Under what circumstances would the acl be needed

Assignment Help Other Subject
Reference no: EM132411678

Assignment: Must be at least 250 each

Question 1: During the course we spent a large block of time learning about Access Control Lists (ACLs). One of the important aspects of ACLs is the ability to protect your BGP implementations. With that in mind, for this post you are going to translate into English what the following ACL is doing and why it might be important. Be sure to answer questions such as, Where would you apply an ACL like this? Under what circumstances would this ACL be needed? What is each line actually doing? Do we need the "deny" Access Control Entry (ACE)? Why do I need the "permit ip any any" at the end - doesn't the "deny any any" override it? Here is the ACL:

permit tcp host 169.254.100.1 host 169.254.100.2 eq bgp

permit tcp host 169.254.100.1 eq bgp host 169.254.100.2

deny tcp any any eq bgp

deny tcp any eq bgp any

permit ip any any

Post Requirements: Your posts must use at least two (2) sources of information (properly cited using the American Psychological Association (APA) citation guidelines) in addition to the "hypermedia" already provided to you as part of the course. Your post must consist of a minimum of 250 words and a maximum of 500 words. Technical accuracy, proper in-text citations, and depth of coverage all play a critical role in your overall score.

You must start a thread before you can read and reply to other threads

Question 2: Chapter #11(NetAcad CCNA) in the online text provided a significant amount of coverage around the different types of policies that should exist with respect to network security. Your task for this discussion topic is to compare and contrast the three (3) policies that Chapter #11 focused on: Governing, Technical, and End User. You should focus on answering questions as to whether or not there is overlap with these policies? Do you need all three (3) or could you consolidate them? If so, what would that look like? What are the strengths and weaknesses of each type of policy? What did Chapter #11 overlook, if anything, with respect to each of the different policies?

Reference no: EM132411678

Questions Cloud

How you would protect your organizational it infrastructure : List and discuss 3 best practices for Microsoft Windows application security. Please, explain how you intend to apply such practices to protect your.
Word-Press Site Implementation : Word-Press Site Implementation - Just like the test, your professor will need your website exported with the all in one wp migration plugin
How does information assurance applied : Information Assurance (IA) is the practice of safeguarding information and managing risks related to the use, processing, storage, and transmission.
How long have people been working in the given area : Find an application area of discrete mathematics (not necessarily in computer science, though it can be). Then, write an essay describing why discrete math.
Under what circumstances would the acl be needed : During the course we spent a large block of time learning about Access Control Lists (ACLs). One of the important aspects of ACLs is the ability to protect.
Discuss the problems with implementing an erm : Discuss the problems with implementing an ERM. Apply your analysis to identify and discuss what would work for the ABC Corporate ERM program.
ARTD2106 Product Management Assignment : ARTD2106 Product Management Assignment Help and Solution - University of Southampton, UK. Identify market trends and opportunities
Analysis and simulation of the cellular iot : Investigate origin of Cellular IOT based on LPWAN like LoRa, Sigfox and other low cost wireless networks - Use CellPlanner to simulate the air interface
What did you learn about the provider or product : Now that you have learned about the various providers and products that support the health care industry, what are some that may have surprised you?

Reviews

Write a Review

Other Subject Questions & Answers

  Discuss best practices to be used by police

Discuss best practices to be used by police when conducting suspect identifications. please include all kinds of police suspects ID standard operational

  Receiving the initial telephone call

Suppose that after receiving the initial telephone call in which the seller makes the offer, the buyer calls back the same day and says, "Sorry

  Compare and contrast ancient japan and indonesia

Compare/contrast ancient Japan and Indonesia. China had an immense impact on Japan; examine how this occurred.  Indonesia was influenced by Islam and Buddhism

  Analyse historical and contemporary methods of communication

L/601/6778 -Interactive Media Principles -BH027165 – Edexcel BTEC Levels 4 and 5 Higher Nationals specification in Art and Design.Analyse historical method.

  How might the affordable care act decrease cost

How might the Affordable Care Act decrease cost shifting within hospitals - Managed Care?In what way does managed care actually manage cost?

  Identify potential ethical and confidentiality issues

Identify potential ethical and confidentiality issues that might arise and discuss how you will overcome these issues.

  Two to three state-level and two to three federal-level

A description of three to five policies (including two to three state-level and two to three federal-level policies) related to that population. Finally, explain the relationship between the policies and the population you selected.

  How does discrimination relate to issues

How does discrimination relate to issues such as immigration reform in the United States? What are some ways you and your classmates can change the current social climate to prevent or at least reduce hostility and bias that might be behind some o..

  BN309 Computer Forensics Assignment Problem

BN309 Computer Forensics Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service - Prepare a forensic image with the record

  What is the typical etiology for the emergency

What is the typical etiology for the emergency of dissociative identity disorder and what are some of the common symptom characteristics?

  Provide an example of a socially responsible effort within

1.what are potential results if members of a community accept their communitys benefits such as emergency services or

  What are the causes of rape

What are the causes of rape? What are the various issues in the law relevant to the adjudication of sexual assault, such as rape shield laws? Do legal reforms work?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd