Answer Posted / jitendera
These basic rules should be followed when creating and
applying access lists:
One access list per protocol per direction.
Standard IP access lists should be applied closest
to the
destination.
Extended IP access lists should be applied closest
to the
source
only these two fundamental are the rules of the access-list
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
How many types of ethernet?
How does Hold-downs work?
Explain the difference between flsm and vlsm?
What command do we give if router IOS is stuck?
What is the difference between communication and transmission?
Explain how many tables are in ospf protocol?
What is the function of the Application Layer in networking?
What is formula of hold down time of eigrp protocol?
Mention what is bootp?
What is default size of hello packets in ospf?
How many types of nat?
Why we use filter option?
Can you explain L2TP?
What is the difference between the communication and transmission?
What is ad in ccna?