what is standard and extended acess list?
what are the commands for extended and acess list?
Answers were Sorted based on User's Feedback
Answer / agen
Standard access list check only the source ip address and
it should be placed close to the destination
Extended access list checks both source,destination ip
address and it should be placed close to the source
COMMAND FOR EXTENDED ACCESS_LIST
Router(config)#access-list<no><action><protocol>
<source add><source WCM><source port no>
<destination add><destination WCM><destination port no>
| Is This Answer Correct ? | 9 Yes | 0 No |
Answer / gautam mishra
standard excess list is based on the source ip address,
it can full permit or full deny
while
extended access list is based on the source and the
destination ip address and is applied through the port
nubers.
| Is This Answer Correct ? | 2 Yes | 2 No |
what is a routing ?what is the use of routing?
8 Answers Google, IBM, Pacific, Tata Technologies,
When configuring the subnet mask for an IP address, which formats can be used?A. dotted-decimal. B. Hexadecimal C. Bit-count D. Octal E. Binary
What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP
Select the fields for the Cisco HDLC protocol: A. Flag, Address, Control B. Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag C. Flag, Address, Control, Data, FCS, Flag D. Flag, Address, Control, Proprietary, Data, FCS, Flag
In regards to TCP/IP, which class of address allows for the fewest valid Internet hosts? A.) D B.) E C.) Classes are not used in TCP/IP. D.) B E.) C F.) A
What is a L2F protocol?
In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.
Hi, If we create more Gateway from one our Router Interface Gateway (Example: by set up a ISA server etc) will it effect on our bandwidth to be low? please help me
Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link
. Which command sequence will allow only traffic from network 185.64.0.0 to enter interface s0? A. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-list 25 out B. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-group 25 out C. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-list 25 in D. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-group 25 in
What is BootP?
Describe ICMP messages