friends i have some problem in the acess list plz help me
out.
purbi sinha.
1 what is the diffrence b/w inbound and out bound access
list
2 what is main diffrence betwwen standred acesslist and
extended access list
3 where should i keep stnadred access list and exatended
access list i mean at which interface and why?
4 why wild card masking is used
5 what is switch febric in switching
plz help me out i am litle bit confuse


Answer Posted / jitendera kuamr sinha

hi purbi
i think this will help u about urs problem
1 queston-what is diffrence between inbound and outbound
access lisst.
the answer is
inbound access-list#inbound access list is conserned with
when ever we apply inbound access list to any interface
then all packets pass through acces list before being roued
to the outbound interface.
understand?
no?
take a eaxmaple
ok when ever we apply accesslist to the e0 enetrface
now what happen before going to outbound that is at s0
interface it will pass through the accesslist implmented on
the e0 interface.this is the exampl of inbound acces list
now
out bond accesslist#when this type of access list is
apploed through the outband packets on an interface then
these packet rputed first and then go to the access list
interfcae
as for example
apply asses lisst on s0 then any packet will firstly routed
from the e0 interface and then it will passes throug aceess
list
i am giving that example for understanding abt topics and
this is not a rule
ok
now your 2nd questions is what is the diff between standred
access list and exatnded access list.
if a diffrence it by its range then it is not fare u alrady
know what abt the ranges abt those
so i am not going to desribr it
ok the main diff betwwen standred access list and extanded
access list on the baisis of packet filtring is that
stndred acees list filter n/w trrafic by examin by examin
the source ip address.where as a extended acesslist filter
n/w trafic on the basic of sourse ip address and
destination ip address.

3rd
whrer should we plasd standed acess list and extanded acess
list
1 place std acess list as close to distinationa asclose as
poosible
2 place extened accs list list as close as to sourse
resion is very vital and not possible to dscribe here
becoz i a in cyber cafee and donot have the time
ok plz read todd lamley for ccna
now wilad card masking is used for specify a individual
host or a grou of range of host
this is the one of the important use of wild card masking
now the last one is switch frbric-
switch febric is a group of switch sharing same v-lan
information
for further plz read(farme tagging)
thank
hope this might help you
jitendera kuamr sinha

Is This Answer Correct ?    4 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the name of algorithm of eigrp protocol?

644


Tell us the name of algorithm of eigrp protocol?

620


Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?

1655


What is 100BaseFX?

739


What is the function of a router?

618






On which bas ospf take decision?

650


What is the difference between ‘bit rate’ and ‘baud rate’?

626


1>What do you mean by Networks and Networking? 2>Difference between Vlan And Sub Interface Vlan? 3>What is Fiber Optic Media Converter? 4>What is Firewall? 5>Difference Between Layer2 and Layer3 Switch? 6>What is the function of Multilayer Switch? 7>Expalin STP? What is the Difference between STP and MST? 8>What is the Function of VTP?Explain the modes of VTP? 9>What kind of Message VTp will Send? 10>What is the Difference between Normal and Manageable Switch? 11>Difference between Local Vlan and End to End Vlan? 12>Difference between Distance Vector and Link State Routing protocol? 13>What do you mean by Backbone Fast Port? 14>what is Root Guard and BPDU Guard?

1947


What is subnet? Why is it used?

680


Mention what are the ranges for the private ips?

640


What are the different types of password used in securing a cisco router?

659


hi shain can u send me some detail about bgp so that i can enhance my knowledge over bgp and can you also teach me about the process of suppernating. now what i am thinking that this could be last visit on that site overhere.so please mail that short of thing on my gmail id i am requesting to all of the visitor that please send theire doubt or question to my new gmail id which is jitendera.ccnainterview@gmail.com.i will try to solve it if i am capable to do it Wishing all of you for great future Jitendera kaumar sinha

2023


What is the usage of service password encryption?

699


Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)

772


Hi, Can any one please tell me the experience of their CCNA interview,and please tell me all the questions they asked in the interview. Many Thanks...

1670