3 types of acess list
Answers were Sorted based on User's Feedback
Answer / sneha
Two major types of access lists exist in the Cisco IOS –
standard and extended
Standard access lists provide basic filtering capabilities.
Extended access lists allow filtering to be accomplished in
a more granular way
| Is This Answer Correct ? | 8 Yes | 1 No |
Answer / kajendra varathan
1)Standerd-filter the packets based on source IP
address.range-1-99
2)Extended-filter the packets based on source IP address
and destination and protocol with por no..range-100-199
3)Named Accesslist.
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / dip
4tyepes
1 Standard
2 Extended
3 Ehtertype (in transpart mode)
4 webtyepe (URL filtering)
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / vihar.p
There are different types of access list in cisco router. We are more familiar with 2 access list
a] Standard Access List
b] Extended Access List
Other access list are as follows
-Lock and Key (Dynamic ACLs)
-IP Named ACLs
-Reflexive ACLs
-Time-Based ACLs Using Time Ranges
You can refer to below URL for more reference.
http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml#acltypes
| Is This Answer Correct ? | 0 Yes | 0 No |
Why we are going to RSTP?
What does RPC do? a. Intercepts DHCP broadcasts b. Broadcasts NETBIOS updates c. Makes remote calls look local d. Makes the use of redirector redundant
What is the the advantage of address sharing?
Which layer of the OSI model provides synchronization between user tasks by placing checkpoints in the data stream?
Port is where upper layer protocols access which layer ? a. data-link b. network c. transport d. session
how many layers are in the network protocol describe these with name?
What provide assurance of packet delivery? a. Connectionless oriented b. Connection oriented
What is looping and how switching loops are avoided at L2 level?
Which layer enables users on different machines to establish sessions between them.
The rules used to define the objects that can be accessed via a network management protocol is called ?
Which solaris command is used to troubleshoot DNS problems ?
What is the importance of authentication?