Answer Posted / jitendera
These basic rules should be followed when creating and
applying access lists:
One access list per protocol per direction.
Standard IP access lists should be applied closest
to the
destination.
Extended IP access lists should be applied closest
to the
source
only these two fundamental are the rules of the access-list
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What is GRE in PPTP?
On which interface we always apply access-list?
Explain how many collision domains are in switch?
Do you know how many types of data?
Tell me when we use extended access-list?
Define osi?
What do you understand by redundancy?
What are the advantages of layered model in networking industry?
Mention what is the difference between tcp and udp?
2500 Value in which type of access list?
How many valid ip will b in /21 in route summarization?
Do we subletting of ip?
How do areas benefit a link state inter network?
Explain the difference between flsm and vlsm?
How are straight and crossable cables different from each other?