Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


what is ACLs? what is the reasons to create ACLs?



what is ACLs? what is the reasons to create ACLs?..

Answer / vikram pratap singh

ACLs are lists of conditions that are applied to traffic
traveling across a router's interface.  These lists tell
the router what types of packets to accept or deny.
Acceptance and denial can be based on specified conditions.

ACLs can be created for all routed network protocols, such
as Internet Protocol (IP) and Internetwork Packet Exchange
(IPX).

ACLs can be configured at the router to control access to a
network or subnet.

Some ACL decision points are source and destination
addresses, protocols, and upper-layer port numbers.

ACLs must be defined on a per-protocol, per direction, or
per port basis.
The following are some of the primary reasons to create ACLs:

Limit network traffic and increase network performance.
Provide traffic flow control.
Provide a basic level of security for network access.
Decide which types of traffic are forwarded or blocked at
the router interfaces. For example: Permit e-mail traffic to
be routed, but block all telnet traffic.

Allow an administrator to control what areas a client can
access on a network.

If ACLs are not configured on the router, all packets
passing through the router will be allowed onto all parts of
the network.
i think it's enough to understand..

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is the difference between csma/cd and csma/ca?

0 Answers  


What are the two types of access lists that can be configured on a Cisco router? A. Standard B. Extended C. Filtering D. Packet

2 Answers  


Of the following switching types, which one has the highest latency? A.) Cut-through B.) None C.) Store-and-forward D.) Fragment Free

1 Answers  


Identify the command that forces the router to load into ROM mode upon a reload? A.) boot system rom B.) rom boot C.) boot system flash rom D.) boot router rom

1 Answers  


Why Authentication Header (AH) is not compatible with the network that using NAT?????? Jitu, looking for u specially...!!!! U knw why i m looking for u..!!!

1 Answers  


You are logged into a router, what command would show you the IP addresses of routers connected to you? A. show cdp neighbors detail B. show run C. show neighbors D. show cdp

2 Answers  


Which of the following provide connection-oriented transport to upper layer protocols? A.) SPX B.) RIP C.) NLSP D.) NCP

1 Answers  


Which of the following are valid Cisco encapsulation type names? A.) arpa = IPX Ethernet B.) novell-ether = IPX Ethernet_802.3 C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring D.) novell-fddi = IPX Fddi_Raw E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring F.) hdlc = HDLC on serial interfaces

1 Answers  


Your Ethernet interface currently has the IP address of 1.1.1.1/24. You would like it to have a second IP address of 2.2.2.2/24. Which command will do that? A.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 B.) ip address 2.2.2.2 255.255.255.0 secondary C.) ip address 2.2.2.2 255.255.255.0 D.) This cannot be done, you can only have 1 IP address per physical interface. E.) ip address 2.2.2.2 /24

1 Answers  


Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding

4 Answers  


Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode

3 Answers  


Identify 2 features of X.25? A.) Supports only IP B.) Utilizes switched and permanent virtual circuits C.) Contains minimal flow control and error recovery D.) Utilizes LAPB as it's data-link protocol

4 Answers  


Categories