friends i have some problem in the acess list plz help me
out.
purbi sinha.
1 what is the diffrence b/w inbound and out bound access
list
2 what is main diffrence betwwen standred acesslist and
extended access list
3 where should i keep stnadred access list and exatended
access list i mean at which interface and why?
4 why wild card masking is used
5 what is switch febric in switching
plz help me out i am litle bit confuse
Answer / jitendera kuamr sinha
hi purbi
i think this will help u about urs problem
1 queston-what is diffrence between inbound and outbound
access lisst.
the answer is
inbound access-list#inbound access list is conserned with
when ever we apply inbound access list to any interface
then all packets pass through acces list before being roued
to the outbound interface.
understand?
no?
take a eaxmaple
ok when ever we apply accesslist to the e0 enetrface
now what happen before going to outbound that is at s0
interface it will pass through the accesslist implmented on
the e0 interface.this is the exampl of inbound acces list
now
out bond accesslist#when this type of access list is
apploed through the outband packets on an interface then
these packet rputed first and then go to the access list
interfcae
as for example
apply asses lisst on s0 then any packet will firstly routed
from the e0 interface and then it will passes throug aceess
list
i am giving that example for understanding abt topics and
this is not a rule
ok
now your 2nd questions is what is the diff between standred
access list and exatnded access list.
if a diffrence it by its range then it is not fare u alrady
know what abt the ranges abt those
so i am not going to desribr it
ok the main diff betwwen standred access list and extanded
access list on the baisis of packet filtring is that
stndred acees list filter n/w trrafic by examin by examin
the source ip address.where as a extended acesslist filter
n/w trafic on the basic of sourse ip address and
destination ip address.
3rd
whrer should we plasd standed acess list and extanded acess
list
1 place std acess list as close to distinationa asclose as
poosible
2 place extened accs list list as close as to sourse
resion is very vital and not possible to dscribe here
becoz i a in cyber cafee and donot have the time
ok plz read todd lamley for ccna
now wilad card masking is used for specify a individual
host or a grou of range of host
this is the one of the important use of wild card masking
now the last one is switch frbric-
switch febric is a group of switch sharing same v-lan
information
for further plz read(farme tagging)
thank
hope this might help you
jitendera kuamr sinha
| Is This Answer Correct ? | 4 Yes | 0 No |
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to deliver the frame to the end device E.) Contains a network portion and a host portion
What is ping? What is the usage of ping?
Explain the difference between named and extended acl?
Which ISDN protocol prefix specifies switching and signaling? A.) I B.) E C.) Q D.) S
When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised
Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically connected network(s) B.) Configure the classful address, no subnets C.) Enable CDP so neighbors can be detected D.) Configure all networks in Area0
What hppends when ping 127.0.0.1 command executes?
Which addresses are INCORRECTLY paired with their class? A. 1 to 126, Class A B. 128 to 191, Class A C. 1 to 126, Class B D. 128 to 191, Class B
How broadcast is created in switch
Which statement is true when a broadcast is sent in an Ethernet/802.3 ITAN? A. The ip shored used is 255.255.255.0 B. The IP address used is 255.255.255.255 C. The MAC address used is 00 00 00 00 00 00 D. The MAC address used is FF FF FF FF FF FF
What is the routing metric used by RIP? A.) Route poisoning B.) Split horizon C.) Hop Count D.) TTL
4 Answers jetking, Tata Motors,
In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?