Answer Posted / jitendera
These basic rules should be followed when creating and
applying access lists:
One access list per protocol per direction.
Standard IP access lists should be applied closest
to the
destination.
Extended IP access lists should be applied closest
to the
source
only these two fundamental are the rules of the access-list
Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What is difference between tcp/ip and osi model?
Mention what are the ranges for the private ips?
Which command we give for see routing table?
What is the difference between csma/cd and csma/ca?
Which defined peer ip address an local subnet belong to crete?
What is ospf? Describe it.
What are the different memories that are used in a cisco router?
What is half duplex and full duplex?
State the difference between dynamic IP and static IP addressing?
What is Route Poisoning?
Explain protocol?
How do areas benefit a link state inter network?
Which type of updates eigrp protocol do?
Mention what is the difference between the switch, hub, and router?
What are the different ways authentication mechanism in VPN?