25 - IPv6 ACLs Flashcards

1
Q

Can an outbound ACL on a router interface filter router-originated packets?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When using an ACL to perform security filtering on the perimeter of the network what is the more secure direction to apply it?

A

Apply in-bound ACLs on interfaces facing the untrusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the first command when creating an IPv6 ACL?

A

ipv6 access-list (word) ex. Ipv6 access-list V6-VOIP-IN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you identify the difference between an IPv6 standard ACL vs an IPv6 extended ACL?

A

Just by looking at the content of the ACL. If more than source/destination then its and extended ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 2 permit statements that would allow RA and RS?

A
  • permit icmp router-advertisement
  • permit icmp any any router-solicitation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

By default how often does a router send out RA messages?

A

every 200 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is PMTUD and what protocol does it use?

A

Packet MTU Discovery uses ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What IPv6 command is equivalent to the IPv4 access-class cmd used to apply and ACL to a VTY line?

A

ipv6 access-class V6ACCESS in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does IPv6 handle logging on entries in an ACL?

A

A log message is generated for the FIRST packet that matches and then every 5 minutes after that.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is best practice when using ACLs to prevent trusted network packets from leaving the trusted network?

A

Apply out-bound on the interface facing the untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What 3 show commands can verify that an ACL has been created and applied?

A
  • show running-config
  • show ipv6 interface gig0/0
  • show ipv6 access-list
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can you convert an IPv4 ACL by changing the addresses to IPv6 addresses and expect it to work?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What would an ACL have in it that permitted all multicast from anywhere?

A

permit ipv6 any ff80::/8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 2 implicit permit statements in every IPv6 ACL?

A
  • permit icmp any any nd-na
  • permit icmp any any nd-ns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What would an ACL have in it that permitted ICMP echo-requests from anywhere?

A

permit icmp any any eq echo-request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What command applies an IPv6 ACL to an interface inbound?

A

(interface subcommand) ipv6 traffic-filter V6-VOIP-IN in

17
Q

What does PMTUD do?

A

Discovers the max length IPv6 packet that can flow between source and destination

18
Q

What are 7 values that IPv6 ACLs can match on?

A
  • Traffic class
  • Flow label
  • IPv6 Next Header field
  • source and destination IPv6 address
  • Upper layer header details
  • ICMPv6 type and code
  • IPv6 extension header value and type
19
Q

Do IPv6 ACLs have an implicit deny at the end of the ACL?

A

Yes