which of the following manners would meet the company’s…

A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only.
Reordering the ACL in which of the following manners would meet the company’s objectives?

A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only.
Reordering the ACL in which of the following manners would meet the company’s objectives?

A.
11, 10, 12, 13

B.
12, 10, 11, 13

C.
13, 10, 12, 11

D.
13, 12, 11, 10

Explanation:
ACL are processed in TOP DOWN process in routers or switches. This means that when a condition in the
ACL is met, all processing is stopped.
We start by allowing any protocol on the 10.200.0.0/16 subnet:11. Allow 10.200.0.0/16 to AnyDMZ eq to Any
We then deny any traffic on TCP port 22:10. Deny Any Trust to Any DMZ eq to TCP port 22
We allow browsing (port 80 and 443) on the 10.0.0.0/8 subnet: Allow 10.0.0.0/8 to Any DMZ eq to TCP ports
80, 443
Finally, we deny all other traffic:13. Deny Any Trust to Any DMZ eq to Any



Leave a Reply 0

Your email address will not be published. Required fields are marked *