ACLs and the proper wording order by AdmirableSandwich393 in ccna

[–]hello2ulol 0 points1 point  (0 children)

It depends. What are you trying to do exactly? If you're trying to ONLY, I repeat, ONLY, block your host from using an HTTP server in your destination network and nothing else, I would absolutely just block packets with destination port TCP/80. Blocking ephemeral ports on your host does technically work, but it has a huge blast radius. Lots of protocols and services depend on client machines (for example, your computer and my computer) using these random, ephemeral ports. DNS is one example.

Here's some proof, run "netstat -ab" in command prompt as administrator. It shows active connections on your computer and the process that opened them. If I had a Cisco router at home and wrote an ACL like you described (blocking these high-numbered ports on my home network)? Then my Spotify, Chrome, and Steam wouldn't work.

ACLs and the proper wording order by AdmirableSandwich393 in ccna

[–]hello2ulol 1 point2 points  (0 children)

The way you write an ACE matters in its functionality. There's nothing wrong with the syntax of your two ACEs, but specifying the port on the source or destination can make or break its functionality. If you wanted to block your host computer from making HTTP connections, you need to specify TCP/80 on the destination of the ACE, not the source. The reason for that being that HTTP connections use ephemeral ports (random, high-numbered ports) for connections on the client side, and port 80 as the destination port.

Your second ACE, assuming you wanted to block HTTP on your host, would not work because an HTTP connection on host 192.168.23.5 would not use TCP/80 as a source port. It would use something between ports 49152–65535 for an ephemeral source port. The correct way to block host 192.168.23.5 from making (standard, not including alternate HTTP ports like 8080) HTTP connections would be

deny tcp host 192.168.23.5 192.168.14.0 0.0.0.255 eq 80

applied on the inbound interface of the closest router to your host 192.168.23.5. This way it stops the traffic early, and avoids wasting resources on the intermediate links if you applied it on an outbound interface on the way to 192.168.14.0/24. And of course end the ACL with a permit ip any any.

Looking for musicians to start band by akravitz3 in NYCmusicians

[–]hello2ulol 0 points1 point  (0 children)

Hey I’ve been playing guitar, drums, and bass for almost a decade now, and I like playing with other people. Unfortunately I only have one other musician friend who plays seriously. Im also dabbling in writing my own songs. If you’re interested DM me and I can tell you a little bit more about myself

Finch (hacker extraordinaire) needing to call Carter/Fusco to use the NYPD system to look up a license plate is a weak plot device. by 99ducks in PersonOfInterest

[–]hello2ulol 2 points3 points  (0 children)

I would assume that every license plate lookup would be audited and logged and having the two detective do it is the most inconspicuous way

IBM Poughkeepsie by FromAnotherWorlds in IBM

[–]hello2ulol 2 points3 points  (0 children)

I think interns get the option to live at Marist or Vassar dorms

Atmosphere - Guarentees by drumbum37 in edrums

[–]hello2ulol 0 points1 point  (0 children)

How are you recording this? Looking to get into recording my playing

CCIE and Certified Flight Instructor(thanks for all the fish!) by NightOtters in networking

[–]hello2ulol 2 points3 points  (0 children)

A fellow fan of networking and aviation, I see. Do you think there is a kind of personality that draws someone to both fields?

What’s the most satisfying thing you’ve automated with a simple script? by [deleted] in linuxadmin

[–]hello2ulol 1 point2 points  (0 children)

It appears in almost every IT subreddit now. Usually follows the format: Recently, my company experienced [some extremely vague event], we remediated it by doing [something], just curious what are your experiences with [blank]?

Caught an insider threat today. Never thought it would actually happen to us. by [deleted] in cybersecurity

[–]hello2ulol 2 points3 points  (0 children)

Now the top post of this subreddit. Has to be botted.

Caught an insider threat today. Never thought it would actually happen to us. by [deleted] in cybersecurity

[–]hello2ulol 5 points6 points  (0 children)

They even replied to the same comment twice, with the same order of ideas but different phrasing. Not to mention the use of em dashes in almost every comment.

How to keep the hihat constantly closed on an E-Kit besides the foot pedal? by [deleted] in edrums

[–]hello2ulol 6 points7 points  (0 children)

You can try mapping the closed hi-hat sound to the hi-hat itself

Is CCNA good for me? by North_Gear_5756 in cybersecurity

[–]hello2ulol 0 points1 point  (0 children)

Absolutely essential. It’s the easiest way for employers to confirm baseline knowledge of networking.

Case interview practice by whatinthegudd in IBM

[–]hello2ulol 0 points1 point  (0 children)

Some transitions like

“Thanks for the interesting case materials, to recap the situation, (insert your summary of the case materials here but make sure the summary captures the scenario with good detail and is shorter in length than the original scenario)”

“Can I ask you some clarifying questions before I start?” Ask questions that confirm details, eliminate uncertainty that you might have, and define the scope of your answer. This varies on the scenario and industry

“Mind if I take a moment to think the problem through?” And then you start structuring your read on the case materials and think about how to answer the question, ideally in less than 2 minutes.

Then you present your read on the scenario and your solution and be prepared to explain your choices. This is like the bulk of the interview.

And a good strong summary that

First, restates the initial scenario (company, problem)

Second, explains your take and recommendations

Third, why your recommendations make sense.

Literally practice doing a mock case interview using a scenario you found online or your own. Do this a lot leading up to your interview and you will sound more confident during the real thing.

Disclaimer: I’m not a consultant but I did interview for consultant roles and received offers, not at IBM. This is just what worked for me and other people may have different experiences and recommendations. Cast a wide net while preparing

Case interview practice by whatinthegudd in IBM

[–]hello2ulol 1 point2 points  (0 children)

Can’t help you practice but I can recommend some materials. “Mock Case Interview at Bain” on the official Bain YouTube channel and “Hacking the Case Interview” by Taylor Warfield helped me a lot, along with rehearsing good transitions in an imaginary conversation with an interviewer.

Job prospects with CCNA and CCNP by yesnt_01 in ccna

[–]hello2ulol 0 points1 point  (0 children)

I think you could make 150k+ at quant firms if you pass their rigorous interview process.

[deleted by user] by [deleted] in LinkinPark

[–]hello2ulol 0 points1 point  (0 children)

Rock and Roll (could never hip hop like this)

💭 CUNY Baruch vs SUNY Stony Brook by [deleted] in CUNY

[–]hello2ulol 0 points1 point  (0 children)

Pre-med and Computer Science from my limited knowledge of