why we have to implement access list in router ??????what
is the benifit and how it is configure
Answers were Sorted based on User's Feedback
Answer / 2504
i)because to create more security and control to our inter
network. using by the acl we can gave the access permission
to the user base requirement and no one can access
anything’s with out acl permission.
ii)to secure inter network and control the unauthorized
access in our network.
ii)go to global mode-> Wright acl by the requirement based
(fllow the acl ruels)-> assigned the which interface.
| Is This Answer Correct ? | 46 Yes | 1 No |
Answer / p lava kumar
NORMALY CISCO ROUTERS DID'T PROVIDE SECURITY ,IT ONLY DONE
ROUTING ....
IT ONLY PROVIDED BY PHYSICAL FIREWALLS....
BUT SOME OF ORGANASATIONS NO NEED TO USE FIREWALLS.....
SO, AT THAT CASE FOR OUR INTERNAL SECURITY . WE USE
ACCESSLIST TO PORVIDE THESE SERVICE.
BY USING THESE ACCESSLIST WE CAN DENY OR PERMIT SERVICES
LIKE PING,BROWSE,UPLOAD,,,,ETC
FOR A PARTICULAR USER OR GROUP OF CLIENTS.
| Is This Answer Correct ? | 8 Yes | 0 No |
Answer / yunus kureshi
To Filter The Traffic To Router And Provide Security.
| Is This Answer Correct ? | 5 Yes | 2 No |
Tell me when we use extended access-list?
Given the Novell IPX address 1aceb0b.0000.0c12.3456 which part is the network portion of the address? A.) 0000 B.) 1 C.) 3456 D.) 1ace E.) 0000.0c12.3456 F.) 1aceb0b
Which two does 100BaseT use? A.) CSMA/CD B.) IEEE 802.5 C.) 802.3u D.) Switching with 53-byte cells
Which OSI layer incorporates the MAC address and the LLC? A.) Data link B.) Network C.) Physcial D.) Transport
Does a bridge divides a network into smaller segments?
Hi, Jitendra/Shahin You both are masters of networking na. I am worrying about my exam. Is it vey tough?because my friend got failed in ccna. he is very talented person thogh he failed.
What does the command "IP name-server 255.255.255.255" accomplish? A. It sets the domain name lookup to be a local broadcast. B. This is an illegal command. C. It disables domain name lookup. D. The command is now defunct and has been replaced by "IP server-name ip any"
Which type of transmission bus topology support?
Identify 3 characteristics of a connection oriented protocol? A.) Path determination B.) Flow control C.) Acknowledgements D.) Uses hop count as metric E.) 3 way handshake
Identify 3 characteristics regarding CDP? A.) On by default B.) Shows only directly connected neighbors C.) Requires IP or IPX D.) 60 second update interval by default E.) 30 second updates interval by default
What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message
You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255