Vulnability Assigment
Vulnability Assigment
FACULTY OF INFORMATICS
INDIVIDUAL ASSIGNMENT
SEMESTER: ONE
Final Table:
Network/Subnet Address/Wildcard
Mask Mask
172.16.0.0 / 172.16.0.0 /
255.255.0.0 0.0.255.255
172.16.1.0 / 172.16.1.0 /
255.255.255.0 0.0.0.255
192.168.1.0 / 192.168.1.0 /
255.255.255.0 0.0.0.255
172.16.16.0 / 172.16.16.0 /
255.255.240.0 0.0.15.255
172.16.128.0 / 172.16.128.0 /
255.255.192.0 0.0.63.255
Question 2:
What happens here?
The access control list (ACL) implemented on RouterA filters traffic using the
following rules:
1. Permit traffic from 172.16.30.0/24 to 172.16.50.0/24.
2. Deny all other traffic.
As a result:
Traffic from 172.16.10.0/24 and 172.16.20.0/24 is denied when
trying to access other networks.
However, some traffic might bypass filtering due to the lack of
granularity in the standard ACL, particularly when interfaces overlap.