• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
What are Access Lists?
Access lists are permit and deny statements that filter traffice based on:
- sourceaddress
- destination address
- protocol type
- port number of a packet
What protocols are Access Lists available in?
IP, IPX, Appletalk and many more.
What statement do access lists automatically end in?
implicit deny any statement
what does the "implicit deny any statement" do?
blocks all packets that do not meet the requirements of the access list.
what is the command to allow anything to transmit if all access list requirements are met.
permit any!
what are the benefits of access lists?
control traffic flow and security
What is a major problem with access lists?
lack of planning
to modify an access list you need to remove the whole list, not just the line. what is the command to remove an access list?
no access-list [list number]
what can an admin do with the "reload" command?
schedule the router to reload in a certain number of minutes, hours or even days
what is the syntax for the "reload" command?
- reload in [hh:mm]
- reload at hh:mm [month day | day month]
example: reload in 30
what is a command to cancel the reload command?
reload cancel
Are access lists sequential or insequential?
sequential
give an example of the structure of an access list?
access-list 1 deny 172.22.5.2 0.0.0.0
access-list 1 permit any
what is the command to apply an access list to an "inbound" interface?
ip access-group 1 in
what is the command to apply an access list to an "outbound" interface?
ip access-group1 out
how many access lists can an interface have applied to it?
1
how do "Standard IP access lists" filter traffic?
based on Source IP Address only
- filter traffic by Host IP, Subnet, or a Network Address
what is the syntax for a Standard IP access list?
access-list [list #] [permit|deny] [source address] [source wildcard mask]
what is the number range for a standard IP access list?
1-99
what is a "wildcard mask"?
aka inverse mask
0s are placed in bit positioins deemed significant, and 1s are placed in positions that are not significant.
example 0.0.0.255