why we have to implement access list in router ??????what
is the benifit and how it is configure
Answers were Sorted based on User's Feedback
Answer / 2504
i)because to create more security and control to our inter
network. using by the acl we can gave the access permission
to the user base requirement and no one can access
anything’s with out acl permission.
ii)to secure inter network and control the unauthorized
access in our network.
ii)go to global mode-> Wright acl by the requirement based
(fllow the acl ruels)-> assigned the which interface.
| Is This Answer Correct ? | 46 Yes | 1 No |
Answer / p lava kumar
NORMALY CISCO ROUTERS DID'T PROVIDE SECURITY ,IT ONLY DONE
ROUTING ....
IT ONLY PROVIDED BY PHYSICAL FIREWALLS....
BUT SOME OF ORGANASATIONS NO NEED TO USE FIREWALLS.....
SO, AT THAT CASE FOR OUR INTERNAL SECURITY . WE USE
ACCESSLIST TO PORVIDE THESE SERVICE.
BY USING THESE ACCESSLIST WE CAN DENY OR PERMIT SERVICES
LIKE PING,BROWSE,UPLOAD,,,,ETC
FOR A PARTICULAR USER OR GROUP OF CLIENTS.
| Is This Answer Correct ? | 8 Yes | 0 No |
Answer / yunus kureshi
To Filter The Traffic To Router And Provide Security.
| Is This Answer Correct ? | 5 Yes | 2 No |
What is true when creating static route? A.) The mask parameter is optional B.) The administrative distance is required C.) The gateway parameter is required D.) The administrative distance is optional
Which router component stores routing tables APP cache and packet buffers? A. ROM B. RAM C. AVRAM D. Flash memory
Each department has its own file server and the company has an enterprise server that is shared by all departments. What does a network administrator use to provide a secure separation between the management and sales departments? A. a bridge between management and sales B. routers to provide the most secure segmentation C. a hub to provide ease of management and a satisfactory alternative for network security D. an Ethernet switch to maintain secure separationthrough programming the access lists for each port of the switch
Difference between Distance vector, Link state protocols
What does the IPX maximum path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)
friends i have some problem in the acess list plz help me out. purbi sinha. 1 what is the diffrence b/w inbound and out bound access list 2 what is main diffrence betwwen standred acesslist and extended access list 3 where should i keep stnadred access list and exatended access list i mean at which interface and why? 4 why wild card masking is used 5 what is switch febric in switching plz help me out i am litle bit confuse
What is the formula for metric of ospf?
I received a call from client that network is down. We have 100 or 1000 of switches and routers so how could we find the client switch and its port number? and useful commands to find this ?
What parameter is used with statically assigned routers to tell packets which interface to use to reach a distant network? A.) Mask B.) Subnet C.) Default gateway D.) Interface
switch kitne volt per work karta hai. what is frame realy. what is isdn and pri and bri.
what is meant by wild card mask and why can't we use in eigrp ?
Which command listed below sets the banner message when someone connects to the router? A.) message # B.) banner # C.) login banner # D.) description # E.) login description # F.) banner motd #