Answer Posted / jitendera
These basic rules should be followed when creating and
applying access lists:
One access list per protocol per direction.
Standard IP access lists should be applied closest
to the
destination.
Extended IP access lists should be applied closest
to the
source
only these two fundamental are the rules of the access-list
| Is This Answer Correct ? | 4 Yes | 0 No |
Post New Answer View All Answers
What is the utility of ping?
Which layer are called upper layer?
Explain how many types of router?
What is the difference between simple authentication and md5?
Define autonomous system (as)?
How does PPTP encapsulate data?
What is the difference between named and extended acl?
what does the clock rate do?
Can you explain L2TP?
What are the different types of password used in securing a cisco router?
Which updates called incremental updates?
Tell me why we use filter option?
What are the differnt memory use in cisco router?
Explain the types of nat?
Which protocols are link states?