Describe each element of the standard IP access list configuration syntax.
What will be an ideal response?
To configure standard IP access lists, you must create the list and then apply it to an interface using the following syntax:
access-list [list #] [permit|deny] [source address] [source wildcard mask]
The brackets in each command syntax are not part of the command; they group items that
are replaced within each specific entry. The following list explains each element of the
standard IP access list configuration syntax:
• [list #]-Standard IP access lists are represented by a number in the range of 1-99 (in IOS versions 11.2 and greater, they can also be represented by text names).
• [permit|deny]-Used to specify the nature of the access list line. It is either a permit or a deny statement.
• [source address]-The IP address of the source.
• [source wildcard mask]-A wildcard mask, or inverse mask, applied to determine which bits of the source address are significant.
You might also like to view...
In a controller-based architecture lightweight access points are replaced by autonomous APs.
Answer the following statement true (T) or false (F)
To generate a report with exact results based on specific criteria it is best to base the report on a(n) ____________________ created in the database.
Fill in the blank(s) with the appropriate word(s).
? When you delete a message or folder, you are simply moving it to the Trash.
Answer the following statement true (T) or false (F)
Public organizations are often required to select technology products from vendors who submit the most cost-effective bid or competitive response to an RFP.
Answer the following statement true (T) or false (F)