why we have to implement access list in router ??????what
is the benifit and how it is configure
Answers were Sorted based on User's Feedback
Answer / 2504
i)because to create more security and control to our inter
network. using by the acl we can gave the access permission
to the user base requirement and no one can access
anything’s with out acl permission.
ii)to secure inter network and control the unauthorized
access in our network.
ii)go to global mode-> Wright acl by the requirement based
(fllow the acl ruels)-> assigned the which interface.
| Is This Answer Correct ? | 46 Yes | 1 No |
Answer / p lava kumar
NORMALY CISCO ROUTERS DID'T PROVIDE SECURITY ,IT ONLY DONE
ROUTING ....
IT ONLY PROVIDED BY PHYSICAL FIREWALLS....
BUT SOME OF ORGANASATIONS NO NEED TO USE FIREWALLS.....
SO, AT THAT CASE FOR OUR INTERNAL SECURITY . WE USE
ACCESSLIST TO PORVIDE THESE SERVICE.
BY USING THESE ACCESSLIST WE CAN DENY OR PERMIT SERVICES
LIKE PING,BROWSE,UPLOAD,,,,ETC
FOR A PARTICULAR USER OR GROUP OF CLIENTS.
| Is This Answer Correct ? | 8 Yes | 0 No |
Answer / yunus kureshi
To Filter The Traffic To Router And Provide Security.
| Is This Answer Correct ? | 5 Yes | 2 No |
What are the Timer of RIP, IGRP, EIGRP and OSPF Routing Protocol?
Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, the router enters in its table the number 16 to signify destination unreachable
What is passive topology in ccna?
Identify the default IPX serial encapsulation? A.) Novell-Ether B.) SDLC C.) SNAP D.) HDLC
What is name of ospf algo?
What are the steps of conversion for data encapsulation?
Hi, Jitendra thanks for giving me answer of intervlan routing. it helps me to clear my concepts. Actually I am appearing for CCNA globel Certification exam in next month can some provides me tips for preparing exams. for ex. Notes, dumps on my email. umesh.pede402@gmail.com
In which access- list type you can't do editing?
Which address or number is used to pass the data to the correct application? MAC Number IP address Port Number Segment Number
Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application
Which is not a common problem with Distance-Vector routing? A.) Slow convergence. B.) Complex configuration. C.) Routing loops. D.) Periodic updates can slow convergence. E.) Counting to infinity.
Which statement about Ethernet switches is true? A. Symmetric switching allows connection between pods of unlike bandwidth and does not require memory buffering B. Memory Buffering is used to prevent a bottleneck when pods of different bandwidth are connected on a symmetric switch C. The latency can be reduced if the switch utilizes the store and forward method of switching store and forward is better for error detection D. The cut through method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address