What is Standard ACLs?
Answers were Sorted based on User's Feedback
Jitu, as far as my knowledge,
ACLs are classified into two types based on the configuration -
1. Standard ACL.
2. Extended ACL.
ACLs are classified into two types based on the
identification -
1. Named ACL
2. Numbered ACL.
Example:
1. If we use an unique number for the the identification of
Standard/Extended ACL, then it is called Numbered
Standard/Exteded ACL.
2. If we use a name for the the identification of
Standard/Extended ACL, then it is called Named
Standard/Exteded ACL.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / vikram pratap singh
Standard ACLs check the source address of IP packets that
are routed.
The comparison will result in either permit or deny access
for an entire protocol suite, based on the network, subnet,
and host addresses.
The standard version of the access-list global configuration
command is used to define a standard ACL with a number in
the range of 1 to 99 (also from 1300 to 1999 in recent IOS).
If there is no wildcard mask. the default mask is used,
which is 0.0.0.0.
(This only works with Standard ACLs and is the same thing as
using host.)
The full syntax of the standard ACL command is:
Router(config)#access-list access-list-number {deny |
permit} source [source-wildcard ] [log]
The no form of this command is used to remove a standard
ACL. This is the syntax:
Router(config)#no access-list access-list-number
Is This Answer Correct ? | 3 Yes | 2 No |
Answer / jitendra
shain
ya u r right
but onse u go in the depth ou will find more type of access list
like time based access-list and more
so access-list is basicaly two type onlly
standred and extended
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / s.m.feroz ahmed
ACL is defined as Access Control List and ACL can be
Configured for Permit or Deny access.
Is This Answer Correct ? | 1 Yes | 2 No |
Answer / jitendera sinha
There are manily three type of access-list (as per ccna )
(1) satndred accss-list
(2) extended access list
(3) named access-list
Satndred access-list-:
(1) its value lie betwwen 1 to 99
(2) in this type of access0-list we can ithre permit or
block the servise for the whole subnet.here subnet consern
wid the lan ip pool
expample -:
if we want to block www for the interire lan we have
implenet the standerd access-list
Is This Answer Correct ? | 2 Yes | 4 No |
Which two of the following are valid ways to have multiple encapsulation types on a single interface? A.) This is not possible B.) subinterfaces C.) additional physical interfaces D.) secondary addresses
What is Spanning Tree Protocol and how it work? I know it is - STP is Spanning tree Protocol. It Stops the looping in the network? How STP work? How it stop Looping in network?
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
Explain the types of nat?
ok this is practical senario question how can we comunicate two diffrent network host by i single 1603 sires of cisco router rember that the cisco series of that router have singe 100mbps ethernet now think think write all command answer is so simple i wiil; give the answer after 20 visit til then wait
What is de-encapsulation?
Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address
What is Phase od VPN in site to site and what information you will require to configure a SITE to SITE VPN
Which layer is responsible for framing? A.) Application B.) Data Link C.) Physical D.) Network E.) Transport
completly describe th steps fo osi model when you enter http:/youtube.com
Define the virtual path?
Identify the command to disable CDP on an interface? A.) Router(config-if)# no cdp enable B.) Router(config-if)# no cdp run C.) Router# no cdp enable D.) Router(config-if)# no cdp