Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
TRUE/FALSE - ACL's only filter traffic going through the device, not to/from it? |
True. |
|
How many ACL's can be assigned to an interface? |
1 ACL per interface, per protocol, per direction. |
|
What must an ACL have to function? |
At least one permit statement. |
|
TRUE/FALSE - An ACE will need to be deleted before it can be overwritten? |
True. |
|
Configure the ACL below in a test environment, validate the config and then apply: Configure an ACL called test, permit the 172.16.0.0 255.255.0.0 subnet to any destination on TCP ports 80 and 25. Apply inbound to int e2/2.
|
Conf configure session ACLTEST Ip access-list TEST int e2/2 verify commit |
|
Which command will display the ACE's within each access-list? |
show access-list |
|
Which command will give a brief overview of how many access-lists are configured on a device and where they are applied?
|
show access-lists summary
|
|
Configure an object group called AMEYNETS and add the following subnets: 192.168.0.0/24 Configure an ACL to permit access from this object group to any destination. |
conf object-group ip address AMEYNETS ip access-list ACLTEST |
|
Which command will display the specifics of a particular object group. |
show object-group AMEYNETS |
|
What is the expanded keyword used for when viewing an ACL?
|
The expanded keyword is used to view the contents of any object groups that may be referenced in the ACL e.g. show access-list TEST expanded. |