What is Standard ACLs?
Answers were Sorted based on User's Feedback
Jitu, as far as my knowledge,
ACLs are classified into two types based on the configuration -
1. Standard ACL.
2. Extended ACL.
ACLs are classified into two types based on the
identification -
1. Named ACL
2. Numbered ACL.
Example:
1. If we use an unique number for the the identification of
Standard/Extended ACL, then it is called Numbered
Standard/Exteded ACL.
2. If we use a name for the the identification of
Standard/Extended ACL, then it is called Named
Standard/Exteded ACL.
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / vikram pratap singh
Standard ACLs check the source address of IP packets that
are routed.
The comparison will result in either permit or deny access
for an entire protocol suite, based on the network, subnet,
and host addresses.
The standard version of the access-list global configuration
command is used to define a standard ACL with a number in
the range of 1 to 99 (also from 1300 to 1999 in recent IOS).
If there is no wildcard mask. the default mask is used,
which is 0.0.0.0.
(This only works with Standard ACLs and is the same thing as
using host.)
The full syntax of the standard ACL command is:
Router(config)#access-list access-list-number {deny |
permit} source [source-wildcard ] [log]
The no form of this command is used to remove a standard
ACL. This is the syntax:
Router(config)#no access-list access-list-number
| Is This Answer Correct ? | 3 Yes | 2 No |
Answer / jitendra
shain
ya u r right
but onse u go in the depth ou will find more type of access list
like time based access-list and more
so access-list is basicaly two type onlly
standred and extended
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / s.m.feroz ahmed
ACL is defined as Access Control List and ACL can be
Configured for Permit or Deny access.
| Is This Answer Correct ? | 1 Yes | 2 No |
Answer / jitendera sinha
There are manily three type of access-list (as per ccna )
(1) satndred accss-list
(2) extended access list
(3) named access-list
Satndred access-list-:
(1) its value lie betwwen 1 to 99
(2) in this type of access0-list we can ithre permit or
block the servise for the whole subnet.here subnet consern
wid the lan ip pool
expample -:
if we want to block www for the interire lan we have
implenet the standerd access-list
| Is This Answer Correct ? | 2 Yes | 4 No |
raid can be used in? 1 NT 2 Netware 3 all of above mine answer -NT
Which layer is responsible for coordinating communication between systems? A.) Application B.) Network C.) Session D.) Transport E.) Physical F.) Data Link
Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in
what is ip address and what is the difference between the ip address and mac address why we are not using mac address instead of ip address
Explain the difference between baseband and broadband transmission in ccna?
Which EXEC command displays system hardwarde configuration information software version and the names and sources of configuration files and boot images on a router? A. show boot B. show flash C. show config D. show version
You have an IP host address of 201.222.5.121 and a subnet mask of 255.255.255.248. What is the broadcast address? A. 201.222.5.127 B. 201.222.5.120 C. 201.222.5.121 D. 201.222.5.122
What do we check while configuring the server?
Identify 3 characteristics of switches? A.) Increase available bandwidth B.) Decrease broadcast traffic C.) Support full duplex in a multipoint topology D.) Make forwarding decision using MAC address E.) Create collision domains
What do you mean by Port Mirroring?
Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) They are identical C.) They both require the enable password D.) User exec is a subset of the privileged exec
Why would you use static routing instead of dynamic routing? A.) When you want automatic updates of the routing tables B.) All the time C.) When you have very few routes and want to conserve bandwidth D.) When you have a gateway of last resort