They operate in promiscuous mode. | |
They have no potential impact on the data segment being monitored. | |
They are more vulnerable to evasion techniques than IDS. | |
They operate in inline mode. |
An "implicit deny" is applied to the start of the ACL entry by default. | |
Only one ACL per protocol, per direction, and per interface is allowed. | |
ACLs filter all traffic through and sourced from the router. | |
Apply the ACL to the interface prior to configuring access control entries to ensure that controls are applied immediately upon configuration. |
When configured with the "PASS" action, stateful inspection is applied to all traffic passing between the configured zones. | |
Interface ACLs are applied before zone-based policy firewalls when they are applied outbound. | |
Policies are applied to traffic moving between zones, not between interfaces. | |
The firewalls can be configured simultaneously on the same interface as classic CBAC using the ip inspect CLI command. |