Podcast
Questions and Answers
What command is used to create a numbered standard IPv4 ACL?
What command is used to create a numbered standard IPv4 ACL?
- create access-list
- access-list (correct)
- configure acl
- ip access-list standard
Which of the following is NOT a valid access-list number for a numbered standard ACL?
Which of the following is NOT a valid access-list number for a numbered standard ACL?
- 1300
- 1500 (correct)
- 50
- 75
What is the function of the 'deny' command in a standard IPv4 ACL?
What is the function of the 'deny' command in a standard IPv4 ACL?
- Allow all traffic
- Block specific traffic (correct)
- Permit traffic by default
- Log denied traffic
What parameter is optional and provides documentation in a numbered standard ACL?
What parameter is optional and provides documentation in a numbered standard ACL?
What is true regarding the naming of a standard named ACL?
What is true regarding the naming of a standard named ACL?
What is the purpose of the 'log' option in a standard IPv4 ACL?
What is the purpose of the 'log' option in a standard IPv4 ACL?
What command would you use to remove a numbered standard ACL?
What command would you use to remove a numbered standard ACL?
Which wildcard mask is applied to the source in a numbered standard ACL?
Which wildcard mask is applied to the source in a numbered standard ACL?
What command is used to bind a standard IPv4 ACL to an interface?
What command is used to bind a standard IPv4 ACL to an interface?
Which command is used to remove an ACL from an interface?
Which command is used to remove an ACL from an interface?
In an example numbered standard ACL, which IP address is allowed traffic?
In an example numbered standard ACL, which IP address is allowed traffic?
What should you use to verify that an ACL is applied to the interface?
What should you use to verify that an ACL is applied to the interface?
What is the primary function of ACL 120 as described?
What is the primary function of ACL 120 as described?
What does the notation 192.168.20.0/24 represent in the ACL example?
What does the notation 192.168.20.0/24 represent in the ACL example?
What is the advantage of using named standard ACLs over numbered ones?
What is the advantage of using named standard ACLs over numbered ones?
What flag must be set for a packet to match the existing TCP connection according to the information provided?
What flag must be set for a packet to match the existing TCP connection according to the information provided?
Which command is used to create a named extended ACL?
Which command is used to create a named extended ACL?
Which interface was used in the ACL example for permitting traffic?
Which interface was used in the ACL example for permitting traffic?
What does the named extended ACL called BROWSING permit?
What does the named extended ACL called BROWSING permit?
What type of ACL is primarily concerned with layer 3 IP traffic?
What type of ACL is primarily concerned with layer 3 IP traffic?
Which command would you issue to view the current configuration of an ACL?
Which command would you issue to view the current configuration of an ACL?
What is the effect of applying Extended ACLs on the R1 G0/0/0 interface?
What is the effect of applying Extended ACLs on the R1 G0/0/0 interface?
What structure does a standard IPv4 ACL follow?
What structure does a standard IPv4 ACL follow?
What is the primary purpose of a named ACL in IPv4?
What is the primary purpose of a named ACL in IPv4?
What command is used to display statistics for each ACE in an ACL?
What command is used to display statistics for each ACE in an ACL?
Which statement about the deny any command is true?
Which statement about the deny any command is true?
How can an administrator reset the ACL statistics?
How can an administrator reset the ACL statistics?
What does the implied deny any statement do in an access control list?
What does the implied deny any statement do in an access control list?
In the provided example, which IP address is denied access?
In the provided example, which IP address is denied access?
What is one of the objectives of the Packet Tracer activity mentioned?
What is one of the objectives of the Packet Tracer activity mentioned?
When an ACE is matched, which of the following is true about its statistics?
When an ACE is matched, which of the following is true about its statistics?
What is a characteristic of sequence numbers in named ACLs?
What is a characteristic of sequence numbers in named ACLs?
What will happen if an ACE specifically permits an IP address?
What will happen if an ACE specifically permits an IP address?
What is the port number used for HTTP traffic in the configuration of extended ACLs?
What is the port number used for HTTP traffic in the configuration of extended ACLs?
What is the main purpose of the extended ACL 100 as stated in the configuration example?
What is the main purpose of the extended ACL 100 as stated in the configuration example?
Where are extended ACLs commonly applied according to the configuration examples?
Where are extended ACLs commonly applied according to the configuration examples?
What does the established keyword in a TCP extended ACL allow?
What does the established keyword in a TCP extended ACL allow?
When is it necessary to configure a port number instead of a protocol name in ACLs?
When is it necessary to configure a port number instead of a protocol name in ACLs?
What is the effect of applying ACL 110 inbound on the R1 G0/0/0 interface?
What is the effect of applying ACL 110 inbound on the R1 G0/0/0 interface?
Which of the following protocols has a specific port number listed in the examples?
Which of the following protocols has a specific port number listed in the examples?
What traffic is denied by the TCP established extended ACL?
What traffic is denied by the TCP established extended ACL?
Which ACE approach achieves the same filtering result for HTTP traffic?
Which ACE approach achieves the same filtering result for HTTP traffic?
Which type of ACL is particularly designed to filter based on port numbers?
Which type of ACL is particularly designed to filter based on port numbers?
Flashcards are hidden until you start studying
Study Notes
Standard IPv4 ACLs - Configuration and Syntax
- Numbered standard ACLs range from 1 to 99 or 1300 to 1999 using the
access-list
command. - Key commands:
deny
: Blocks access if matched.permit
: Allows access if matched.remark
: Adds documentation (optional).source
: Specifies the address filtering.source-wildcard
: Optional 32-bit wildcard mask for the source.log
: Generates messages upon ACE match (optional).
- To delete a numbered ACL, use
no access-list access-list-number
.
Named Standard IPv4 ACLs
- Named ACLs are created with
ip access-list standard
, requiring unique, case-sensitive names. - Naming ACLs enhances clarity within configuration outputs.
Applying Standard IPv4 ACLs
- After configuration, link ACLs to an interface using
ip access-group
. - Remove an ACL with
no ip access-group
in interface configuration.
Examples of Standard IPv4 ACLs
- A numbered ACL example permits traffic from host 192.168.10.10 and the 192.168.20.0/24 network out interface serial 0/1/0 on router R1.
- Use
show running-config
to view ACLs andshow ip interface
to verify applied ACLs.
Modifying IPv4 ACLs
- Named ACLs can utilize sequence numbers to manage ACEs; example includes denying host 192.168.10.11.
- Use
show access-lists
for statistics on matched statements from ACLs; implicit deny statistics require a manual deny command for visibility.
Extended IPv4 ACLs - Configuration
- Extended ACLs allow filtering based on port numbers/names; example filters HTTP traffic using both port name and number 80.
- Apply extended ACLs close to the source for more control over traffic flow.
TCP Established Extended ACLs
- Use the
TCP established
keyword to permit returning traffic from established connections, blocking unsolicited inbound traffic. - Example configuration allows returning web traffic to inside hosts, applied outbound on the R1 G0/0/0 interface.
Named Extended IPv4 ACLs
- Named extended ACLs created with
ip access-list extended
facilitate understanding of ACL functions. - Example shows creating
NO-FTP-ACCESS
for clarity in ACL management.
Applying Named Extended IPv4 ACLs
- Two named extended ACLs demonstrate application:
SURFING
: Permits inside HTTP and HTTPS traffic to exit to the internet.BROWSING
: Allows only returning web traffic to inside hosts while implicitly denying other outbound traffic.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.