Benefits of Dynamic Acls
Benefits of Dynamic Acls
Benefits of Dynamic Acls
Dynamic ACLs
Lock-and-key is a traffic-filtering security feature that uses dynamic ACLs, which are some-
times called lock-and-key ACLs, are available for IP traffic only. Dynamic ACLs are dependent on
Telnet connectivity, authentication (local or remote), and extended ACLs.Users who want to
traverse the router are blocked by the extended ACL
until they use Telnet to connect to the router and are authenticated. The Telnet connection is
then dropped, and a single-entry dynamic ACL is added to the existing extended ACL. This
permits traffic for a particular period; idle and absolute timeouts are possible.
Benefits of Dynamic ACLs
Dynamic ACLs have the following security benefits over standard and static extended
ACLs: Use of a challenge mechanism to authenticate individual users
Simplified management in large internetworks In many cases, a reduction in the amount of
router processing that is required for ACLs Less opportunity for hackers to break into the
network Creation of dynamic user access through a firewall, without compromising other
configured security restrictions
Reflexive ACLs
Reflexive ACLs allow IP packets to be filtered based on upper-layer session information. They
generally are used to allow outbound traffic and to limit inbound traffic in response to sessions
that originate inside the router. This gives you greater control over what traffic you allow into
your network and increases the capabilities of extended access lists.
Configure standard named ACLs on the R1 and R3 VTY lines, permitting hosts
connected directly to their FastEthernet subnets to gain Telnet access. Deny and log
all other connection attempts. Document your testing procedures.
ip access-list standard VTY_LOCAL
permit 10.1.1.0 0.0.0.255
deny any log
line vty 0 4
access-class VTY_LOCAL in
NETWORK BASELINE
Network baselining is the act of measuring and rating the performance of a network in real-
time situations. Providing a network baseline requires testing and reporting of the physical
connectivity, normal network utilization, protocol usage, peak network utilization, and average
throughput of the network usage. Such in-depth network analysis is required to identify
problems with speed and accessibility, and to find vulnerabilities and other problems within the
network. Once a network baseline has been established, this information is then used by
companies and organizations to determine both present and future network upgrade needs as
well as assist in making changes to ensure their current network is optimized for peak
performance.
Establishing a network performance baseline requires collecting key performance data from
the ports and devices that are essential to network operation. This information helps deter-
mine the network’s “personality” and provides answers to the following questions:
How does the network perform during a normal or average day?
Where are the underutilized and overutilized areas?
If errors are discovered, where are the most errors occurring?
What alert thresholds should be set for the devices that need to be monitored?
Can the network deliver the service identified in the Network Policy document?
Troubleshooting Methods
The three main methods of troubleshooting networks are
Bottom-up
Top-down
Divide-and-conquer
Bottom-up
start with the physical components of the network and
move up through the layers of the OSI model until the cause of the problem is identified. is a
good approach to use when the problem is suspected to be a physical one. The disadvantage of
bottom-up troubleshooting is that it requires you to check every device and interface on the
network until you find the possible cause of the problem.
Top-down
start with the end-user applications and move down through the layers of the OSI model until
the cause of the problem has been ideified. Use it when you think the problem is with a
software application. The disadvantage of the top-down approach is that it requires you to
check every network application until you find the possible cause of the problem.
Divide-and-Conquer
you select a layer and test in both directions from the starting layer, start by collecting users’
experiences with the problem and document the symptoms. Then, using that information, you
decide at which OSI layer to start your investigation.
Gathering Symptoms
Step 1. Analyze existing symptoms: Analyze symptoms gathered from the trouble tick-
et, users, or end systems affected by the problem to form a definition of the
problem.
Step 2. Determine ownership: If the problem is within your system, you can move on
to the next stage. If the problem is outside the boundary of your control, such as
lost Internet connectivity outside the autonomous system, you need to contact an
administrator for the external system before gathering additional network symptoms.
Step 3. Narrow the scope: Isolate the geographic area involved, and determine if the
problem is at the network’s core, distribution, or access layer. After you’ve iden-
tified the problem, analyze the existing symptoms, and use your knowledge of
the network topology to determine which devices are probably involved.
Step 4. Gather symptoms from suspect devices: Using a layered troubleshooting
approach, gather hardware and software symptoms from the suspect devices.
Start with the most likely possibility, and use knowledge and experience to deter-
mine if the problem is more likely a hardware or software configuration problem.
Step 5. Document symptoms: Sometimes the problem can be solved using the docu-
mented symptoms. If not, begin the isolating phase of the general troubleshooting
process.
SECURITY
Teleworker and home office components: The required home office components are a
laptop or desktop computer, broadband access (cable or DSL), and a VPN router or
VPN client software installed on the computer. Additional components might include a
wireless access point. When traveling, teleworkers need an Internet connection and a
VPN client to connect to the corporate network over any available dialup, network, or
broadband connection.
Headquarters and corporate components: Corporate components are VPN-capable
routers, VPN concentrators, multifunction security appliances, authentication, and cen-
tral management devices for resilient aggregation and termination of the VPN connec-
tions.
Dialup access is an inexpensive option With speeds up to 56 kbps
DSL typically is more expensive than dialup but provides a faster connection. DSL also
uses telephone lines, but unlike dialup access, DSL provides a continuous connection
to the Internet. DSL uses a special high-speed modem that separates the DSL signal
from the telephone signal and provides an Ethernet connection to a host computer or
LAN.
DSL provides high-speed broadband access at speeds of 200 kbps and higher. Upload
and download speeds vary according to the user’s distance from the central office.
Cable modem service usually is offered by cable television service providers. The
Internet signal is carried on the same coaxial cable that delivers cable television. A spe-
cial cable modem separates the Internet signal from the other signals carried on the
cable and provides an Ethernet connection to a host computer or LAN.
Cable is similar to DSL in that it provides broadband access at speeds of 200 kbps and
higher.
Satellite Internet access is offered by satellite service providers. The computer con-
nects through Ethernet to a satellite modem that transmits radio signals to the nearest
point of presence (POP) within the satellite network.
Satellite Internet access speeds range from 128 kbps to 512 kbps, depending on the
subscriber plan.