ACL Definition: ACLs are a set of rules used to control traffic flow based on packet header information, typically for filtering access to networks.
Packet Filtering: Can be done at Layer 3 (network layer) and Layer 4 (transport layer) to allow or block traffic based on IP addresses, protocols, and ports.
Types of ACLs:
Numbered ACLs: Range from 1-99 for standard ACLs and 100-199 for extended ACLs.
Named ACLs: Easier to manage and describe; recommended for most configurations.
Definition: Wildcard masks are used to define which parts of an IP address to match when filtering.
For example, a wildcard mask 0.0.0.255
applied to the network 192.168.3.0/24
would match the entire network except for the last octet.
Calculation: A wildcard mask is derived by subtracting the subnet mask from 255.255.255.255
.
Wildcard Mask Keywords:
host (matches a single host)
any (matches any IP address).
Standard ACLs: Filter based on source IP address.
Command example: access-list 1 permit 192.168.1.0 0.0.0.255
Extended ACLs: Provide more flexibility, filtering based on source and destination IPs, protocols (TCP/UDP), ports, etc.
Command example: access-list 100 permit tcp 192.168.1.0 0.0.0.255 any eq 80
Named ACLs: Created using ip access-list
followed by the ACL name, allowing for easier management.
Modify ACLs: Use sequence numbers or text editors to adjust ACL configurations. Sequence numbers can be assigned automatically when ACEs are entered, and changes can be made with specific commands like no [sequence-number]
.
Implementing ACLs: Apply ACLs to interfaces using ip access-group
for incoming or outgoing traffic filtering.
Spoofing Protection: Prevent spoofed IP addresses from entering the network by filtering known dangerous address ranges.
ICMP and SNMP Mitigation: Block unnecessary ICMP messages and SNMP requests to reduce potential attack surfaces.
Traffic Filtering for Specific Services: Only allow necessary services (like DNS, FTP) while blocking others to limit exposure.
IPv6 ACLs: Similar to IPv4 ACLs but with some differences. They must be named, and filtering can be done based on IPv6-specific parameters.
Command example: ipv6 access-list [name] permit ipv6 2001:db8::/32 any
Packet Filtering (Stateless) Firewalls: Perform filtering based on basic criteria like source and destination IP addresses and ports. They are generally fast but vulnerable to spoofing and cannot handle dynamic sessions.
Stateful Firewalls: Track the state of connections and provide more robust security by ensuring that packets belong to valid connections.
Application Gateway (Proxy) Firewalls: Operate at multiple layers (3-7), filtering traffic at the application layer. They provide deeper inspection of traffic but can impact network performance due to more intensive processing.
Next-Generation Firewalls (NGFW): Combine the capabilities of stateful firewalls with integrated intrusion prevention, application awareness, and more advanced features to address evolving threats.
Packet Filtering Firewalls:
Benefits: Low cost, easy to deploy, minimal impact on performance.
Limitations: Susceptible to IP spoofing, stateless, cannot inspect fragmented packets.
Stateful Firewalls: More secure than stateless firewalls by keeping track of connections, but more resource-intensive.
Common Architectures:
Private and Public Networks: A simple design where firewalls protect the boundary between trusted (internal) and untrusted (external) networks.
DMZ (Demilitarized Zone): A middle ground between the internal and external networks, usually hosting services like web servers that need external access but should be isolated from the internal network.
Zone-Based Policy (ZPF): Allows more flexible and granular control by grouping interfaces into zones. Policies are then applied between zones to enforce security.
Combining Multiple Firewalls: Layers of defense (such as network core security, perimeter security, endpoint security) help address different threat vectors.
Firewall Best Practices:
Position firewalls at security boundaries to control traffic flow.
Deny all traffic by default, then permit only necessary services.
Regularly monitor firewall logs and ensure physical security of devices.
Network Traffic: Observe and analyze how traffic flows through a network, and how this changes based on firewall placement.
Firewalls in Action: A good understanding of where to place firewalls in a network and how to configure rules for filtering traffic efficiently is essential.
WK 5 Consolidated Notes
ACL Definition: ACLs are a set of rules used to control traffic flow based on packet header information, typically for filtering access to networks.
Packet Filtering: Can be done at Layer 3 (network layer) and Layer 4 (transport layer) to allow or block traffic based on IP addresses, protocols, and ports.
Types of ACLs:
Numbered ACLs: Range from 1-99 for standard ACLs and 100-199 for extended ACLs.
Named ACLs: Easier to manage and describe; recommended for most configurations.
Definition: Wildcard masks are used to define which parts of an IP address to match when filtering.
For example, a wildcard mask 0.0.0.255
applied to the network 192.168.3.0/24
would match the entire network except for the last octet.
Calculation: A wildcard mask is derived by subtracting the subnet mask from 255.255.255.255
.
Wildcard Mask Keywords:
host (matches a single host)
any (matches any IP address).
Standard ACLs: Filter based on source IP address.
Command example: access-list 1 permit 192.168.1.0 0.0.0.255
Extended ACLs: Provide more flexibility, filtering based on source and destination IPs, protocols (TCP/UDP), ports, etc.
Command example: access-list 100 permit tcp 192.168.1.0 0.0.0.255 any eq 80
Named ACLs: Created using ip access-list
followed by the ACL name, allowing for easier management.
Modify ACLs: Use sequence numbers or text editors to adjust ACL configurations. Sequence numbers can be assigned automatically when ACEs are entered, and changes can be made with specific commands like no [sequence-number]
.
Implementing ACLs: Apply ACLs to interfaces using ip access-group
for incoming or outgoing traffic filtering.
Spoofing Protection: Prevent spoofed IP addresses from entering the network by filtering known dangerous address ranges.
ICMP and SNMP Mitigation: Block unnecessary ICMP messages and SNMP requests to reduce potential attack surfaces.
Traffic Filtering for Specific Services: Only allow necessary services (like DNS, FTP) while blocking others to limit exposure.
IPv6 ACLs: Similar to IPv4 ACLs but with some differences. They must be named, and filtering can be done based on IPv6-specific parameters.
Command example: ipv6 access-list [name] permit ipv6 2001:db8::/32 any
Packet Filtering (Stateless) Firewalls: Perform filtering based on basic criteria like source and destination IP addresses and ports. They are generally fast but vulnerable to spoofing and cannot handle dynamic sessions.
Stateful Firewalls: Track the state of connections and provide more robust security by ensuring that packets belong to valid connections.
Application Gateway (Proxy) Firewalls: Operate at multiple layers (3-7), filtering traffic at the application layer. They provide deeper inspection of traffic but can impact network performance due to more intensive processing.
Next-Generation Firewalls (NGFW): Combine the capabilities of stateful firewalls with integrated intrusion prevention, application awareness, and more advanced features to address evolving threats.
Packet Filtering Firewalls:
Benefits: Low cost, easy to deploy, minimal impact on performance.
Limitations: Susceptible to IP spoofing, stateless, cannot inspect fragmented packets.
Stateful Firewalls: More secure than stateless firewalls by keeping track of connections, but more resource-intensive.
Common Architectures:
Private and Public Networks: A simple design where firewalls protect the boundary between trusted (internal) and untrusted (external) networks.
DMZ (Demilitarized Zone): A middle ground between the internal and external networks, usually hosting services like web servers that need external access but should be isolated from the internal network.
Zone-Based Policy (ZPF): Allows more flexible and granular control by grouping interfaces into zones. Policies are then applied between zones to enforce security.
Combining Multiple Firewalls: Layers of defense (such as network core security, perimeter security, endpoint security) help address different threat vectors.
Firewall Best Practices:
Position firewalls at security boundaries to control traffic flow.
Deny all traffic by default, then permit only necessary services.
Regularly monitor firewall logs and ensure physical security of devices.
Network Traffic: Observe and analyze how traffic flows through a network, and how this changes based on firewall placement.
Firewalls in Action: A good understanding of where to place firewalls in a network and how to configure rules for filtering traffic efficiently is essential.