Compare cert salaries and plan your next career move
peanutnoggin wrote: » If your router is processing hundreds of thousands packets or even millions of packets, having to inspect each one to conform to ACL rules is going to be processor intensive. You're setting yourself up for a Denial of Service attack that was not intentional. Plus, with ACLs, you can only get so granular before your router goes belly up! If you're in a small environment, you can probably get away with having your router inspect each packet, but larger environments will require a dedicated "box" for packet inspection! Also, no question is stupid... its all a part of learning. Someone else probably had that same question but may have been afraid to ask. Good luck. -Peanut
docrice wrote: » The term "firewall" can be generic. Any packet filtering device could be considered a firewall, including a router equipped with basic stateless filtering capability. IOS access-lists are generally stateless (at least the standard and extended access-lists are). You can always use reflexive ACLs for basic stateful capability, but those can bump up CPU usage a lot since it now has to create and reference state tables. However, those still don't compare to stateful inspection where the filtering device is protocol-aware above layer 4. The PIX has stateful inspection capabilities with a lot of common protocols. FTP is a prime example. In active-mode FTP, the client initiates a connection to the server for the command channel, and the server initiates the connection to the client for the data channel. Unless the filtering device could actually look into the FTP stream and determine the dynamically-chosen incoming destination port from the server, a stateful ACL (not stateful inspection) will not match the command and data connections together to see they're part of the same stream. Therefore, in IOS you'd have to do:access-list 101 permit tcp any eq 20 1.1.1.0 0.0.0.31 and apply this to your external interface to allow your internal clients to access public FTP servers via active mode. From a ACL perspective, this is a very generous permit rule (a huge hole in your defense). There's passive mode which alleviates this, but I'm just using this as an example.Bits&Pieces: Active vs. Passive FTP
Compare salaries for top cybersecurity certifications. Free download for TechExams community.