What is Standard ACLs?
Answers were Sorted based on User's Feedback
Jitu, as far as my knowledge,
ACLs are classified into two types based on the configuration -
1. Standard ACL.
2. Extended ACL.
ACLs are classified into two types based on the
identification -
1. Named ACL
2. Numbered ACL.
Example:
1. If we use an unique number for the the identification of
Standard/Extended ACL, then it is called Numbered
Standard/Exteded ACL.
2. If we use a name for the the identification of
Standard/Extended ACL, then it is called Named
Standard/Exteded ACL.
Is This Answer Correct ? | 3 Yes | 0 No |
Answer / vikram pratap singh
Standard ACLs check the source address of IP packets that
are routed.
The comparison will result in either permit or deny access
for an entire protocol suite, based on the network, subnet,
and host addresses.
The standard version of the access-list global configuration
command is used to define a standard ACL with a number in
the range of 1 to 99 (also from 1300 to 1999 in recent IOS).
If there is no wildcard mask. the default mask is used,
which is 0.0.0.0.
(This only works with Standard ACLs and is the same thing as
using host.)
The full syntax of the standard ACL command is:
Router(config)#access-list access-list-number {deny |
permit} source [source-wildcard ] [log]
The no form of this command is used to remove a standard
ACL. This is the syntax:
Router(config)#no access-list access-list-number
Is This Answer Correct ? | 3 Yes | 2 No |
Answer / jitendra
shain
ya u r right
but onse u go in the depth ou will find more type of access list
like time based access-list and more
so access-list is basicaly two type onlly
standred and extended
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / s.m.feroz ahmed
ACL is defined as Access Control List and ACL can be
Configured for Permit or Deny access.
Is This Answer Correct ? | 1 Yes | 2 No |
Answer / jitendera sinha
There are manily three type of access-list (as per ccna )
(1) satndred accss-list
(2) extended access list
(3) named access-list
Satndred access-list-:
(1) its value lie betwwen 1 to 99
(2) in this type of access0-list we can ithre permit or
block the servise for the whole subnet.here subnet consern
wid the lan ip pool
expample -:
if we want to block www for the interire lan we have
implenet the standerd access-list
Is This Answer Correct ? | 2 Yes | 4 No |
Which statement about Ethernet networks is true? A. The advantage of a full duplex is the ability to transmit data over 111 cable B. Full duplex Ethernet requires a point-to-point connection when only two nodes are present C. Ethernet switches can use full duplex mode to connect multiple nodes to a single pod of a switch D. Half duplex is a cut through packet processing method that is vow fast little error correction Full duplex is a store and forward method that is slower but has better error correction
A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel
Name the protocol which can do load balancing on unequal cost also?
Identify 2 features of PPP CHAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) Less secure then PAP D.) Local router 'challenges' the remote router
The CSMA/CD Ethernet IEEE committee is defines as which of the following? A.) 802.2 B.) 802.3 C.) 802.4 D.) 802.5
What’s the default CDP holdtime in seconds for Cisco routers?
Based upon the exhibit, create a static route to 172.16.10.0 on Router A A.) Router# ip route 172.16.10.0 255.255.255.0 10.1.0.2 B.) Router(config)# ip static route 172.16.10.0 255.255.255.0 10.1.0.2 C.) Router(config)# ip route 172.16.10.0 10.1.0.2 D.) Router(config)# ip route 172.16.10.0 255.255.255.0 10.1.0.2
The Physical layer works with which of the following: A.) Segments B.) Datagrams C.) Packets D.) Bits E.) Frames
Identify the command to configure the router for IGRP autonomous system 100? A.) Router(config)# router igrp 100 B.) Router> router igrp 100 C.) Router# router igrp 100 D.) Router(config)# router igrp
When we use loop back ip?
Explain the matric of eigrp protocol?
Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0