What is Standard ACLs?
Answers were Sorted based on User's Feedback
Jitu, as far as my knowledge,
ACLs are classified into two types based on the configuration -
1. Standard ACL.
2. Extended ACL.
ACLs are classified into two types based on the
identification -
1. Named ACL
2. Numbered ACL.
Example:
1. If we use an unique number for the the identification of
Standard/Extended ACL, then it is called Numbered
Standard/Exteded ACL.
2. If we use a name for the the identification of
Standard/Extended ACL, then it is called Named
Standard/Exteded ACL.
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / vikram pratap singh
Standard ACLs check the source address of IP packets that
are routed.
The comparison will result in either permit or deny access
for an entire protocol suite, based on the network, subnet,
and host addresses.
The standard version of the access-list global configuration
command is used to define a standard ACL with a number in
the range of 1 to 99 (also from 1300 to 1999 in recent IOS).
If there is no wildcard mask. the default mask is used,
which is 0.0.0.0.
(This only works with Standard ACLs and is the same thing as
using host.)
The full syntax of the standard ACL command is:
Router(config)#access-list access-list-number {deny |
permit} source [source-wildcard ] [log]
The no form of this command is used to remove a standard
ACL. This is the syntax:
Router(config)#no access-list access-list-number
| Is This Answer Correct ? | 3 Yes | 2 No |
Answer / jitendra
shain
ya u r right
but onse u go in the depth ou will find more type of access list
like time based access-list and more
so access-list is basicaly two type onlly
standred and extended
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / s.m.feroz ahmed
ACL is defined as Access Control List and ACL can be
Configured for Permit or Deny access.
| Is This Answer Correct ? | 1 Yes | 2 No |
Answer / jitendera sinha
There are manily three type of access-list (as per ccna )
(1) satndred accss-list
(2) extended access list
(3) named access-list
Satndred access-list-:
(1) its value lie betwwen 1 to 99
(2) in this type of access0-list we can ithre permit or
block the servise for the whole subnet.here subnet consern
wid the lan ip pool
expample -:
if we want to block www for the interire lan we have
implenet the standerd access-list
| Is This Answer Correct ? | 2 Yes | 4 No |
What is an example of a valid MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234.FEGA D. 00.00.12.34.FE.AA
On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this channel? A.) 64 Kbps B.) 1.544 Mbps C.) 128 Kbps D.) 2.048 Mbps E.) 16 Kbps
Hi friend , This is Harekrushna . I have been tried for netsim keygen but i could not download this crack file .if it download then showes the writer protect error. PLEASE sugest me what isthe soluation. or any other software avalibe for pratics the network .
How many Devices does OSPF & EIGRP Support
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
in the ospf area network dr and bdr selection procedure occur let there are 4 router in that n/w r1 have the higher priority then r2 and r2 have higher priority then r3 and so on like that r1>r2>r3>r4 now as we know that selection of dr and bdr based upon the router priority so in this case r1 will be dr and r2 will be bdr now my question is that if i am going to implement 5th router which have greater priority then r1 then will it become dr atomically remember that i am not going change my 5 or 1st router property answer that one please
Define the igp (interior gateway protocol)?
Regarding frame relay, which of the following statements are true? A.) You must use ANSI encapsulation if connecting to non-Cisco equipment B.) You must use IETF encapsulation if connecting to non-Cisco equipment C.) You must use Q.933a encapsulation if connecting to non-Cisco equipment D.) You must use Cisco encapsulation if connecting to non-Cisco equipment
What does vlan provide?
Which of the following will apply IPX sap access list 1010 for incoming traffic, assume you are at the interface configuration? A.) ipx input-sap-filter 1010 in B.) ipx input-sap-filter 1010 C.) ipx access-group 1010 in D.) ipx access-list 1010 in
In how many ways can data be transferred in ccna?
The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability