Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is Standard ACLs?

Answers were Sorted based on User's Feedback



What is Standard ACLs?..

Answer / shahin

Jitu, as far as my knowledge,

ACLs are classified into two types based on the configuration -

1. Standard ACL.

2. Extended ACL.

ACLs are classified into two types based on the
identification -

1. Named ACL

2. Numbered ACL.

Example:

1. If we use an unique number for the the identification of
Standard/Extended ACL, then it is called Numbered
Standard/Exteded ACL.

2. If we use a name for the the identification of
Standard/Extended ACL, then it is called Named
Standard/Exteded ACL.

Is This Answer Correct ?    3 Yes 0 No

What is Standard ACLs?..

Answer / vikram pratap singh

Standard ACLs check the source address of IP packets that
are routed.

The comparison will result in either permit or deny access
for an entire protocol suite, based on the network, subnet,
and host addresses.

The standard version of the access-list global configuration
command is used to define a standard ACL with a number in
the range of 1 to 99 (also from 1300 to 1999 in recent IOS).

If there is no wildcard mask. the default mask is used,
which is 0.0.0.0.
(This only works with Standard ACLs and is the same thing as
using host.)

The full syntax of the standard ACL command is:

Router(config)#access-list access-list-number {deny |
permit} source [source-wildcard ] [log]

The no form of this command is used to remove a standard
ACL. This is the syntax:
Router(config)#no access-list access-list-number

Is This Answer Correct ?    3 Yes 2 No

What is Standard ACLs?..

Answer / jitendra

shain
ya u r right
but onse u go in the depth ou will find more type of access list

like time based access-list and more


so access-list is basicaly two type onlly
standred and extended

Is This Answer Correct ?    0 Yes 0 No

What is Standard ACLs?..

Answer / s.m.feroz ahmed

ACL is defined as Access Control List and ACL can be
Configured for Permit or Deny access.

Is This Answer Correct ?    1 Yes 2 No

What is Standard ACLs?..

Answer / jitendera sinha

There are manily three type of access-list (as per ccna )
(1) satndred accss-list
(2) extended access list
(3) named access-list

Satndred access-list-:
(1) its value lie betwwen 1 to 99
(2) in this type of access0-list we can ithre permit or
block the servise for the whole subnet.here subnet consern
wid the lan ip pool
expample -:
if we want to block www for the interire lan we have
implenet the standerd access-list

Is This Answer Correct ?    2 Yes 4 No

Post New Answer

More CCNA Interview Questions

Hi -All Can you tell me About of NAt (Network Address Tranlator) bcoz i have no idea about this topics Such as local ip , global ip and all plz provide the deatil of this topics

3 Answers  


Which of the following are valid WAN terms? A.) DTE B.) DCE C.) Demarc D.) CPE

3 Answers   IBM,


The CSMA/CD Ethernet IEEE committee is defines as which of the following? A.) 802.2 B.) 802.3 C.) 802.4 D.) 802.5

1 Answers  


What is the purpose of data link layer?

0 Answers  


Name the 2 protocols are in wan technology?

0 Answers  


what is diffrence betwwen mpls and frame really

1 Answers   Aptron, Volvo,


Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward

1 Answers  


What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message

1 Answers  


What command do you enter at the keyboard to begin a user mode session? A.) Type 'CTRL-P' B.) Type 'login' C.) Just press . D.) Type 'enable' E.) Press 'Shift + Ctrl + 6' at the same time.

1 Answers  


Your network uses a Class C address of 210.10.10.0. You must now split up the network into separate shores to handle multiple buildings separated by routers. Which two steps must you take to determine the proper shored mask for your networks? (Choose two) A. determine the number of seperate networks required B. determine how many devices will require DHCP addressing C. determine the maximum number of hosts that will be on each shored D. determine the miniumum number of hosts that will be on each shored E. determine which router will be the IP default gateway for each shored

1 Answers  


What is HSRP and what is difference between HSRP and GLBP

2 Answers   Infosys,


The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.

2 Answers  


Categories