HCIA Domain 4
HCIA Domain 4
1. ACL Overview
An ACL is a list of rules used to permit or deny traffic.
Applications of ACLs:
2. ACL Composition
An ACL consists of permit or deny statements, which are essentially the
rules within the ACL. Each rule defines an action (permit or deny) and a set
of conditions (such as matching IP addresses or ports).
Each rule in an ACL has an ID. If not manually specified, the system
automatically allocates a default ID using a step value (commonly 5).
For example, if a step value of 5 is used, the first rule might have an ID
of 5, the next 10, and so on. This makes it easier to add rules between
3. Wildcard Masks
A wildcard mask is a 32-bit number used to specify which bits in an IP
address must match exactly and which bits can vary.
Named ACL:
More modern and flexible approach where ACLs are identified using
names instead of numbers, allowing for more descriptive identification.
Using these two directions allows for granular control over both incoming
and outgoing traffic at different network segments.
Accounting: Monitors and records user activities and resource usage for
auditing and billing purposes.
The NAS acts as a gateway that collects and manages user access
requests in a centralized manner.
Domains: The NAS can manage users based on domains, with each domain
associated with different AAA schemes for authentication, authorization,
and accounting.
3. Authentication
AAA supports several authentication modes:
Non-authentication:
Local Authentication:
The NAS itself stores and verifies user information (e.g., username and
password).
It’s often used for login users (e.g., Telnet or FTP users).
Remote Authentication:
4. Authorization
Authorization defines what authenticated users can access:
Non-authorization:
Local Authorization:
Remote Authorization:
Non-accounting:
No records are kept, and users can access services without logging
their activity.
Remote Accounting:
The NAS functions as the RADIUS client and sends authentication and
accounting requests to the RADIUS server.
2. Private IP Addresses
Public IP Addresses: Allocated by dedicated organizations (like IANA) and
can communicate directly over the Internet.
3. NAT Implementation
NAT translates IP addresses in data packets as they move between private
and public networks. It’s typically deployed on egress devices such as
routers or firewalls.
Typical Scenario:
When these devices need to access external networks, the NAT device
at the egress translates their private IP addresses to public addresses.
14. NAT 1
For incoming traffic, the NAT device translates the destination public IP
address back to the corresponding private IP address.
Bidirectional Access:
Internal hosts with private IP addresses can access the Internet, and
external hosts can also reach internal hosts using the mapped public IP
address.
Mapping:
14. NAT 2
Unlike dynamic NAT, where each private address maps to one public
address (1:1), NAPT maps multiple private addresses to one public
address using different port numbers (1).
7. Easy IP
Easy IP is a variation of NAPT where the NAT device uses its own public
interface IP address instead of an address from a pool.
Since it doesn’t require an address pool, it’s suitable for small networks with
dynamically obtained IP addresses.
8. NAT Server
NAT Server is used when an internal server needs to provide services to
external clients.
This allows external hosts to access an internal server by using the public
IP and port number.
For example, if a web server is running inside the private network, a NAT
rule can be set to allow external users to access it using a designated
public IP and port (e.g., HTTP on port 80).
14. NAT 3