Answer Posted / jitendera
These basic rules should be followed when creating and
applying access lists:
One access list per protocol per direction.
Standard IP access lists should be applied closest
to the
destination.
Extended IP access lists should be applied closest
to the
source
only these two fundamental are the rules of the access-list
Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
Explain the difference between baseband and broadband transmission in ccna?
Tell me when we use standard access-list?
What is the difference between unicast, multicast, broadcast, and anycast?
Can you explain encapsulating, carrier and passenger protocol?
What is size of ipv4 mac address?
Which peer authentication method and which ipsec mode is used to connect to the branch locations?
Why we use debug command?
Which way of communication bus topology use?
Which multicast ip eigrp protocol use?
what are the different asymmetric algorithms?
What is ping utility?
Which company mange ip's?
What is a digital certificate?
Tell me which protocol comes under hybrid dynamic type?