what is standard and extended acess list?
what are the commands for extended and acess list?

Answers were Sorted based on User's Feedback



what is standard and extended acess list? what are the commands for extended and acess list?..

Answer / agen

Standard access list check only the source ip address and
it should be placed close to the destination

Extended access list checks both source,destination ip
address and it should be placed close to the source

COMMAND FOR EXTENDED ACCESS_LIST

Router(config)#access-list<no><action><protocol>
<source add><source WCM><source port no>
<destination add><destination WCM><destination port no>

Is This Answer Correct ?    9 Yes 0 No

what is standard and extended acess list? what are the commands for extended and acess list?..

Answer / karthik.r

Standard Access List – We can permit or deny IP address.

In extended access List – We Can permit or deny the
protocol port Numbers

Is This Answer Correct ?    3 Yes 2 No

what is standard and extended acess list? what are the commands for extended and acess list?..

Answer / gautam mishra

standard excess list is based on the source ip address,

it can full permit or full deny

while

extended access list is based on the source and the
destination ip address and is applied through the port
nubers.

Is This Answer Correct ?    2 Yes 2 No

Post New Answer

More CCNA Interview Questions

Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface

2 Answers   Wipro,


What IP command would you use to test the entire IP stack? A.) Stack-test B.) Arp C.) Telnet D.) Ping E.) Trace

2 Answers  


Differentiate full-duplex from half-duplex.

0 Answers  


Which layer is responsible for identifying and establishing the availability of the intended communication partner? A.) Application B.) Presentation C.) Transport D.) Session E.) Network

1 Answers  


Which protocol can do load balancing on unequal cost also?

0 Answers  






What is the Difference between Switch and Bridge?

9 Answers  


Explain the types of communication in ipv4?

0 Answers  


Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full

1 Answers  


Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether

1 Answers  


What is the routing metric used by IGRP? A.) MTU, delay, bandwidth, reliability, and loading B.) Count to infinity C.) TTL D.) Hop count

1 Answers  


What is a key use of a device hardware address? A. to obtain a vendor code / serial number from the user B. to transmit a frame from one Interface to another Interface C. to transmit a packet from one local device to another local device D. to transmit data from one local device to a remote device across the internet E. to contain logical information about the device to use for end-to-end transmission

1 Answers  


When using access lists, what does a Cisco router check first? A. To see if the packet is routable or bridgeable B. The destination address C. The source address D. The packet contents

1 Answers  


Categories