14.8.2 Access Control Lists Quiz
True / False
True / False
Select all that apply
True / False
Select all that apply
Select all that apply
Put in order
Select all that apply
Frequent Errors on 14.8.2 Access Control Lists Questions
Misunderstanding ACL Evaluation Order
Many learners forget that ACLs are processed from top to bottom and stop at the first match. They assume all matching lines apply. To avoid this, read each rule in sequence and check which rule would be hit first for the specific packet in the question.
Ignoring the Implicit Deny
A very common error is to think unspecified traffic is allowed. Standard and extended ACLs usually end with an implicit "deny any" line. Always ask what happens to traffic that does not match any explicit rule. If it is not clearly permitted, it is blocked.
Confusing Source and Destination Fields
Students often reverse source and destination addresses, especially on extended ACL questions. For example, traffic from the internal network to a web server is different from traffic from the web server to clients. Mark which side initiates the connection before choosing or writing a rule.
Wildcard Masks and Network Ranges
Another frequent mistake is treating wildcard masks like subnet masks. In wildcard masks, 0 means "must match" and 1 means "ignore". Double check simple pairs, such as 0.0.0.255 for a /24 network, before answering.
Incorrect ACL Placement or Direction
Learners sometimes forget to attach the ACL to the correct interface and direction in scenario questions. Identify where the sensitive resource sits and where traffic enters or leaves. Then decide if the ACL should be applied inbound or outbound on that interface.
14.8.2 Access Control Lists Quick Reference Sheet
Print tip: You can print this ACL reference sheet or save it as a PDF for offline study.
Core ACL Concepts
- Access Control List (ACL): Ordered set of rules that define which traffic or users are permitted or denied.
- Standard ACL: Matches based on source IP address only. Often numbered in a lower range on many platforms.
- Extended ACL: Matches on source, destination, protocol, and ports. Used for precise control of traffic types.
- Implicit deny: Any traffic that reaches the end of the ACL without a match is denied.
ACL Evaluation Rules
- Packets or access requests enter the ACL at the first line.
- Each entry is checked in order until a match occurs.
- The first matching rule decides the action. Later rules are ignored.
- If no rule matches, the implicit deny blocks the traffic or request.
Wildcard Mask Reminders
- Wildcard mask bit 0 means the corresponding address bit must match.
- Wildcard mask bit 1 means the corresponding address bit is ignored.
- Common examples:
- Network 192.168.1.0/24 → wildcard 0.0.0.255
- Single host 10.0.0.5 → wildcard 0.0.0.0
- Formula approach: wildcard = 255.255.255.255 minus subnet mask.
Placement Best Practices
- Place extended ACLs close to the source of the traffic you want to control.
- Place standard ACLs close to the destination of the traffic you want to protect.
- Use the minimum number of rules that still meet the requirements.
- Group similar permits together, then add specific denies as needed.
Quick Exam Checklist
- Identify source, destination, protocol, and ports from the scenario.
- Decide if a standard or extended ACL is required.
- Choose correct wildcard masks for networks and hosts.
- Order rules so that the most specific entries appear first.
- Mentally trace one example packet through the ACL before finalizing your answer.
Worked ACL Configuration Example for 14.8.2
Scenario
Network 192.168.10.0/24 is an internal LAN. A web server at 203.0.113.10 hosts HTTP and HTTPS. Requirement: allow hosts in 192.168.10.0/24 to reach the web server on ports 80 and 443, but block all other traffic to that server. All other traffic on the router should remain unaffected.
Step 1: Extract Key Requirements
- Source network: 192.168.10.0/24
- Destination host: 203.0.113.10
- Protocols and ports: TCP 80 (HTTP) and TCP 443 (HTTPS)
- Action: Permit only those flows, deny other traffic to the server
Step 2: Choose ACL Type
The ACL needs to match on protocol and ports. This requires an extended ACL. A standard ACL would only filter by source IP, which would be too broad.
Step 3: Build the Rules
- Permit HTTP from the LAN to the server.
- Permit HTTPS from the LAN to the server.
- Deny all other traffic to the server.
Conceptual example:
- permit tcp 192.168.10.0 0.0.0.255 host 203.0.113.10 eq 80
- permit tcp 192.168.10.0 0.0.0.255 host 203.0.113.10 eq 443
- deny ip any host 203.0.113.10
Step 4: Check Order and Implicit Deny
Permits come before the deny. A packet from 192.168.10.5 to 203.0.113.10 on port 80 hits the first permit and is allowed. A packet to port 22 hits no permit and then matches the explicit deny. If the explicit deny were absent, the implicit deny at the end would still block it.
Step 5: Decide Placement
Apply this extended ACL close to the source LAN interface in the direction where traffic leaves the LAN toward the server. On exam questions, always state interface and direction, for example "inbound on LAN interface" or "outbound on LAN interface" depending on the diagram.
14.8.2 Access Control Lists Quiz FAQ
What does the 14.8.2 focus on in this access control lists quiz?
The 14.8.2 focus is on conceptual understanding of ACL behavior. That includes rule order, implicit deny, wildcard masks, and correct placement on interfaces or resources. The quiz targets intermediate learners who already know basic IP addressing and want more precise control skills.
How much networking knowledge should I have before taking this ACL quiz?
You should be comfortable with IP addresses, subnet masks, and basic routing ideas. Terms like source, destination, protocol, and port should already be familiar. If those fundamentals are solid, you can concentrate on interpreting ACL rules instead of struggling with basic terminology.
Does this quiz cover both standard and extended ACLs?
Yes. Questions cover standard ACLs that match on source addresses and extended ACLs that match on source, destination, protocol, and ports. Some items ask you to decide which type is suitable. Others ask you to predict what traffic a specific ACL will allow or block.
How can I improve at ACL scenario questions?
Start by underlining the required source, destination, protocol, and ports in each scenario. Sketch a quick path that traffic takes across interfaces. Then mentally trace a sample packet through each ACL rule in order and stop at the first match. This method reduces errors from rushing.
Which job roles benefit most from mastering these ACL concepts?
Network technicians, junior network engineers, and security analysts use ACLs to implement access policies on routers, switches, and firewalls. System administrators also apply ACL ideas to file systems and operating systems that support user and group based permissions.