0% found this document useful (0 votes)
126 views3 pages

CCNA 4E Chapter 5 Access Control List Gwinnett Technical College

The document discusses Access Control Lists (ACLs) including: - ACLs are evaluated line by line from top to bottom. - A standard ACL denying traffic from 210.93.105.4 to 192.5.5.0 but allowing other traffic can be created. - Wildcard masks of 0 mean match this value, 1 means ignore this value. - The show access-list command displays ACL information. - An extended ACL preventing host 210.93.105.50 from accessing an FTP server at 192.5.5.148 can be created.

Uploaded by

Mark Woffard
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
126 views3 pages

CCNA 4E Chapter 5 Access Control List Gwinnett Technical College

The document discusses Access Control Lists (ACLs) including: - ACLs are evaluated line by line from top to bottom. - A standard ACL denying traffic from 210.93.105.4 to 192.5.5.0 but allowing other traffic can be created. - Wildcard masks of 0 mean match this value, 1 means ignore this value. - The show access-list command displays ACL information. - An extended ACL preventing host 210.93.105.50 from accessing an FTP server at 192.5.5.148 can be created.

Uploaded by

Mark Woffard
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

CCNA 4E Chapter 5 Access Control List Gwinnett Technical College

How are the lines of an Access Control List evaluated? Using the following diagram, create a standard

ACL that will deny traffic from 210.93.105.4 to the 192.5.5.0 network but will allow traffic from all other hosts:

In the wildcard mask of an Access Control List, the 0 means what? The 1 means what? In an Access Control List, the wildcard mask of 255.255.255.255 can be substituted using what word? What information does the command show access list display? Create an Extended ACL to prevent host 210.93.105.50 from accessing an FTP server located at 192.5.5.148

What are the four parameters that a Standard or Extended ACL (Named or Numbered) can use to filter data traffic? What numbers define a Standard IP ACL? What numbers define an Extended IP ACL? IPX? Why use Access Control Lists? In an Access Control List, the wildcard mask of 0.0.0.0 can be substituted using what word? What is the rule concerning the number of ACL control list that can be placed on a port for each of the routing protocols?
Developed by L. Clarke

CCNA 4E Chapter 5 Access Control List Gwinnett Technical College

Which of the following commands would be used to correctly configure a standard ACL? A. Router# access-list 10 permit any B. Router# access-list 10 permit host any C. Router(config)# access-list 10 permit any D. Router(config)# access-list 10 permit any any E. Router(config-access-list)# access-list 10 permit any Assuming it is correctly applied on the proper interface, what affect will the following ACL have on network traffic? access-list 142 deny tcp 172.16.0.0 0.0.255.255 any eq 80 access-list 142 permit ip any any Describe how the wildcard mask of 0.0.0.15 will affect network traffic: As an ACL is evaluated, what happens when a parameter on the list matches an input? How would you remove an ACL? - Standard - Extended - Named Under what circumstance would the creation of an ACL have immediate affect on the network? access-list 199 deny tcp host 192.168.43.6 any eq 23 Assuming the access list is correctly applied to an interface, what effect will this ACL have on network traffic? What is a firewall router and how are Access Control List used on them? What ACL related information does the command show ip interface display? What are three advantages of using named access lists? If there are no matches to the parameters define in an ACL, what happens? What is the default last command in Access Control List on Cisco devices that is not visible?

Developed by L. Clarke

CCNA 4E Chapter 5 Access Control List Gwinnett Technical College

Select the commands that will apply the ACL in the diagram to filter traffic going to the 192.168.2.0 network:

- If you own both routers: - If you own Router 1: - If you own Router 2: Extended ACLs are placed/deployed where? Create a Named Extended Access List to prevent host 210.93.105.50 from accessing an FTP server located at 192.5.5.148

Name and describe the three types of Complex Access Control List:

?.?.?.?

What is the command syntax to set the time and date on a Cisco router? What command would be used to show the current time and date settings?

Developed by L. Clarke

You might also like