Which IPv6 ACL statement would be used to allow all SMTP traffic coming from the 2001:db8:db23:ad34::/64 network to the 2001:db8:bde1:db34::/64 network?

A) allow tcp 2001:db8:db23:ad34::/64 2001:db8:bde1:db34::/64 eq 161
B) permit tcp 2001:db8:db23:ad34::/64 2001:db8:bde1:db34::/64 eq 25
C) permit udp 2001:db8:db23:ad34::/64 2001:db8:bde1:db34::/64 eq 161
D) allow udp 2001:db8:db23:ad34::/64 2001:db8:bde1:db34::/64 eq 25


B
Explanation: B) The permit {ipv6 | tcp | udp} {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator port-number] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address} [operator port-number] command is used when configuring extended IPv6 ACLs. To allow all SMTP traffic from the 2001:db8:db23:ad34::/64 network to the 2001:db8:bde1:db34::/64 network, the permit tcp 2001:db8:db23:ad34::/64 2001:db8:bde1:db34::/64 eq 25 statement would be used.

Computer Science & Information Technology

You might also like to view...

Showhowthe withdrawtransaction in an ATM system can be structured as a nested transaction with concurrent subtransactions.

What will be an ideal response?

Computer Science & Information Technology

The priming read is an example of a(n) ____ task.

A. declaration B. exit C. housekeeping D. selection

Computer Science & Information Technology

A rollover image is an image that changes its appearance when the mouse pointer is placed over it in a browser.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Using the same facts as in Project 2, what is the NPV for this project?

What will be an ideal response?

Computer Science & Information Technology