Preview

Sec 572 Week 2 solution Essay Example

Satisfactory Essays
Open Document
Open Document
521 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sec 572 Week 2 solution Essay Example
Student Name ___________ Date 09/12/13

SEC572 Security Demands Lab Document

Task 1 – Verify Initial Connectivity between Router and Hosts

Select the Task 1 commands in the Virtual CLI using the mouse and click on the Copy button. Use V to paste commands and the output into the textbox provided below:

Select Identify Unreachable interfaces from the Flow Analysis menu. Select For all nodes in the Choose Nodes dialog and click Compute. Capture the Compute dialog window that says "All demands are routable" into this lab document below:

All demands are routable.

Task 2 – Flow Analysis Security Demands Configuration

Click Violations to see what security violation has occurred. As expected, the DENY rule has been violated because no ACL has been applied to the network. Use to Capture the Violations Report window. Use V to paste the window in the space provided below:

Click on the Destination Reachable link for more information. The Security Demand Routing page shows the path taken for the traffic that should have been denied. Use to capture the Security Demand Routing Report window and paste it into this lab document below with V.

Task 3 - Apply the ACL & Verify Security Demands Compliance

If you are applying an extended ACL to deny specific packets, where should you apply it, as close to the source as possible or as close to the destination as possible? Explain your answer.

I am sure the extended always go as close as the source as possible, remember that in a standard ACL we define the source and it is placed as close to the destination as possible, because we do not specify a destination.

Extended ACL's we specify a source and destination address so they are place close to source

Standard source - placed as close to destination
Extended source and destination - place as close to source

Apply the access-list to the F0/0 interface for all inbound traffic. From Global configuration

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2640 Lab 7 SC

    • 2232 Words
    • 17 Pages

    The company’s home office in Gadsden (GAD) provides services to branch offices such as the Birmingham (BHM) office. These offices have some minor security and performance concerns. You will implement standard ACLs as a simple and effective tool to control traffic based…

    • 2232 Words
    • 17 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Acc 303 Final Exam

    • 385 Words
    • 2 Pages

    It is located in the sample.acl document available with the educational version of ACL for Windows 8.0. The ar file is actually an invoice file that contains several related records as designated by the Trans Type…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    1. DACL (Discretionary access control list) allows or denies trustees access to computer and network resources. It identifies group permissions and determines whether to allow access a securable object or process.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    MC 3080

    • 1177 Words
    • 5 Pages

    If the incidental restriction is no greater than essential than the furthers of that interest…

    • 1177 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Ethical Procedures

    • 980 Words
    • 4 Pages

    be a new situation where a new addendum is required to protect a subject, or to…

    • 980 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Policy: Network Access and Authentication Policy Created: 1/12/2014 Section of: Corporate Security Policies Target Audience: Technical CONFIDENTIAL Page: 1 of 5…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    As with any other major purchase, to be satisfied, a person must invest time and determination to identify the best opportunity before handing over his or her hard-earned cash. You haven’t divulged the particulars of your situation or budget, but there are some general guidelines to keep in mind. In this paper, the individual will discuss the original issues, initial solution, and the critical examination of the best solution. Also do an evaluation of the argument and revise the argument to come up with a better solution to the problem (University of Phoenix, 2013). As a final point I will refine the solution with an implementation plan and the come up with a final solution to the problem.…

    • 744 Words
    • 3 Pages
    Good Essays
  • Good Essays

    If the import of an item was restricted before coming into effect of this Order or if such restriction has been made effective due to the inclusion of the item in the Control List annexed to this Order or for imposition of any other condition such restriction shall be subject to the following conditions :--…

    • 2818 Words
    • 12 Pages
    Good Essays
  • Good Essays

    File Management

    • 572 Words
    • 2 Pages

    Several modern Unix-based operating systems are supporting protection schemes called Access Control Lists or ACLs. Unix-based systems include big named operating systems such as, Linux, FreeBSD, and Solaris. Implementing this type of protection scheme provides controlled access to certain files, guaranteeing the availability and integrity of the files is always maintained. Suppose your company had an organization that supports 5000 users. Your company had a file that 10 users of the company were not allowed access to the file. What…

    • 572 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In this assignment, you examine a process that links polygons and circles. You will reach some quantitative conclusions about their respective areas and the relationship between the two.…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Since 1970s, RBAC is considered to be the standard approach for access control models. But ABAC being considered as a most prevailing mechanism for the future. And both RBAC and ABAC have their own weaknesses and benefits. Let's discuss their differences briefly on various aspects.…

    • 1572 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Personally working for bureaucracy would affect my orientations to life in a positive way if the job was providing the human part to a job. Things such as child care this would be a huge plus for anyone in my position who has to pay for high cost childcare without the ease of checking in on your childcare during on breaks and lunch hours. It is referenced in our book that “this eases the strain on a parent, for while at work the can keep in touch with their own children.” This type of bureaucracy would work best to my advantage because I would be able to overall work better than in a more formal work environment. If I have job provided childcare I would be able to work longer productive days knowing my child is walking distance away. I would not be confined to hours of a childcare provider. I would be able to come in a hour earlier and stay an hour later with the ease of traveling to a childcare program or always worrying about my child. For a mother this takes a heavy burden off the shoulders of a working mom.…

    • 536 Words
    • 3 Pages
    Satisfactory Essays