What is Standard ACLs?

Answers were Sorted based on User's Feedback



What is Standard ACLs?..

Answer / shahin

Jitu, as far as my knowledge,

ACLs are classified into two types based on the configuration -

1. Standard ACL.

2. Extended ACL.

ACLs are classified into two types based on the
identification -

1. Named ACL

2. Numbered ACL.

Example:

1. If we use an unique number for the the identification of
Standard/Extended ACL, then it is called Numbered
Standard/Exteded ACL.

2. If we use a name for the the identification of
Standard/Extended ACL, then it is called Named
Standard/Exteded ACL.

Is This Answer Correct ?    3 Yes 0 No

What is Standard ACLs?..

Answer / vikram pratap singh

Standard ACLs check the source address of IP packets that
are routed.

The comparison will result in either permit or deny access
for an entire protocol suite, based on the network, subnet,
and host addresses.

The standard version of the access-list global configuration
command is used to define a standard ACL with a number in
the range of 1 to 99 (also from 1300 to 1999 in recent IOS).

If there is no wildcard mask. the default mask is used,
which is 0.0.0.0.
(This only works with Standard ACLs and is the same thing as
using host.)

The full syntax of the standard ACL command is:

Router(config)#access-list access-list-number {deny |
permit} source [source-wildcard ] [log]

The no form of this command is used to remove a standard
ACL. This is the syntax:
Router(config)#no access-list access-list-number

Is This Answer Correct ?    3 Yes 2 No

What is Standard ACLs?..

Answer / jitendra

shain
ya u r right
but onse u go in the depth ou will find more type of access list

like time based access-list and more


so access-list is basicaly two type onlly
standred and extended

Is This Answer Correct ?    0 Yes 0 No

What is Standard ACLs?..

Answer / s.m.feroz ahmed

ACL is defined as Access Control List and ACL can be
Configured for Permit or Deny access.

Is This Answer Correct ?    1 Yes 2 No

What is Standard ACLs?..

Answer / jitendera sinha

There are manily three type of access-list (as per ccna )
(1) satndred accss-list
(2) extended access list
(3) named access-list

Satndred access-list-:
(1) its value lie betwwen 1 to 99
(2) in this type of access0-list we can ithre permit or
block the servise for the whole subnet.here subnet consern
wid the lan ip pool
expample -:
if we want to block www for the interire lan we have
implenet the standerd access-list

Is This Answer Correct ?    2 Yes 4 No

Post New Answer

More CCNA Interview Questions

Identify the hardware component used to store buffers, tables, running-configuration etc? A.) NVRAM B.) ROM C.) RAM D.) Flash

4 Answers  


Which mode we can't skip when we come back from interface mode?

0 Answers  


Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199

1 Answers  


What is the difference between TCP and UDP? A.) TCP is connection-oriented; UDP uses acknowledgements only B.) TCP is connection-oriented; UDP is connectionless C.) Both TCP and UDP are connection-oriented, but only TCP uses windowing D.) TCP and UDP both have sequencing, but UDP is connectionless

2 Answers  


Can you explain transport and tunnel mode in detail with datagram packets?

1 Answers   CCIE,






Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode

3 Answers  


How to find Router Serial interface MAC address?

9 Answers   Wipro,


Which statement about an IP network is true? A. A broadcast source MAC address contains all zeros B. A MAC address is part of the physical layer of the OSI model C. MAC addresses are used by bridges to make forwarding decisions. IP address are used by routers. D. IP addresses allow a flat addressing scheme. MAC addresses use a hierarchical addressing scheme.

2 Answers  


What are the ranges for the private ips?

0 Answers  


Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address

1 Answers  


Which protocol is used for booting diskless workstations? A.) IP B.) ARP C.) RARP D.) TCP E.) SNMP

3 Answers  


Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router

3 Answers  


Categories