Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

why we have to implement access list in router ??????what
is the benifit and how it is configure

Answer Posted / p lava kumar

NORMALY CISCO ROUTERS DID'T PROVIDE SECURITY ,IT ONLY DONE
ROUTING ....

IT ONLY PROVIDED BY PHYSICAL FIREWALLS....
BUT SOME OF ORGANASATIONS NO NEED TO USE FIREWALLS.....
SO, AT THAT CASE FOR OUR INTERNAL SECURITY . WE USE
ACCESSLIST TO PORVIDE THESE SERVICE.

BY USING THESE ACCESSLIST WE CAN DENY OR PERMIT SERVICES
LIKE PING,BROWSE,UPLOAD,,,,ETC
FOR A PARTICULAR USER OR GROUP OF CLIENTS.

Is This Answer Correct ?    8 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Which multicast ip eigrp protocol use?

1162


Define mac address?

1123


Explain why is udp lease favored when compared to tcp?

1180


Which reserve port no http use?

1158


Tell me how many hop counts are by default and how much you can increase in eigrp protocol?

1306


What is the difference between bus topology and hub?

1233


What is Transport and Tunnel mode?

2357


What is the default bandwidth size of t1 routers?

1112


Tell me which cable we connect in db-9?

1085


what are the different asymmetric algorithms?

2037


Explain the difference between flsm and vlsm?

1361


In which ios version 182 people can access router through telenet?

1086


Which protocol you manually enable route summarization?

1137


What is the terminal emulation?

1114


Can you explain the broader steps of how L2F establishes the tunnel?

2049