what is ACLs? what is the reasons to create ACLs?
Answer / vikram pratap singh
ACLs are lists of conditions that are applied to traffic
traveling across a router's interface. These lists tell
the router what types of packets to accept or deny.
Acceptance and denial can be based on specified conditions.
ACLs can be created for all routed network protocols, such
as Internet Protocol (IP) and Internetwork Packet Exchange
(IPX).
ACLs can be configured at the router to control access to a
network or subnet.
Some ACL decision points are source and destination
addresses, protocols, and upper-layer port numbers.
ACLs must be defined on a per-protocol, per direction, or
per port basis.
The following are some of the primary reasons to create ACLs:
Limit network traffic and increase network performance.
Provide traffic flow control.
Provide a basic level of security for network access.
Decide which types of traffic are forwarded or blocked at
the router interfaces. For example: Permit e-mail traffic to
be routed, but block all telnet traffic.
Allow an administrator to control what areas a client can
access on a network.
If ACLs are not configured on the router, all packets
passing through the router will be allowed onto all parts of
the network.
i think it's enough to understand..
| Is This Answer Correct ? | 1 Yes | 0 No |
What is the syntax to add a banner to the Cisco router? A.) motd banner # B.) banner C.) banner motd # D.) banner #
hi friend i am sending some interview question which is asked from me at volvo hope this will help you of all 1 what is mpls al question is posted by jitendera kumar sinha
0 Answers ALU, TATA, Volvo, Wipro,
how many pass word you can configure on cisco 2500 router
What is the difference between private ip and public ip?
Which commands will restart the router? A.) router#system exit B.) router >reload C.) router#shutdown D.) router#reload E.) router#(config)reload F.) router#system restart
What are the two primary operating modes for frame switching? A. Full Duplex B. Half-Duplex C. CSMA/CD D. Cut-through E. Fragmentation F. Store and Forward G. User mode H. Privileged mode
Which of the following are valid WAN terms? A.) DTE B.) DCE C.) Demarc D.) CPE
Which three are typical operational phases in a basic connection oriented neloyord service? (Choose three) A. call setup B. data transfer C. load balancing D. call termination E. call priortization F. data segmentation G. data link identification
What are the advantages of layered model in networking industry?
If a router uses dynamic routing, how does it learn the route to remote networks? The router uses a DHCP request to obtain remote network numbers. The router uses a routing protocol to exchange routing info. with other routers. The router uses DNS request packets to obtain remote network numbers. The Network Administrator manually configures the remote networks.
What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II
What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+P