3 types of acess list

Answers were Sorted based on User's Feedback



3 types of acess list..

Answer / sneha

Two major types of access lists exist in the Cisco IOS –
standard and extended
Standard access lists provide basic filtering capabilities.
Extended access lists allow filtering to be accomplished in
a more granular way

Is This Answer Correct ?    8 Yes 1 No

3 types of acess list..

Answer / naresh

1)Standerd
2)Exstnderd
3)Named

Is This Answer Correct ?    5 Yes 0 No

3 types of acess list..

Answer / kajendra varathan

1)Standerd-filter the packets based on source IP
address.range-1-99
2)Extended-filter the packets based on source IP address
and destination and protocol with por no..range-100-199
3)Named Accesslist.

Is This Answer Correct ?    3 Yes 0 No

3 types of acess list..

Answer / dip

4tyepes

1 Standard
2 Extended
3 Ehtertype (in transpart mode)
4 webtyepe (URL filtering)

Is This Answer Correct ?    0 Yes 0 No

3 types of acess list..

Answer / vihar.p

There are different types of access list in cisco router. We are more familiar with 2 access list

a] Standard Access List
b] Extended Access List

Other access list are as follows

-Lock and Key (Dynamic ACLs)
-IP Named ACLs
-Reflexive ACLs
-Time-Based ACLs Using Time Ranges

You can refer to below URL for more reference.

http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a00800a5b9a.shtml#acltypes

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Networking Administration Interview Questions

True/False: DNS gives you the ability to restrict queries from machines in a particular zone.

1 Answers  


What connectivity device works at the physical layer of the OSI model? a. repeater b. bridge c. router d. gateway e. brouter

1 Answers  


respected sir., i need knowledge, i want to do R.H.E.C but problem is this i am science graduate and a new to software line, i want to develop my carrier in I.t sector. please guide. thanks

0 Answers  


Which command will cause the in.namded daemon to reread it's configuration files ?

1 Answers  


Which command causes name daemon to return to level 0 (debug) ?

1 Answers  






What does a "preamble" consist of ? a. all 0s b. all 1s c. a 1 in the beginning and rest 0s d. alternating 0s and 1s

1 Answers  


why do we use c class of ip address(192 range) in organizations?

8 Answers   Symantec,


Difference b/w SCSI AND IDE

0 Answers  


In a peer-to-peer network, each computer can act as both a server and a _____ .

1 Answers  


HI all of u dear freind i dont know abot u but instead of i want to requeste to all , if u have any job in ur mind than pls contact me or forword me . i hv complet my B.A. , CCNA ,MCSA, my contact no 09958737018 and id is mak_alam000@rediffmail.com , ur freind maksud alam

0 Answers  


Internet layer is the same as which layer in OSI ?

1 Answers  


Cached ethernet addresses are stored for about 5 minutes and is used to avoid a rebroadcast. This is called ____________ .

1 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)