What are the rules all access lists follow?

What will be an ideal response?


In summary, all access lists follow these rules:
• Routers apply lists sequentially in the order in which you type them into the router.
• Routers apply lists to packets sequentially, from the top down, one line at a time.
• Packets are processed only until a match is made, and then they are acted upon based on the access list criteria contained in access list statements.
• Lists always end with an implicit deny. Routers discard any packets that do not match any of the access list statements.
• Access lists must be applied to an interface as either inbound or outbound traffic filters.
• Only one list, per protocol, per direction can be applied to an interface.
• Access lists are effective as soon as they are applied; however, you must use the copy run start command to save the list after configuration if you want it to survive a router reload.

Computer Science & Information Technology

You might also like to view...

Windows is able to restore a single file, folder, or ____ from an incremental backup.

A. private folders B. library C. subfolders D. icons

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. A class may only implement one interface. 2. An interface is a type.

Computer Science & Information Technology

Refer to RFC 1918 and list the IP address blocks that are reserved for use in private networks. Why is there a need to specify IP addresses for private networks?

What will be an ideal response?

Computer Science & Information Technology

What is wrong with this code?

``` WriteGreeting(char greetings[ ][10]); int main() { char greetings[3][10]= {“hello”, “howdy”, “hi”} ; WriteGreeting(greetings); return 0; } WriteGreeting(char greetings[ ][ ] ) { for(int I = 0; I < 3; ++I) cout<

Computer Science & Information Technology