Answer Posted / jitendera
These basic rules should be followed when creating and
applying access lists:
One access list per protocol per direction.
Standard IP access lists should be applied closest
to the
destination.
Extended IP access lists should be applied closest
to the
source
only these two fundamental are the rules of the access-list
Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
How does rip differs from igrp?
What do you understand by poe (power over ethernet)?
What are packets?
What is ping? What is the usage of ping?
On which bas ospf take decision?
What is the difference between half duplex and full duplex?
what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?
Does a bridge divide a network into smaller sections?
Tell me how many fillers we can put in one ip of ipv6?
what is the matric of EIGRP protocol?
Mention what command you must use if you want to delete or remove the configuration data that is stored in the nvram?
What route entry will be assigned to dead or invalid route in case of RIP?
Define load balancing?
Brielfly explain the conversion steps in data encapsulation
Explain how many types of ips?