Exam 10: Access Lists
____________________ IP access lists filter network traffic based on the source IP address only.
Standard
What are some of the advantages of using named access lists?
The naming feature allows you to maintain security by using an easily identifiable access list. It also removes the limit of 100 lists per filter type. In addition, with named access lists lines can be selectively deleted in the ACL. This feature does not allow you to add lines to the ACL; any lines added to a named ACL are applied to the end of the list. Named ACLs provide greater flexibility to network administrators who work in environments where large numbers of ACLs are needed, such as a large ISP.
What are the rules all access lists follow?
In summary, all access lists follow these rules:
• Routers apply lists sequentially in the order in which you type them into the router.
• Routers apply lists to packets sequentially, from the top down, one line at a time.
• Packets are processed only until a match is made, and then they are acted upon based on the access list criteria contained in access list statements.
• Lists always end with an implicit deny. Routers discard any packets that do not match any of the access list statements.
• Access lists must be applied to an interface as either inbound or outbound traffic filters.
• Only one list, per protocol, per direction can be applied to an interface.
• Access lists are effective as soon as they are applied; however, you must use the copy run start command to save the list after configuration if you want it to survive a router reload.
To apply the inbound access list 1 to an interface, you use the following command: ____.
To remove an extended IP access list from an interface, you enter interface configuration mode and use the ____ command.
____ provides a GUI-based configuration tool for Cisco devices.
The following command sets an outbound access list filter: ____.
The access list ends with an implicit ____________________ statement, which blocks all packets that do not meet the requirements of the access list.
To name a standard IP access list, use the following syntax: ____ .
The configuration of a(n) ____ is the main difference between the Basic and Advance firewall wizards.
To name an extended IP access list, use the following syntax: ____ .
To apply a standard IP named list to an interface, use the following syntax: ____ .
Describe each element of the standard IP access list configuration syntax.
To view which interfaces have IP access lists set, use the ____ command.
What kind of tasks can you perform on the SDM's Interfaces and Connection screen?
Smart network engineers pay close attention to network traffic flow and security when they design and manage their networks.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)