why we have to implement access list in router ??????what
is the benifit and how it is configure
Answers were Sorted based on User's Feedback
Answer / 2504
i)because to create more security and control to our inter
network. using by the acl we can gave the access permission
to the user base requirement and no one can access
anything’s with out acl permission.
ii)to secure inter network and control the unauthorized
access in our network.
ii)go to global mode-> Wright acl by the requirement based
(fllow the acl ruels)-> assigned the which interface.
| Is This Answer Correct ? | 46 Yes | 1 No |
Answer / p lava kumar
NORMALY CISCO ROUTERS DID'T PROVIDE SECURITY ,IT ONLY DONE
ROUTING ....
IT ONLY PROVIDED BY PHYSICAL FIREWALLS....
BUT SOME OF ORGANASATIONS NO NEED TO USE FIREWALLS.....
SO, AT THAT CASE FOR OUR INTERNAL SECURITY . WE USE
ACCESSLIST TO PORVIDE THESE SERVICE.
BY USING THESE ACCESSLIST WE CAN DENY OR PERMIT SERVICES
LIKE PING,BROWSE,UPLOAD,,,,ETC
FOR A PARTICULAR USER OR GROUP OF CLIENTS.
| Is This Answer Correct ? | 8 Yes | 0 No |
Answer / yunus kureshi
To Filter The Traffic To Router And Provide Security.
| Is This Answer Correct ? | 5 Yes | 2 No |
What is ping? What is the usage of ping?
Identify 3 characteristics of IP RIP? A.) Distance vector B.) Administrative distance is 120 C.) Periodic updates every 60 seconds D.) Uses a composite metric E.) Can load balance
Suppose we are having two router i.e. Router1 and Router 2 connected with each other on Serial Link,Router Network having ip 192.168.1.0/24. 1> which ip is used at router1 and router2 interface? 2>Which Command is used to assign ip to router1 and router2 interface?
Explain on which interface we always apply access-list?
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) Ping D.) Console E.) Trace
What is a characteristic of Store and Forward switches? A.) They work at wire speed. B.) They are the same as Cut-Through switching in 'prune' mode. C.) They forward based on transport layer info. D.) They forward the frame before it is completely read. E.) They increase latency.
Can you explain what IPSec is
Which layer is responsible for putting 1s and 0s into a logical group? A.) Session B.) Application C.) Transport D.) Data Link E.) Physical F.) Network
what is telnet,ssh?? what is the perpose of this? wer r this configured and how to configured??
hi all.. can any one explain the complete topology of stp and rstp how it works . root swtch connects to a root port and then root port conenct to other switchs designated port. i was going thru his site http://www.cisco.com/en/US/tech/tk389/tk621/technologies_whi te_paper09186a0080094cfa.shtml in which DR also exist on root switch only which makes my understanding grim.I had a diff notion of stp all together. please post asap. and if possible refer a url so thst i can read it my self .. thanks
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer