: All Rules and SummariesAdministrationEXEC Passwords Not Using Type 5 Encryption (1 note)User Account Not At Level 1 (2 notes)Route Maps and ACLsDeny All ACL (1 warning)System LoggingACL Deny Statement Not Logged (1 note)…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20 percent while the warehouse-shipping rate increased by 10 percent, and the overall profit has increased by a modest amount of 0.005 percent for the first reporting period.…

    • 1078 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    |MAC address filtering |refers to a security access |While the restriction of network access|While giving a wireless |…

    • 572 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Tipton, H. F., & Krause, M. (n.d, n.d n.d). Access Control Principles and Objectives. Retrieved November 29, 2013, from cccure.org: https://www.cccure.org/Documents/HISM/003-006.html…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    4. List at least three different types of access control permissions you can enable for…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    2) Access Control Matrix: A table specifying which portions of the system users are permitted to access. Compatibility tests utilize a(n) ________, which is a list of authorized users, programs, and data files the users are authorized to access or manipulate.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    IT-241 Appendix G

    • 369 Words
    • 2 Pages

    Only allows access to a device if its MAC address matches that of a pre-approved list on the router.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 6

    • 252 Words
    • 2 Pages

    4. Through command window determine the cause of the network connection loss using the IP configuration. Next renew the connection lost.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The type of access controls and permissions that are probably configured are Modify , Read or Full control.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Unit 18 - Database P1, M1

    • 995 Words
    • 4 Pages

    MS Access is a database management system design by Microsoft. It offers user four important objects they are:…

    • 995 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Ilab Instructions

    • 2258 Words
    • 10 Pages

    You will then open an existing Access database to explore database objects and to experiment with simple data manipulation using filters and sorts and to begin elementary work with relationships.…

    • 2258 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    Access Control Lists are used by OS’s such as Windows and UNIX. An ACL is a table that informs the OS of each users access rights to an object within the system, the object could be a program, a single file or a folder. Although ACL’s do the same task in a similar way, the different OS’s each have a different way of carrying it out.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    ACL 9 Tutorial 4

    • 568 Words
    • 3 Pages

    These tutorials use data tables stored in the Sample Project.acl that is automatically installed with ACL. Open the sample project and click on the appropriate table to perform the tutorial. The name of the table is indicated in bold type prior to each section in the tutorial (e.g. AP TRANS).…

    • 568 Words
    • 3 Pages
    Satisfactory Essays

Related Topics