Answer Posted / jitendera
These basic rules should be followed when creating and
applying access lists:
One access list per protocol per direction.
Standard IP access lists should be applied closest
to the
destination.
Extended IP access lists should be applied closest
to the
source
only these two fundamental are the rules of the access-list
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
Hi Friend. i have to let you know that now i have been selected for cisco india in bangalore. i am thanking to all of you guys that u have been posted such good question and the respective answer. from today i will be not able to visit this site on regular basic and hopeing that you will continue to post the question.the question you are posting is not very usefull to you but also usefull to another. i am again thanking to all of you and hope for best for your feature. Jitendera kumar sinha Network engineer-L2 cisco india Bangalore
Can you explain encapsulating, carrier and passenger protocol?
What is the frame relay?
Explain what are partial updates?
What is the difference between static ip addressing and dynamic ip addressing?
Explain what is overlaod?
Wild card mask always in odd value or even?
Differentiate User Mode from Privileged Mode?
Tell me which cable called roll-over?
What cable called v.35?
What is cisco?
What is the virtual channel?
How many maximum paths you can give on latest ios in rip?
What is ospf? Describe it.
Tell me which multicast ip eigrp protocol use?