Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


why we have to implement access list in router ??????what
is the benifit and how it is configure

Answers were Sorted based on User's Feedback



why we have to implement access list in router ??????what is the benifit and how it is configure..

Answer / 2504

i)because to create more security and control to our inter
network. using by the acl we can gave the access permission
to the user base requirement and no one can access
anything’s with out acl permission.
ii)to secure inter network and control the unauthorized
access in our network.
ii)go to global mode-> Wright acl by the requirement based
(fllow the acl ruels)-> assigned the which interface.

Is This Answer Correct ?    46 Yes 1 No

why we have to implement access list in router ??????what is the benifit and how it is configure..

Answer / p lava kumar

NORMALY CISCO ROUTERS DID'T PROVIDE SECURITY ,IT ONLY DONE
ROUTING ....

IT ONLY PROVIDED BY PHYSICAL FIREWALLS....
BUT SOME OF ORGANASATIONS NO NEED TO USE FIREWALLS.....
SO, AT THAT CASE FOR OUR INTERNAL SECURITY . WE USE
ACCESSLIST TO PORVIDE THESE SERVICE.

BY USING THESE ACCESSLIST WE CAN DENY OR PERMIT SERVICES
LIKE PING,BROWSE,UPLOAD,,,,ETC
FOR A PARTICULAR USER OR GROUP OF CLIENTS.

Is This Answer Correct ?    8 Yes 0 No

why we have to implement access list in router ??????what is the benifit and how it is configure..

Answer / yunus kureshi

To Filter The Traffic To Router And Provide Security.

Is This Answer Correct ?    5 Yes 2 No

Post New Answer

More CCNA Interview Questions

What is ping? What is the usage of ping?

0 Answers  


Identify 3 characteristics of IP RIP? A.) Distance vector B.) Administrative distance is 120 C.) Periodic updates every 60 seconds D.) Uses a composite metric E.) Can load balance

1 Answers  


Suppose we are having two router i.e. Router1 and Router 2 connected with each other on Serial Link,Router Network having ip 192.168.1.0/24. 1> which ip is used at router1 and router2 interface? 2>Which Command is used to assign ip to router1 and router2 interface?

1 Answers  


Explain on which interface we always apply access-list?

0 Answers  


Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0

0 Answers  


Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) Ping D.) Console E.) Trace

2 Answers  


What is a characteristic of Store and Forward switches? A.) They work at wire speed. B.) They are the same as Cut-Through switching in 'prune' mode. C.) They forward based on transport layer info. D.) They forward the frame before it is completely read. E.) They increase latency.

2 Answers  


Can you explain what IPSec is

2 Answers   CCIE,


Which layer is responsible for putting 1s and 0s into a logical group? A.) Session B.) Application C.) Transport D.) Data Link E.) Physical F.) Network

2 Answers  


what is telnet,ssh?? what is the perpose of this? wer r this configured and how to configured??

2 Answers  


hi all.. can any one explain the complete topology of stp and rstp how it works . root swtch connects to a root port and then root port conenct to other switchs designated port. i was going thru his site http://www.cisco.com/en/US/tech/tk389/tk621/technologies_whi te_paper09186a0080094cfa.shtml in which DR also exist on root switch only which makes my understanding grim.I had a diff notion of stp all together. please post asap. and if possible refer a url so thst i can read it my self .. thanks

1 Answers  


What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer

1 Answers  


Categories