Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


why we have to implement access list in router ??????what
is the benifit and how it is configure

Answers were Sorted based on User's Feedback



why we have to implement access list in router ??????what is the benifit and how it is configure..

Answer / 2504

i)because to create more security and control to our inter
network. using by the acl we can gave the access permission
to the user base requirement and no one can access
anything’s with out acl permission.
ii)to secure inter network and control the unauthorized
access in our network.
ii)go to global mode-> Wright acl by the requirement based
(fllow the acl ruels)-> assigned the which interface.

Is This Answer Correct ?    46 Yes 1 No

why we have to implement access list in router ??????what is the benifit and how it is configure..

Answer / p lava kumar

NORMALY CISCO ROUTERS DID'T PROVIDE SECURITY ,IT ONLY DONE
ROUTING ....

IT ONLY PROVIDED BY PHYSICAL FIREWALLS....
BUT SOME OF ORGANASATIONS NO NEED TO USE FIREWALLS.....
SO, AT THAT CASE FOR OUR INTERNAL SECURITY . WE USE
ACCESSLIST TO PORVIDE THESE SERVICE.

BY USING THESE ACCESSLIST WE CAN DENY OR PERMIT SERVICES
LIKE PING,BROWSE,UPLOAD,,,,ETC
FOR A PARTICULAR USER OR GROUP OF CLIENTS.

Is This Answer Correct ?    8 Yes 0 No

why we have to implement access list in router ??????what is the benifit and how it is configure..

Answer / yunus kureshi

To Filter The Traffic To Router And Provide Security.

Is This Answer Correct ?    5 Yes 2 No

Post New Answer

More CCNA Interview Questions

What are the Timer of RIP, IGRP, EIGRP and OSPF Routing Protocol?

20 Answers   IBM,


Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, the router enters in its table the number 16 to signify destination unreachable

1 Answers   Google,


What is passive topology in ccna?

0 Answers  


Identify the default IPX serial encapsulation? A.) Novell-Ether B.) SDLC C.) SNAP D.) HDLC

1 Answers  


What is name of ospf algo?

0 Answers  


What are the steps of conversion for data encapsulation?

0 Answers  


Hi, Jitendra thanks for giving me answer of intervlan routing. it helps me to clear my concepts. Actually I am appearing for CCNA globel Certification exam in next month can some provides me tips for preparing exams. for ex. Notes, dumps on my email. umesh.pede402@gmail.com

3 Answers  


In which access- list type you can't do editing?

0 Answers  


Which address or number is used to pass the data to the correct application? MAC Number IP address Port Number Segment Number

2 Answers  


Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application

2 Answers  


Which is not a common problem with Distance-Vector routing? A.) Slow convergence. B.) Complex configuration. C.) Routing loops. D.) Periodic updates can slow convergence. E.) Counting to infinity.

1 Answers  


Which statement about Ethernet switches is true? A. Symmetric switching allows connection between pods of unlike bandwidth and does not require memory buffering B. Memory Buffering is used to prevent a bottleneck when pods of different bandwidth are connected on a symmetric switch C. The latency can be reduced if the switch utilizes the store and forward method of switching store and forward is better for error detection D. The cut through method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address

1 Answers  


Categories