What is difference between standard and extended access-list
Answers were Sorted based on User's Feedback
Answer / gaurav kumar sharma
standard IP access list provides basic packet filtering
abilities, based on the source IP address of a packet only.
As a general rule, apply standard IP access lists close to
the destination network to which you wish to permit or deny
access.Standard IP access lists fall into the numerical
range 1-99
Unlike standard IP access lists (which only allow you to
filter packets based on their source IP address), extended
IP access lists allow a much more granular level of
control. Extended IP access lists allow filtering not only
on source addresses, but also on destination addresses,
protocols, and even applications, based on their port
number. For example, you might choose to permit or deny a
group of hosts from accessing a particular server, limit
access to a telnet server to only a single host, or
similar.Extended IP access lists are identified through
their use of the 100-199 numerical range.
| Is This Answer Correct ? | 217 Yes | 19 No |
Difference between Standard ACL & Extended ACL -
a) In Standard ACL, filtering is based on source IP address.
where as in extended ACL, filtering is bases on Source IP
address, Destination IP address, Protocol Type, Source Port
Number & Destination Port Number.
b) Standard ACL are used to block particular host or sub
network. where as Extended ACL is used to block particular
services.
c)Standard ACL is implemented as possible closer to
destination. where as Extended ACL is implemented as
possible closer to source.
d) Standard ACL is created from 1 - 99 & extended range 1300
- 1999. where as Extended ACL is created from 100 - 199 &
extended range 2000 - 2699.
e) In Standard ACL, two communication will be blocked, where
as in Extended ACL, one way communication will be blocked.
f) In Standard ACL, all services will be blocked. Where as
in Extended ACL, particular services wil be blocked.
Hope this much of difference will help u guys. Keep posting
new question plzzzz....!!!
Thanking you
Shahin
| Is This Answer Correct ? | 148 Yes | 7 No |
Answer / sachin
In standard access-list the range area is 0-99 but in case
of extended access-list the range area is 100-199 and in
standard access-list we cannot create permission on
specific protocol like bloking the telnet or ftp......we
can do that in extended access-list.
| Is This Answer Correct ? | 81 Yes | 28 No |
Answer / harsh singh
standard access list has range area of 0-99
extended has 100-199.
| Is This Answer Correct ? | 60 Yes | 21 No |
Answer / manoranjan
Standard access list basically used to filter packets by IP
address & is basically close to the destination router.(1-99)
Extended access list is used to filter packets based on
address ,protocol & port no. dedicated for particular
services.(100-199)
| Is This Answer Correct ? | 44 Yes | 11 No |
Mr. Diwakar... Nice question...
As we know, Extended ACL is basically used to block
particular services like telnet. ftp, tftp, ICMP echo etc.....
Now if we apply it near to destination, then data will flow
all the way to destination.. thn on particular interface on
the destination it'll droped.
So my question for you.... if u want to block particular
services then why u r letting data traffic to go near to
destination n thn droped?????
It may unnecessary using network bandwidth. Which is waste
as far as my concern. Hope it helps u to clear your doubts.
Cheers
Shahin
| Is This Answer Correct ? | 28 Yes | 2 No |
Answer / naveen kumar sharma
In standard access-list we can filter the packet after
routing.and it will applied on destination router.its depend
only on source ip address.
but in case of extended access list we can filter the packet
before routing,and it will applied on source router,its
depend on source ip,destination ip,port and protocol.
| Is This Answer Correct ? | 39 Yes | 18 No |
Answer / awanish kumar sharma
Standared IP access list is based on IP address.Apply close
to the destination that can only filter packet based on
there source IP address.Numeric value from 1-99,1300-1399
Extended IP access list is based on Port address.Apply
close to source that can filter not only source address but
also destination address based on there port number.Numeric
value from 100-199.Allow more grangular level of controle.
| Is This Answer Correct ? | 23 Yes | 5 No |
Answer / nizam
When you enable standard access-list it will block entire
thing but extended access-list can block every port like
ftp,telnet etc.
Standard range is 1-99 and extended range is 100-199.
| Is This Answer Correct ? | 21 Yes | 5 No |
Answer / raju
1)Standard access list ranges from 1-99 and extended access
list ranges from 100-199,
2) Standard access list filter the packet based on
perticular source Ip or Network address,where it comes
From,,Ex,,,,,if i put Permit or Deny host 172.23.152.200
or 172.23.152.0 it will blocks or allows(As per Deny or
Permit statement) all the packets which comes from the
perticular Ip address or Network Address completly
Extended Access list can do some extraa activity like
permit or deny on basis of protocols,Packet types like
ICMP,UDP,TCP,,,,,,,,RIP,,,,,,,,,,,,,,,,
By Raju
9164626660
| Is This Answer Correct ? | 8 Yes | 1 No |
What command will not display the status of to1? A.) show int to1 B.) show to1 C.) show interface to1 D.) show interface
Identify the OSI layer responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP
As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this? A. interface ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0.2 ipx network 6c B. interface ethernet 0 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0 ipx encapsulation sap ipx network 6c C. interface ethernet 0.1 ipx encapsulation Novell-ether interface ethernet 0.2 ipx encapsulation sap D. interface ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c
What is the purpose and default value of the CDP timer command? A.) 90 seconds; interval before an entry expires B.) 60 seconds; interval between updates C.) 60 seconds; interval before an entry expires D.) 90 seconds; interval between updates
What is the regional Telco office called, where the customers local loop terminates? A.) Demarc B.) DTE C.) DCE D.) CO E.) CPE
why we use AS no. in IGRP and EIGRP?
what is distance vector protocol link state protocol and what is the diffrence between them
Bridges work at what layer of the OSI model? A.) Data Link B.) Network C.) Physical D.) Application
12 Answers KVS, PGT,
Which two steps are required to confound and apply standard access lists on an interface? (Choose two) A. define an access list number and its parameters B. enable an interface to become part of the access list group C. define the number of access lists to be supported on an interface D. copy the access list definition to each interface that will support it
Can you define in short what VPN is?
Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not a the same time
How many (minimum and maximum) ports are present in a router?