why we have to implement access list in router ??????what
is the benifit and how it is configure
Answers were Sorted based on User's Feedback
Answer / 2504
i)because to create more security and control to our inter
network. using by the acl we can gave the access permission
to the user base requirement and no one can access
anything’s with out acl permission.
ii)to secure inter network and control the unauthorized
access in our network.
ii)go to global mode-> Wright acl by the requirement based
(fllow the acl ruels)-> assigned the which interface.
| Is This Answer Correct ? | 46 Yes | 1 No |
Answer / p lava kumar
NORMALY CISCO ROUTERS DID'T PROVIDE SECURITY ,IT ONLY DONE
ROUTING ....
IT ONLY PROVIDED BY PHYSICAL FIREWALLS....
BUT SOME OF ORGANASATIONS NO NEED TO USE FIREWALLS.....
SO, AT THAT CASE FOR OUR INTERNAL SECURITY . WE USE
ACCESSLIST TO PORVIDE THESE SERVICE.
BY USING THESE ACCESSLIST WE CAN DENY OR PERMIT SERVICES
LIKE PING,BROWSE,UPLOAD,,,,ETC
FOR A PARTICULAR USER OR GROUP OF CLIENTS.
| Is This Answer Correct ? | 8 Yes | 0 No |
Answer / yunus kureshi
To Filter The Traffic To Router And Provide Security.
| Is This Answer Correct ? | 5 Yes | 2 No |
Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, that network is advertised with an infinite metric
Which addresses are INCORRECTLY paired with their class? A. 1 to 126, Class A B. 128 to 191, Class A C. 1 to 126, Class B D. 128 to 191, Class B
What are the possible ways of data transmission in ccna?
Which router command allows you to view the entire contents of all access lists? A. Router# show interface B. Router> show ip interface C. Router# show access-list D. Router> show all access-list
Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group
what is router?
Explain the draw back of eigrp protocol?
Define autonomous system (as)?
What is the difference between communication and transmission?
Explain why ip address called logical address?
what is the major difference between EIGRP & IGRP?
Which peer authentication method and which ipsec mode is used to connect to the branch locations?