340 likes | 498 Views
Chapter 9 Intermediate TCP /IP/ Access Control Lists (ACLs). Objectives. TCP Operation. The transport layer is responsible for the reliable transport of and regulation of data flow from source to destination. Synchronization or Three-Way Handshake. Denial - of - Service Attacks.
E N D
TCP Operation The transport layer is responsible for the reliable transport of and regulation of data flow from source to destination.
Positive ACK • Acknowledgement is a common step in the synchronization process which includes sliding windows and data sequencing.
Ports for Clients • Whenever a client connects to a service on a server, a source and destination port must be specified. • TCP and UDP segments contain fields for source and destination ports.
Port Numbering and Well-Known Port Numbers • Port numbers are divided into three different categories: • well-known ports • registered ports • dynamic or private ports
Comparison of MAC addresses, IP addresses, and port numbers • A good analogy can be made with a normal letter. • The name on the envelope would be equivalent to a port number, the street address is the MAC, and the city and state is the IP address.
What are ACLs? • ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny.
Verifying ACLs • There are many show commands that will verify the content and placement of ACLs on the router. • show ip interface • show access-lists • Show running-config
Placing ACLs • Standard ACLs should be placed close to the destination. • Extended ACLs should be placed close to the source.
Firewalls A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders.