CCNA 2 Ch 9: Access Control List Flashcards
A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task?
- Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0*
- Router1(config)# access-list 10 permit host 192.168.15.23
he administrator attempts to add a new ACE to the ACL that denies packets from host 172.16.0.1 and receives the error message that is shown in the exhibit. What action can the administrator take to block packets from host 172.16.0.1 while still permitting all other traffic from the 172.16.0.0 network?
Manually add the new deny ACE with a sequence number of 5
PT: Why is the ACL not working?
The ACL is applied to the wrong interface
Which statement describes a characteristic of standard IPv4 ACLs?
They filter traffic based on source IP addresses only.
The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied?
- R1(config)# interface gi0/0
R1(config-if)# ip access-group 105 out ** - access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20
access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21
access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www
access-list 105 deny ip any host 10.0.54.5
access-list 105 permit ip any any
What are two [2] possible uses of access control lists in an enterprise network?
- limiting debug outputs
2. controlling virtual terminal access to routers
An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?
R1(config-line)# access-class 1 in
Which three [3] statements are generally considered to be best practices in the placement of ACLs?
- Place extended ACLs close to the source IP address of the traffic.
- Place standard ACLs close to the destination IP address of the traffic.
- Filter unwanted traffic before it travels onto a low-bandwidth link.
Which three [3] implicit access control entries are automatically added to the end of an IPv6 ACL?
- deny ipv6 any any
- permit icmp any any nd-ns
- permit icmp any any nd-na
Which two characteristics are shared by both standard and extended ACLs
- Both can be created by using either a descriptive name or number.
- Both include an implicit deny as a final ACE.
What is the wild card mask for “the first valid host in a subnet”
192.168.15.65 255.25.255.240
What is the wild card mask for subnetwork address of a subnet with 14 valid host addresses
192.168.15.144 0.0.0.15
What is the wild card mask for “all IP address bits must match exactly”
host 192.168.15.12
What is the wild card mask for “hosts in a subnet with the subnet mask 255.255.252.0”
192.168.5.0 0.0.3.255
What is the wild card mask for “addresses with a subnet mask of 255.255.255.248”
192.168.3.64 0.0.0.7