Uploaded by Murungi Adam

BSIT 2 2 ACLs

advertisement
In groups of 3 people, attempt and upload ONLY a ZIP-folder of all your answer files to ACLs Folder:
https://cloud.ucu.ac.ug/s/KsSFkp7jysxcwwT
Deadline: 23rd March 2023, at 23:00 hours
PART 1
Attempt all the questions about Access Control Lists (ACLs) in computer networking and security:
1. Discuss the role of Access Control Lists (ACLs) in computer networking and security. What are
some common use cases for ACLs, and what are the benefits and limitations of using them?
2. Compare and contrast traditional ACLs and extended ACLs. What are the differences in terms of
their syntax, functionality, and use cases, and how do they affect network security?
3. Explain the concept of ACL filtering and the different types of filters that can be applied using
ACLs. How do ACL filters work, and what are some examples of their applications in network
security?
4. Discuss the challenges of managing and maintaining ACLs in large-scale networks. What are
some best practices for managing ACLs, and what tools and technologies can be used to simplify
the process?
5. Analyze the impact of ACLs on network performance and scalability. What are some common
performance issues that can arise when using ACLs, and how can they be mitigated?
PART 2
Practical hands-on questions ACLs:
1. Set up a simple network topology with two or more hosts and routers, and implement ACLs to
restrict traffic flow between specific hosts or subnets.
2. Configure a router or switch to apply an extended ACL to permit or deny specific types of traffic
based on source and destination IP addresses, port numbers, or protocols.
3. Configure a firewall to apply a standard or extended ACL to allow or block traffic based on
specific criteria, such as IP address, port number, or application type.
4. Troubleshoot common issues that can arise when implementing ACLs, such as incorrect syntax,
conflicting rules, or unintended consequences.
5. Develop a network security policy that includes guidelines for using ACLs to protect against
common network threats, such as denial-of-service attacks, malware infections, or unauthorized
access.
Download