Enterprise Networking Security and Automation
Enterprise Networking Security and Automation
Cisco Press
ii Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
Technical Editor
Warning and Disclaimer Bob Vachon
Editorial Assistant
This book is designed to provide information about the Cisco Networking Cindy Teeters
Academy Enterprise Networking, Security, and Automation (CCNAv7) course.
Every effort has been made to make this book as complete and as accurate as Cover Designer
Chuti Prasertsith
possible, but no warranty or fitness is implied.
Composition
The information is provided on an “as is” basis. The authors, Cisco Press, and codeMantra
Cisco Systems, Inc. shall have neither liability nor responsibility to any person
or entity with respect to any loss or damages arising from the information Indexer
Ken Johnson
contained in this book or from the use of the discs or programs that may
accompany it. Proofreader
Betty Pessagno
The opinions expressed in this book belong to the author and are not necessar-
ily those of Cisco Systems, Inc.
iii
Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been appropri-
ately capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information.
Use of a term in this book should not be regarded as affecting the validity of any trademark or service
mark.
Special Sales
For information about buying this title in bulk quantities, or for special sales opportunities (which
may include electronic versions; custom cover designs; and content particular to your business,
training goals, marketing focus, or branding interests), please contact our corporate sales department
at [email protected] or (800) 382-3419.
For government sales inquiries, please contact [email protected].
For questions about sales outside the U.S., please contact [email protected].
Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each
book is crafted with care and precision, undergoing rigorous development that involves the unique
expertise of members from the professional technical community.
Readers’ feedback is a natural continuation of this process. If you have any comments regarding how we
could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact
us through email at [email protected]. Please make sure to include the book title and ISBN in
your message.
We greatly appreciate your assistance.
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks,
go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does
not imply a partnership relationship between Cisco and any other company. (1110R)
iv Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
Contents at a Glance
Introduction xxxi
Glossary 677
Index 715
vi Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
Contents
Introduction xxxi
R1 DROTHER 52
R2 BDR 53
R3 DR 53
Verify DR/BDR Adjacencies (2.3.5) 54
R1 Adjacencies 55
R2 Adjacencies 55
R3 Adjacencies 56
Default DR/BDR Election Process (2.3.6) 56
DR Failure and Recovery (2.3.7) 58
R3 Fails 58
R3 Rejoins Network 59
R4 Joins Network 59
R2 Fails 59
The ip ospf priority Command (2.3.8) 61
Configure OSPF Priority (2.3.9) 61
Modify Single-Area OSPFv2 (2.4) 63
Cisco OSPF Cost Metric (2.4.1) 63
Adjust the Reference Bandwidth (2.4.2) 64
OSPF Accumulates Costs (2.4.3) 66
Manually Set OSPF Cost Value (2.4.4) 67
Test Failover to Backup Route (2.4.5) 69
Hello Packet Intervals (2.4.7) 69
Verify Hello and Dead Intervals (2.4.8) 70
Modify OSPFv2 Intervals (2.4.9) 71
Default Route Propagation (2.5) 73
Propagate a Default Static Route in OSPFv2 (2.5.1) 74
Verify the Propagated Default Route (2.5.2) 75
Verify Single-Area OSPFv2 (2.6) 77
Verify OSPF Neighbors (2.6.1) 77
Verify OSPF Protocol Settings (2.6.2) 79
Verify OSPF Process Information (2.6.3) 80
Verify OSPF Interface Settings (2.6.4) 81
Summary (2.7) 83
OSPF Router ID 83
Point-to-Point OSPF Networks 83
OSPF Network Types 84
Modify Single-Area OSPFv2 85
ix
NTP 443
SNMP 444
Syslog 444
Router and Switch File Maintenance 445
IOS Image Management 446
Practice 446
Check Your Understanding Questions 447
S2 472
S3 473
Limiting the Size of Failure Domains 474
Switch Block Deployment 474
Increase Bandwidth (11.2.4) 474
Expand the Access Layer (11.2.5) 475
Tune Routing Protocols (11.2.6) 476
Switch Hardware (11.3) 477
Switch Platforms (11.3.1) 477
Campus LAN Switches 477
Cloud-Managed Switches 478
Data Center Switches 478
Service Provider Switches 479
Virtual Networking 479
Switch Form Factors (11.3.2) 479
Fixed Configuration Switches 480
Modular Configuration Switches 480
Stackable Configuration Switches 481
Thickness 481
Port Density (11.3.3) 482
Forwarding Rates (11.3.4) 483
Power over Ethernet (11.3.5) 484
Switch 484
IP Phone 484
WAP 485
Cisco Catalyst 2960-C 485
Multilayer Switching (11.3.6) 485
Business Considerations for Switch Selection (11.3.7) 486
Router Hardware (11.4) 487
Router Requirements (11.4.1) 487
Cisco Routers (11.4.2) 488
Branch Routers 488
Network Edge Routers 488
Service Provider Routers 489
Industrial 490
Router Form Factors (11.4.3) 490
Cisco 900 Series 490
ASR 9000 and 1000 Series 490
5500 Series 491
Cisco 800 492
Fixed Configuration or Modular 492
xxiv Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
Glossary 677
Index 715
xxx Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
Introduction
Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
is the official supplemental textbook for the Cisco Network Academy CCNA Enter-
prise Networking, Security, and Automation version 7 course. Cisco Networking
Academy is a comprehensive program that delivers information technology skills to
students around the world. The curriculum emphasizes real-world practical applica-
tion and provides opportunities to gain the skills and hands-on experience needed to
design, install, operate, and maintain networks in small to medium-sized businesses
as well as enterprise and service provider environments.
This book provides a ready reference that explains the same networking concepts,
technologies, protocols, and devices as the online curriculum. This book emphasizes
key topics, terms, and activities and provides some alternative explanations and
examples to supplement the course. You can use the online curriculum as directed
by your instructor and then use this Companion Guide’s study tools to help solidify
your understanding of all the topics.
Book Features
The educational features of this book focus on supporting topic coverage, readabil-
ity, and practice of the course material to facilitate your full understanding of the
course material.
Topic Coverage
The following list gives you a thorough overview of the features provided in each
chapter so that you can make constructive use of your study time:
■■ Objectives: Listed at the beginning of each chapter, the objectives reference the
core concepts covered in the chapter. The objectives match the objectives listed
in the corresponding chapters of the online curriculum; however, the question
xxxii Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
format in the Companion Guide encourages you to think about finding the
answers as you read the chapter.
■■ Notes: These are short sidebars that point out interesting facts, timesaving meth-
ods, and important safety issues.
■■ Summary: At the end of each chapter is a summary of the chapter’s key con-
cepts. It provides a synopsis of the chapter and serves as a study aid.
■■ Practice: At the end of each chapter is a full list of all the labs, class activities,
and Packet Tracer activities to refer to at study time.
Readability
The following features are provided to help you understand networking vocabulary:
■■ Key terms: Each chapter begins with a list of key terms, along with a page-num-
ber reference to find the term used inside the chapter. The terms are listed in the
order in which they are explained in the chapter. This handy reference allows you
to find a term, flip to the page where the term appears, and see the term used in
context. The Glossary defines all the key terms.
■■ Glossary: This book contains an all-new Glossary that defines more than 1000
terms.
Practice
Practice makes perfect. This Companion Guide offers you ample opportunities to
put what you learn into practice. You will find the following features valuable and
effective in reinforcing the instruction that you receive:
■■ Check Your Understanding questions and answer key: Review questions are
presented at the end of each chapter as a self-assessment tool. These questions
match the style of questions in the online course. Appendix A, “Answers to the
Check Your Understanding Questions,” provides an answer key to all the ques-
Interactive
tions and includes an explanation of each answer.
Graphic ■■ Labs and activities: Throughout each chapter, you are directed back to the
online course to take advantage of the activities provided to reinforce concepts.
Video In addition, at the end of each chapter is a “Practice” section that lists all the labs
and activities to provide practice with the topics introduced in this chapter.
■■ Page references to online course: After most headings is a number in parentheses—
for example, (1.1.2). This number refers to the page number in the online course
so that you can easily jump to that spot online to view a video, practice an activ-
ity, perform a lab, or review a topic.
xxxiii
■■ Chapter 7, “WAN Concepts”: This chapter explains how WAN access technolo-
gies can be used to satisfy business requirements. It includes descriptions of the
purpose of a WAN, how WANs operate, traditional WAN connectivity options,
modern WAN connectivity options, and internet-based connectivity options.
■■ Chapter 8, “VPN and IPsec Concepts”: This chapter explains how VPNs and
IPsec are used to secure communications. It includes descriptions of different
types of VPNs and an explanation of how the IPsec framework is used to secure
network traffic.
■■ Chapter 9, “QoS Concepts”: This chapter explains how network devices use
QoS to prioritize network traffic. It includes descriptions of network transmis-
sion characteristics, queuing algorithms, different queueing models, and QoS
implementation techniques.
■■ Chapter 10, “Network Management”: This chapter explains how to use a vari-
ety of protocols and techniques to manage a network, including CDP, LLDP,
NTP, SNMP, and Syslog. In addition, this chapter discusses the management of
configuration files and IOS images.
■■ Chapter 11, “Network Design”: This chapter explains the characteristics of
scalable networks. It includes descriptions of network convergence, consider-
ations for designing scalable networks, and switch and router hardware.
■■ Chapter 12, “Network Troubleshooting”: This chapter describes how to trou-
bleshoot networks. It includes explanations of network documentation, trouble-
shooting methods, and troubleshooting tools. The chapter also demonstrates
how to troubleshoot symptoms and causes of network problems using a layered
approach.
■■ Chapter 13, “Network Virtualization”: This chapter describes the purpose and
characteristics of network virtualization. It includes descriptions of cloud com-
puting, the importance of virtualization, network device virtualization, software-
defined network, and controllers used in network programming.
■■ Chapter 14, “Network Automation”: This chapter explains network automation.
It includes descriptions of automation, data formats, APIs, REST, configuration
management tools, and Cisco DNA Center.
■■ Appendix A, “Answers to the ‘Check Your Understanding’ Questions”: This
appendix lists the answers to the questions in the “Check Your Understanding
Questions” section at the end of each chapter.
■■ Glossary: The Glossary provides definitions for all the key terms identified in
each chapter.
xxxv
Figure Credits
Figure 5-4, screenshot of Remote Access from PC1 © Tera Term Project
Figure 5-5, screenshot of Remote Access Attempt from PC2 © Tera Term Project
Figure 8-9, screenshot of Wireshark of Encapsulated Protocols © Wireshark
Figure 10-24, screenshot of Example of Using Tera Term to Backup a
Configuration © Tera Term Project
Figure 10-25, screenshot of Example of Using Tera Term to Send a
Configuration © Tera Term Project
Figure 12-16, screenshot of Wireshark Capture © Wireshark
Figure 13-1, screenshot of AWS Management Console © 2020, Amazon Web
Services, Inc
Figure 14-1, screenshot of HTML Example and Resulting Web Page © WHATWG
This page intentionally left blank
CHAPTER 4
ACL Concepts
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
■■ How do ACLs filter traffic? ■■ What are the differences between standard
and extended IPv4 ACLs?
■■ How do ACLs use wildcard masks?
■■ How do you create ACLs?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
access control entry (ACE) page 164 numbered ACL page 175
inbound ACL page 167 standard ACL page 175
outbound ACL page 167 extended ACL page 175
implicit deny page 167 named ACL page 176
wildcard mask page 168
164 Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
Introduction (4.0)
Say that you have arrived at your grandparents’ residence. It is a beautiful gated
community with walking paths and gardens. For the safety of the residents, no one is
permitted to get into the community without stopping at the gate and presenting the
guard with identification. You provide your ID, and the guard verifies that you are
expected as a visitor. He documents your information and lifts the gate. Imagine if
the guard had to do this for the many staff members who entered each day. The secu-
rity department has simplified this process by assigning a badge to each employee
that can be scanned to automatically raise the gate. You greet your grandparents,
who are anxiously awaiting you at the front desk. You all get back into the car to go
down the street for dinner. As you exit the parking lot, you must again stop and show
your identification so that the guard will lift the gate. Rules have been put in place
for all incoming and outgoing traffic.
Much like the guard in the gated community, an access control list (ACL) may be
configured to permit and deny network traffic passing through an interface. The
router compares the information within a packet against each access control entry
(ACE), in sequential order, to determine if the packet matches one of the ACEs. This
process is called packet filtering. Let’s learn more!
Note
ACEs are also commonly called ACL statements.
When network traffic passes through an interface configured with an ACL, the router com-
pares the information within the packet against each ACE, in sequential order, to determine
whether the packet matches one of the ACEs. This process is called packet filtering.
Several tasks performed by routers require the use of ACLs to identify traffic.
Table 4-1 lists some of these tasks and provides examples.
Task Example
Provide traffic flow ■■ A corporate policy requires that routing protocol traffic be limited
control to certain links only.
■■ A policy can be implemented using ACLs to restrict the delivery of
routing updates to only those that come from a known source.
Provide a basic ■■ Corporate policy demands that access to the human resources
level of security for network be restricted to authorized users only.
network access
■■ A policy can be enforced using ACLs to limit access to specified
networks.
Filter traffic based ■■ Corporate policy requires that email traffic be permitted into a
on traffic type network but that Telnet access be denied.
■■ A policy can be implemented using ACLs to filter traffic by type.
Screen hosts to ■■ Corporate policy requires that access to some file types (such as
permit or deny FTP or HTTP) be limited to user groups.
access to network
■■ A policy can be implemented using ACLs to filter user access to
services
services.
Provide priority to ■■ Corporate traffic specifies that voice traffic be forwarded as fast as
certain classes of possible to avoid any interruption.
network traffic
■■ A policy can be implemented using ACLs and QoS to identify
voice traffic and process it immediately.
Note
ACLs do not act on packets that originate from the router itself.
An inbound ACL filters packets before they are routed to the outbound interface.
An inbound ACL is efficient because it saves the overhead of routing lookups if the
packet is discarded. If a packet is permitted by the ACL, it is processed for routing.
Inbound ACLs are best used to filter packets when the network attached to an
inbound interface is the only source of packets that need to be examined.
An outbound ACL filters packets after they are routed, regardless of the inbound
interface. Incoming packets are routed to the outbound interface, and they are then
processed through the outbound ACL. Outbound ACLs are best used when the same
filter will be applied to packets coming from multiple inbound interfaces before
exiting the same outbound interface.
When an ACL is applied to an interface, it follows a specific operating procedure.
For example, here are the operational steps used when traffic has entered a router
interface with an inbound standard IPv4 ACL configured:
Step 1. The router extracts the source IPv4 address from the packet header.
Step 2. The router starts at the top of the ACL and compares the source IPv4
address to each ACE, in sequential order.
Step 3. When a match is made, the router carries out the instruction, either permit-
ting or denying the packet, and the remaining ACEs in the ACL, if any, are
not analyzed.
Step 4. If the source IPv4 address does not match any ACEs in the ACL, the packet
is discarded because there is an implicit deny ACE automatically applied
to all ACLs.
The last ACE statement of an ACL is always an implicit deny that blocks all traffic.
By default, this statement is automatically implied at the end of an ACL even though
it is hidden and not displayed in the configuration.
Note
An ACL must have at least one permit statement; otherwise, all traffic will be denied due to
the implicit deny ACE statement.
Table 4-2 lists some examples of wildcard masks and what they would match and
ignore.
Decimal Binary
The 0.0.0.0 wildcard mask stipulates that every bit must match exactly. Therefore,
when the ACE is processed, the wildcard mask will permit only the 192.168.1.1
address. The resulting ACE in ACL 10 would be access-list 10 permit 192.168.1.1
0.0.0.0.
Table 4-4 lists, in decimal and binary, the host IPv4 address, the wildcard mask, and
the permitted IPv4 addresses.
Decimal Binary
When the ACE is processed, the wildcard mask 0.0.0.255 permits all hosts in
the 192.168.1.0/24 network. The resulting ACE in ACL 10 would be access-list
10 permit 192.168.1.0 0.0.0.255.
Decimal Binary
The highlighted wildcard mask bits identify which bits of the IPv4 address must
match. When the ACE is processed, the wildcard mask 0.0.15.255 permits all hosts
in the 192.168.16.0/24 to 192.168.31.0/24 networks. The resulting ACE in ACL 10
would be access-list 10 permit 192.168.16.0 0.0.15.255.
Example 1
Say that you wanted an ACE in ACL 10 to permit access to all users in the
192.168.3.0/24 network. To calculate the wildcard mask, subtract the subnet mask
(that is, 255.255.255.0) from 255.255.255.255, as shown in Table 4-6.
The solution produces the wildcard mask 0.0.0.255. Therefore, the ACE would be
access-list 10 permit 192.168.3.0 0.0.0.255.
Example 2
In this example, say that you wanted an ACE in ACL 10 to permit network access
for the 14 users in the subnet 192.168.3.32/28. Subtract the subnet (that is,
255.255.255.240) from 255.255.255.255, as shown in Table 4-7.
This solution produces the wildcard mask 0.0.0.15. Therefore, the ACE would be
access-list 10 permit 192.168.3.32 0.0.0.15.
Example 3
In this example, say that you needed an ACE in ACL 10 to permit only net-
works 192.168.10.0 and 192.168.11.0. These two networks could be summarized
as 192.168.10.0/23, which is a subnet mask of 255.255.254.0. Again, you subtract
255.255.254.0 subnet mask from 255.255.255.255, as shown in Table 4-8.
This solution produces the wildcard mask 0.0.1.255. Therefore, the ACE would be
access-list 10 permit 192.168.10.0 0.0.1.255.
Example 4
Consider an example in which you need an ACL number 10 to match networks in the
range 192.168.16.0/24 to 192.168.31.0/24. This network range could be summarized
as 192.168.16.0/20, which is a subnet mask of 255.255.240.0. Therefore, subtract
255.255.240.0 subnet mask from 255.255.255.255, as shown in Table 4-9.
This solution produces the wildcard mask 0.0.15.255. Therefore, the ACE would be
access-list 10 permit 192.168.16.0 0.0.15.255.
In the command output in Example 4-1, two ACLs are configured. The ACL 10 ACE
permits only the 192.168.10.10 host, and the ACL 11 ACE permits all hosts.
Alternatively, the keywords host and any could be used to replace the highlighted
output. The commands in Example 4-2 accomplishes the same task as the commands
in Example 4-1.
Chapter 4: ACL Concepts 173
Say that R1 has two dual-stacked interfaces that need to have inbound and outbound
IPv4 and IPv6 ACLs applied. As shown in Figure 4-4, R1 could have up to 8 ACLs
configured and applied to interfaces.
In this case, each interface would have four ACLs: two ACLs for IPv4 and two ACLs
for IPv6. For each protocol, one ACL is for inbound traffic and one for outbound
traffic.
Note
ACLs do not have to be configured in both directions. The number of ACLs and their direc-
tion applied to the interface will depend on the security policy of the organization.
Guideline Benefit
Base ACLs on the organization’s security This will ensure that you implement
policies. organizational security guidelines.
Write out what you want an ACL to do. This will help you avoid inadvertently creating
potential access problems.
Use a text editor to create, edit, and save This will help you create a library of reusable
all your ACLs. ACLs.
Document ACLs by using the remark This will help you (and others) understand the
command. purpose of an ACE.
Test ACLs on a development network before This will help you avoid costly errors.
implementing them on a production network.
For example, Example 4-3 shows how to create a standard ACL. In this example,
ACL 10 permits hosts on the source network 192.168.10.0/24. Because of the implied
“deny any” at the end, all traffic except for traffic coming from the 192.168.10.0/24
network is blocked with this ACL.
176 Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
In Example 4-4, the extended ACL 100 permits traffic originating from any host
on the 192.168.10.0/24 network to any IPv4 network if the destination host port is
80 (HTTP).
Notice that the standard ACL 10 is only capable of filtering by source address, while
the extended ACL 100 is filtering on the source and destination Layer 3 and Layer 4
protocol (for example, TCP) information.
Note
Full IPv4 ACL configuration is discussed in Chapter 5, “ACLs for IPv4 Configuration.”
Numbered ACLs
ACLs 1 to 99 and 1300 to 1999 are standard ACLs, while ACLs 100 to 199 and 2000
to 2699 are extended ACLs, as shown in Example 4-5.
R1(config)# access-list ?
<1-99> IP standard access list
<100-199> IP extended access list
<1100-1199> Extended 48-bit MAC address access list
<1300-1999> IP standard access list (expanded range)
<200-299> Protocol type-code access list
<2000-2699> IP extended access list (expanded range)
<700-799> 48-bit MAC address access list
rate-limit Simple rate-limit specific access list
template Enable IP template acls
Router(config)# access-list
Chapter 4: ACL Concepts 177
Named ACLs
Using named ACLs is the preferred method when configuring ACLs. You can name
standard and extended ACLs to provide information about the purpose of each ACL.
For example, the extended ACL name FTP-FILTER is far easier to identify than the
ACL number 100.
The ip access-list global configuration command is used to create a named ACL, as
shown in Example 4-6.
Note
Numbered ACLs are created using the access-list global configuration command.
The following are the general rules to follow for named ACLs:
■■ Assign a name to identify the purpose of the ACL.
■■ Names can contain alphanumeric characters.
■■ Names cannot contain spaces or punctuation.
■■ It is suggested that a name be written in CAPITAL LETTERS.
■■ Entries can be added or deleted within an ACL.
The extent of ■■ Placement of the ACL can depend on whether the organiza-
organizational control tion has control of both the source and destination networks.
Following the basic placement guidelines, the administrator would place a standard
ACL on router R3. There are two possible interfaces on R3 to which to apply the
standard ACL:
■■ R3 S0/1/1 interface (inbound):The standard ACL can be applied inbound on the
R3 S0/1/1 interface to deny traffic from the .10 network. However, it would also
filter .10 traffic to the 192.168.31.0/24 (.31 in this example) network. Therefore,
the standard ACL should not be applied to this interface.
■■ R3 G0/0 interface (outbound):The standard ACL can be applied outbound on
the R3 G0/0/0 interface. This will not affect other networks that are reachable by
R3. Packets from the .10 network will still be able to reach the .31 network. This
is the best interface to place the standard ACL to meet the traffic requirements.
180 Enterprise Networking, Security, and Automation Companion Guide (CCNAv7)
There are several ways to accomplish these goals. An extended ACL on R3 would
accomplish the task, but the administrator does not control R3. In addition, this
solution would allow unwanted traffic to cross the entire network, only to be
blocked at the destination, which would affect overall network efficiency.
Chapter 4: ACL Concepts 181
The solution is to place on R1 an extended ACL that specifies both source and desti-
nation addresses. There are two possible interfaces on R1 to apply the extended ACL:
■■ R1 S0/1/0 interface (outbound): The extended ACL can be applied outbound
on the S0/1/0 interface. However, this solution would process all packets leaving
R1, including packets from 192.168.10.0/24.
■■ R1 G0/0/1 interface (inbound): The extended ACL can be applied inbound on
the G0/0/1, and only packets from the 192.168.11.0/24 network are subject to
ACL processing on R1. Because the filter is to be limited to only those packets
leaving the 192.168.11.0/24 network, applying the extended ACL to G0/1 is the
best solution.
Summary (4.5)
The following is a summary of the sections in this chapter.
Purpose of ACLs
Several tasks performed by routers require the use of ACLs to identify traffic. An
ACL is a series of IOS commands that are used to filter packets based on information
found in the packet header. A router does not have any ACLs configured by default.
However, when an ACL is applied to an interface, the router performs the additional
task of evaluating all network packets as they pass through the interface to determine
whether the packets can be forwarded. An ACL uses a sequential list of permit or
deny statements, known as ACEs. Cisco routers support two types of ACLs: standard
ACLs and extended ACLs. An inbound ACL filters packets before they are routed
to the outbound interface. If a packet is permitted by the ACL, it is then processed
for routing. An outbound ACL filters packets after being routed, regardless of the
inbound interface. When an ACL is applied to an interface, it follows a specific
operating procedure:
Step 1. The router extracts the source IPv4 address from the packet header.
Step 2. The router starts at the top of the ACL and compares the source IPv4
address to each ACE, in sequential order.
Step 3. When a match is made, the router carries out the instruction, either permit-
ting or denying the packet, and the remaining ACEs in the ACL, if any, are
not analyzed.
Step 4. If the source IPv4 address does not match any ACEs in the ACL, the packet
is discarded because there is an implicit deny ACE automatically applied to
all ACLs.
Wildcard Masks
An IPv4 ACE uses a 32-bit wildcard mask to determine which bits of the address to
examine for a match. Wildcard masks are also used by the Open Shortest Path First
(OSPF) routing protocol. A wildcard mask is similar to a subnet mask in that it uses
the ANDing process to identify which bits in an IPv4 address to match. However, a
wildcard mask and a subnet mask differ in the way they match binary 1s and 0s.
Wildcard mask bit 0 matches the corresponding bit value in the address. Wildcard
mask bit 1 ignores the corresponding bit value in the address. A wildcard mask
is used to filter traffic for one host, one subnet, and a range of IPv4 addresses.
A shortcut for calculating a wildcard mask is to subtract the subnet mask from
255.255.255.255. Working with decimal representations of binary wildcard mask bits
Chapter 4: ACL Concepts 183
can be simplified by using the Cisco IOS keywords host and any to identify the most
common uses of wildcard masking. Keywords reduce ACL keystrokes and make it
easier to read ACEs.
Every ACL should be placed where it has the greatest impact on efficiency. Extended
ACLs should be located as close as possible to the source of the traffic to be filtered.
This way, undesirable traffic is denied close to the source network without crossing
the network infrastructure. Standard ACLs should be located as close to the des-
tination as possible. If a standard ACL were placed at the source of the traffic, the
“permit” or “deny” would occur based on the given source address, regardless of the
traffic destination. Placement of the ACL may depend on the extent of organizational
control, bandwidth of the networks, and ease of configuration.
Practice
The following Packet Tracer activity provides practice with the topics introduced in
this chapter. The instructions are available in the companion Enterprise Networking,
Security, and Automation Labs & Study Guide (CCNAv7) (ISBN 9780136634690).
There are no labs for this chapter.
2. Which three statements describe how an ACL processes packets? (Choose three.)
A. A packet is compared with all ACEs in the ACL before a forwarding decision
is made.
B. A packet that has been denied by one ACE can be permitted by a subsequent
ACE.
Chapter 4: ACL Concepts 185
C. An implicit deny at the end of an ACL rejects any packet that does not match
an ACE.
D. Each ACE is checked only until a match is detected or until the end of the
ACL.
E. If an ACE is matched, the packet is either rejected or forwarded, as directed
by the ACE.
F. If an ACE is not matched, the packet is forwarded by default.
A. 0.252.255.255
B. 0.0.255.255
C. 0.0.3.255
D. 0.3.255.255
8. What type of ACL offers increased flexibility and control over network traffic?
A. Extended
B. Extensive
C. Named standard
D. Numbered standard
A. 0.0.0.15
B. 0.0.0.31
C. 0.0.0.63
D. 0.0.0.127
Index
HFC networks, cable modems, 305 IDS (Intrusion Detection Systems), network security,
hierarchical networks, 493 140–141
access layer, 462, 475 IEEE 802.1p. See CoS traffic marking
borderless switched networks, 458–461 IFS (IOS File System), 424, 437–442
core layer, 462 IKE (Internet Key Exchange), 335
designing, OSPF, 476–477 images (IOS), managing, 446
distribution layer, 461–462, 493 backups, 438–441
OSPF, 476–477 boot system configurations, 441–442
scalability, 455–458 TFTP backups, 437–442
switched networks, 464–465 impersonation attacks, 114
three-tier network design, 455, 460, 463 implicit denies, 167, 182, 541
two-tier network design, 461, 464 inbound ACL filters, 166–167
hierarchical topologies, multi-area OSPF, 11 industrial routers, 490, 492
high CPU utilization rates, troubleshooting, 533 information (troubleshooting process)
HMAC (Hash Message Authentication Code), 147– analyzing, 514
149, 338–339 gathering, 514, 516–517
HTTP (Hypertext Transfer Protocol), 544, 634–639 ingress packets, 372
hub routers, 275–276 Init state, 17–19
hub-and-spoke WAN topology, 275, 330–331 input errors, troubleshooting, 551
hybrid clouds, 584–585 input queue drops, 550
hypervisors, 588, 591–593 inside NAT addresses, 229–231
hypotheses (troubleshooting process) integrity
proposals, 514 of data, 144–145, 333, 335, 338–339
testing, 515 network security, 138
interfaces, show interfaces command, 549–550
wireless Internet connectivity, 302 IPsec (IP Security), 332–345. See also VPN
wireless Internet-based broadband connectivity, 306, AH, 336
308 authentication, 339–340
cellular Internet connectivity, 306–307 PSK, 339, 340
municipal Wi-Fi Internet connectivity, 306 RSA, 340–342
satellite Internet connectivity, 307 confidentiality, 333–334, 336–338
WiMAX, 307 data integrity, 333, 335, 338–339
interoperability areas (transport layer), Diffie-Hellman key exchanges, 333, 335, 342–343
troubleshooting, 542–543 ESP, 336
IntServ (Integrated Services), 366–368 framework of, 334–335
IOS commands GRE over IPsec, 328–329
data collection, 511–512 origin authentication, 333, 335
gathering information (troubleshooting process), protocol encapsulation, 336
516–517 SA, 334–335
IOS File System, 424, 437–442, 446 SSL comparisons, 326–327
IOS log messages, severity levels (Syslog), 530 transport and tunnel mode, 343
IP (Internet Protocol) VTI, 331–332
show ip interface brief command, 517 IPv4 (Internet Protocol version 4)
show ip route command, 517 ACL, 175, 188. See also extended ACL; named ACL;
IP addresses, attacks, 105, 117–122, 158. See also numbered ACL; standard ACL
security creating, 188
IP connectivity, troubleshooting, 574–576 modifying, 195–198, 219
ACL, verifying, 568–570 placement of, 177–181
DNS, verifying, 570–571 stateful firewall services, 210, 220
end-to-end connectivity statistics, 199
components of, 545–547 wildcard masks, 168–173
duplex mismatches, 551–553 addressing
IPv4 pinging, 547–548 ranges, wildcard masks, 170
IPv4 traceroute command, 548 troubleshooting, 541
IPv6 pinging, 548–549 ARP tables, 553–554
IPv6 traceroute command, 548–549 attacks, 117–118
reference topologies, 545–547 default gateways, 559
verifying physical layer, 549–551 extended ACL, 175–176, 180–181, 203–204, 220
local network addressing, end-to-end connectivity, editing, 213–214
553–556 named extended IPv4 ACL, 212–216
network paths, verifying, 562–566 numbered extended IPv4 ACL, 204–206,
transport layer, verifying, 566–567 209–210
verifying physical layer, 549–551 ports, 207–209
VLAN assignments, 556–562 protocols, 206–209
IP phone, PoE, 484 TCP-established extended ACL, 210–211
IP services, 127–130, 158 verifying, 216–218
ipospf command, point-to-point OSPF networks, JSON, 625–626
configuring OSPF, 43–44 logical network topologies, 504
ipospf priority command, 61 named ACL, 177
IPP (IP Precedence), 373, 375, 377–378 modifying, 198–199
IPS (Intrusion Prevention Systems), 140–141 named extended IPv4 ACL, 212–216
named standard IPv4 ACL, 189–190, 193–195
728 IPv4 (Internet Protocol version 4)
L loopback interfaces
point-to-point OSPF networks, 48
LAN (Local-Area Networks) router ID, 37–38
campus LAN switches, 477–478 loops
switches, device documentation, 506 local loops (last mile), 286
WAN comparisons, 272–273 STP loops, troubleshooting, 537
last mile (local loops), 286 LSA (Link-State Advertisements)
latency, 291, 294, 302, 314 BDR, 24–26
Layer 2 MPLS VPN, 324, 332, 344 DR, 24–26
Layer 2 QoS traffic marking, 373–374 exchanging, OSPF, 6–7
Layer 2 traffic marking, 373–374 flooding, 23–24
Layer 3 MPLS VPN, 324, 332, 334, 344 LSU packets, 14
Layer 3 switches, SDN, 596 LSAck (Link-State Acknowledgement) packets,
Layer 3 traffic marking, 374–375 13–14
layered approach (network security), 138–139 LSDB (Link-State Databases)
layered models, troubleshooting with, 517–518 OSPF, 5, 7
leased-line WAN connectivity, 293–294 topology tables, 7
legacy support, virtualization, 589 LSR (Label-Switched Routers), 300–301
line cards, 480, 482 LSR (Link-State Request) packets, 13–14, 22
links, scalable networks LSU (Link-State Update) packets, 13–14
multiple links, 466–467 LTE (Long-Term Evolution), 307
redundant links, 466–467
link-state operation
convergence, 6
M
OSPF, 6 MAC addresses
establishing neighbor adjacencies, 6 spoofing attacks, 120–121
LSA, 6–7 switch MAC address tables, 555–557
LSDB, 7 macros, viruses, 107
SPF algorithms, 8–9 malware, 106, 108–109, 157
SPF trees, 8–9 adware, 108
route selection, 8–9 overview of, 106
link-state routing protocols. See OSPF ransomware, 108
list of neighbors, 17 rootkits, 108
LLDP (Link Layer Discovery Protocol), 396–400, spyware, 108
443 Trojan horses, 106–107
LLQ (Low Latency Queuing), 365 viruses, 106–107
Loading state, 18 worms, 106, 108
local loops (last mile), 286 management plane, SDN, 598
local NAT addresses, 229–231 managing networks, 390
local network addressing, verifying, 553–556 calendar services, 400
log keyword, ACL, 542 CDP, 390–396, 443
logging configurations
buffered logging, 529 backups, 428–430, 436
console logging, 529 restoring from text files, 428–430
logging trap command, 530 IOS images, 424, 437–442
logical network topologies, 504–505 LLDP, 396–400, 443
730 managing networks
dynamic NAT, 232–233, 244, 245–247, 249–251, Network Analysis Module (NAM), 528
260–261 network analyzers (portable), 528
analyzing, 247–249 network command, point-to-point OSPF networks
configuring, 251 command syntax, 40
topologies, 244–245 configuring OSPF, 41–43
global NAT addresses, 229–231 network edge routers, 488–489
inside global NAT addresses, 230 network layer, troubleshooting, 537–539
inside local NAT addresses, 230–231 network masks, hello packets, 16
inside NAT addresses, 229–231 networks
local NAT addresses, 229–231 ACL, 164, 165, 175, 188
NAT overload. See PAT ACE, 164–165
NAT64, 258–259 best practices, 174–175
NAT-PT, 259 creating, 173–175, 183, 188
operation of, 228–229 defined, 164
outside global NAT addresses, 231 extended ACL, 175–176, 180–181, 203–206,
outside local NAT addresses, 231 207–218, 220
outside NAT addresses, 229, 231 implicit denies, 167, 182
PAT, 233–234, 251, 260–261 limits per interface, 173–174
analyzing, 254–255 modifying, 195–196, 219
configuring, 252–253 modifying, sequence numbers method, 197–198
NAT comparisons, 236–237 modifying with text method, 196–197
next available port, 233–234 named ACL, 177, 189–190, 193–195, 198–199,
source port assignments, 235 212–216
verifying, 256–257 numbered ACL, 176, 188–189, 191–193, 195,
pools, 245–247 204–206, 209–210
private IPv4 addresses, 226–227 packet filtering, 164–168
routers, private/public IPv4 address translations, 227 placement of, 177–181
static NAT, 231–232, 239–240, 242–244, 260–261 purpose of, 164–168, 182
analyzing, 241–242 standard ACL, 175–176, 179, 190, 200–203,
configuring, 240–241 219–220
topology, 240 stateful firewall services, 210, 220
stub networks, 228 statistics, 199
terminology, 229–231 types of, 175–181, 183–184
troubleshooting, 542–543 wildcard masks, 168–173, 182–183
NBAR (Network Based Application Recognition), ATM, 296, 324
372 attacks,109, 117, 158. See also security
NBMA (Non-Broadcast Multiaccess) networks, 70 access attacks, 110–113
NCS 6000 series routers, 489 address spoofing attacks, 118, 120–121
neighbor adjacencies amplification attacks, 118–120
establishing, 18–20 ARP vulnerabilities/attacks, 127–130
OSPF link-state operation, 6 baiting attacks, 114
troubleshooting, 539 best practices, 137–143, 159
neighbor tables (IPv6), 554–555 buffer overflow attacks, 112–113
neighbors, list of, 17 DDoS attacks, 116–117
NETCONF, 638–639 DHCP attacks, 134–136
network addresses, prefixes, 12 DNS attacks, 131–133
732 networks
PKI (Public Key Infrastructure), 327, 344 private (internal) API, 632
plaintext passwords, 415 private clouds, 584
playout delay buffers, 355–356 private IPv4 addresses, 226–227
PoE (Power over Ethernet), switches, 484–486 private WAN (Wide-Area Networks), 273
point-to-point OSPF networks, 40, 83–84 probable cause (troubleshooting process),
area ID, 40 eliminating, 514
configuring, 49 problems (troubleshooting process)
ipospf command, 43–44 defining, 514
network command, 41–43 solving, 515
ipospf command, configuring OSPF, 43–44 program viruses, 107
loopback interfaces, 48 propagating
network command delays, 355
configuring OSPF, 41–43 static routes
syntax, 40 default route propagation, 73–77, 86
passive interfaces, 44–46 single-area OSPF, 73–77
verifying network type, 46–48 proposing hypotheses (troubleshooting process), 514
wildcard masks, 40–43 protocols
point-to-point WAN topology, 274–275 analyzers, 525
policing traffic, QoS, 380–381 encapsulation (IPsec), 336
policy-based SDN, 605 prototyping, virtualization, 589
polling scenarios, SNMP, 415–417 proxy Trojan horses, 107
POP (Point of Presence), 286, 312, 544 PSK (Pre-Shared Keys), 339–340
portable network analyzers, 528 PSTN (Public Service Telephone Networks), 295
ports public clouds, 584
density, switches, 482, 486 public key algorithms, 152–156
destination ports, troubleshooting, 541 public (open) API, 631–632
next available port (PAT), 235–236 public WAN (Wide-Area Networks), 273
redirection attacks, 112 Puppet, 643
source ports PVC (Permanent Virtual Circuits), 295–296
assigning, 235 Python, 638
troubleshooting, 541
speeds, switches, 487
USB ports on routers, 430
Q
VTY port security, standard IPv4 ACL, QoS (Quality of Service)
200–203, 220 classification/marking tools, 371–372
wire speeds, 483 congestion
Postman, 638 avoidance tools, 371, 379–380
power supplies, troubleshooting, 533 management tools, 371, 379–380
PPP (Point-to-Point Protocol), DSL Internet connec- DSP, 357
tivity, 303–304 egress packets, 372
precedence (router ID), order of, 36–37 implementation techniques, 384–385
prefixes, 12 ingress packets, 372
pretexting attacks, 114 IPP, 373, 375, 377–378
PRI (Priority) fields, 373 models, 383–384
Prime NAM (Network Analysis Module), 528 network traffic
prioritizing network traffic, 353–354 data traffic, 357, 360–361
740 QoS (Quality of Service)
S OpenFlow, 598
OpenStack, 598
SA (Security Associations), 334–335 policy-based SDN, 605
SaaS (Software as a Service), 584 traditional architectures and, 599
SaltStack, 643 SD-WAN, 648
satellite Internet connectivity, 307 SEAL (Software-Optimized Encryption Algorithm),
saving router configurations, 435 152, 338
scalability security. See also VPN
switches, 487 AnyConnect Secure Mobility Client, 321
VPN, 323 ASA, 140, 321
scalable networks, 493–494 attack tools, 101–102
designing, 465–466, 477 attack types, 104–105
access layer, 475 authentication, 339–340
bandwidth, 474–475 HMAC, 338–339
failure domains, 469–474 MD5, 339
multiple links, 466–467 PSK, 339, 340
redundancy plans, 469 RSA, 340–342
redundant links, 466–467 SHA, 339
scalable routing protocol, 467–468 cryptography, 143, 156, 159
tuning routing protocols, 476–477 data confidentiality, 144, 150
wireless connectivity, 468 data integrity, 144–145
hierarchical networks, 455–458 data nonrepudiation, 144
scalable routing protocol, 467–468 encryption, 151–156
scanning tools, 103–104 hash functions, 144–147
script kiddies, 100 origin authentication, 144, 147–149
script viruses, 107 data confidentiality, 144, 150
SD-Access, 647 data integrity, 144–145
SDH cabling standard, 291–292 data nonrepudiation, 144
SDN (Software-Defined Networking), 595, 598, 600, encryption
610–611 3DES, 152, 338
ACI, 598, 602 AES, 152, 338
ANP, 602 asymmetric encryption, 152–156
APIC, 602–603 DES, 152, 338
APIC-EM, 606–608 DH, 154–156
Nexus 9000 series switches, 602 DSA, 154
spine-leaf topologies, 603 DSS, 154
CEF, 596 ElGamal, 154
central controller, 597 elliptic curve cryptography, 154
control plane, 595 public key algorithms, 152–156
controller-based SDN, 605, 611–612 RC series algorithms, 152
controllers, 600–602 RSA, 154
data plane, 596 SEAL, 152, 338
device-based SDN, 604–605 symmetric encryption, 151–152
framework, 599 ESA, 142
Layer 3 switches, 596 firewalls, 139–140, 210, 220
management plane, 598 GRE over IPsec, 328–329
security 743
remote access VPN, 283, 308, 312, 314–315, 324, serial network communications, 289
325–326 SONET cabling standard, 291–292
scalability, 323 connectivity
service provider VPN, 324–325 3G/4G/5G, 302, 307, 314
site-to-site VPN, 283, 308, 312, 314–315, 323–324, cable Internet connectivity, 305, 306
327–328 circuit-switched WAN connectivity, 295
SOHO, 321 dedicated broadband WAN connectivity,
SSL VPN, 326–327 297–298
VTI, 331–332 DSL Internet connectivity, 302–304
VRF (Virtual Routing and Forwarding), 595 Internet-based broadband WAN connectivity,
VTI (Virtual Tunnel Interfaces), 331–332 298, 301–311, 314–315
VTY port security, standard IPv4 ACL, 200–203, ISDN, 295
220 ISP Internet connectivity, 309–310
vulnerabilities (security) leased-line WAN connectivity, 293–294
defined, 96 LTE, 307
exploitation tools, 104 Metro Ethernet WAN connectivity, 298–300, 332
fuzzers, 103 modern WAN connectivity, 296–301, 314
scanners, 104 MPLS, 298, 300–301, 324, 332
vulnerability brokers, 100 packet-switched WAN connectivity, 298
PSTN, 295
W solution comparisons, 311
teleworking, 283, 302, 308, 312, 314
WAN (Wide-Area Networks) traditional WAN connectivity, 292–296, 312–313
AP, 288 wired Internet connectivity, 301–302
backbone networks, 287 wireless Internet connectivity, 302
backhaul networks, 287 wireless Internet-based broadband connectivity,
branch networks, 281 306–307
cable modems, 288 core devices, 288
campus networks, 280 CPE, 286
carrier WAN connections, 278 CSU, 288
dual-carrier WAN connections, 278–279 DCE, 286–288
single-carrier WAN connections, 278 demarcation points, 286
CO, 286 devices, 287–289
communications distributed networks, 282
ATM, 296, 324 DSL modems, 288
circuit-switched network communications, 290 DSU, 288
demodulation, 288, 295 DTE, 286–288
DWDM multiplexing, 292 E-carriers, 294
Frame Relay networks, 295–296 evolution of, 279–282
jitter, 291, 294, 355 LAN comparisons, 272–273
latency, 291, 294, 302, 314 local loops (last mile), 286
modulation, 288, 295 operation of, 283–292, 312–313
packet-switched network communications, optical converters, 288
290–291, 295–296 OSI model, 284–285
parallel network communications, 289 POP, 286
SDH cabling standard, 291–292 private WAN, 273
zombies 753