They have no potential impact on the data segment being monitored. | |
They are more vulnerable to evasion techniques than IDS. | |
They operate in promiscuous mode. | |
They operate in inline mode. |
An "implicit deny" is applied to the start of the ACL entry by default. | |
Apply the ACL to the interface prior to configuring access control entries to ensure that controls are applied immediately upon configuration. | |
ACLs filter all traffic through and sourced from the router. | |
Only one ACL per protocol, per direction, and per interface is allowed. |
They have no potential impact on the data segment being monitored. | |
They operate in promiscuous mode. | |
They are more vulnerable to evasion techniques than IDS. | |
They operate in inline mode. |