Must be at least 250 each
During the course we spent a large block of time learning about Access Control Lists (ACLs). One of the important aspects of ACLs is the ability to protect your BGP implementations. With that in mind, for this post you are going to translate into English what the following ACL is doing and why it might be important. Be sure to answer questions such as, Where would you apply an ACL like this? Under what circumstances would this ACL be needed? What is each line actually doing? Do we need the “deny” Access Control Entry (ACE)? Why do I need the “permit ip any any” at the end – doesn’t the “deny any any” override it? Here is the ACL:
permit tcp host 169.254.100.1 host 169.254.100.2 eq bgp
permit tcp host 169.254.100.1 eq bgp host 169.254.100.2
deny tcp any any eq bgp
deny tcp any eq bgp any
permit ip any any
Post Requirements: Your posts must use at least two (2) sources of information (properly cited using the American Psychological Association (APA) citation guidelines) in addition to the “hypermedia” already provided to you as part of the course. Your post must consist of a minimum of 250 words and a maximum of 500 words. Technical accuracy, proper in-text citations, and depth of coverage all play a critical role in your overall score.
You must start a thread before you can read and reply to other threads
Chapter #11(NetAcad CCNA) in the online text provided a significant amount of coverage around the different types of policies that should exist with respect to network security. Your task for this discussion topic is to compare and contrast the three (3) policies that Chapter #11 focused on: Governing, Technical, and End User. You should focus on answering questions as to whether or not there is overlap with these policies? Do you need all three (3) or could you consolidate them? If so, what would that look like? What are the strengths and weaknesses of each type of policy? What did Chapter #11 overlook, if anything, with respect to each of the different policies?