BuyFindarrow_forward

Network+ Guide to Networks (MindTa...

8th Edition
Jill West + 2 others
Publisher: Cengage Learning
ISBN: 9781337569330

Solutions

Chapter
Section
BuyFindarrow_forward

Network+ Guide to Networks (MindTa...

8th Edition
Jill West + 2 others
Publisher: Cengage Learning
ISBN: 9781337569330
Chapter 10, Problem 2RQ
Textbook Problem
62 views

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

  1. a. access-list acl_2 deny tcp any any
  2. b. access-list acl_2 permit http any any
  3. c. access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www
  4. d. access-list acl_2 permit icmp any any

Program Description Answer

For permitting the web-browsing traffic from any IP address to any other IP address is “access-list acl_2 permit http any any”.

Hence, the correct answer is option “B”.

Explanation of Solution

ACL:

  • ACLs stands for Access Control Lists are a network filter utilized by switches and routers to allow and restrict data flows into and out of network interface.
  • After configured ACL on an interface, data passing through an interface is analyzed by the network device and compare it to the conditions described in the ACL, and either allow the data to flow or bans it.
  • On most router, every interface must be assigned a separate ACL, and different ACLs may be associated with outbound and inbound traffic. After ACLs are installed on routers, every ACL is assigned a name or number.
  • The command “access-list” is used to assign a statement to a pre-installed ACL. This command must identify the ACL and include a deny or permit argument.
  • For example, to permit ICMP traffic from any IP address to any other IP address is “access-list acl_2 permit icmp any any”.
    • Here, “access-list” command is used to assign a statement to a pre-installed ACL.
    • The “acl_2” is a name.
    • The “permit” is used to allow the data flow...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
What is outsourcing? How is it different from offshoring?

Principles of Information Systems (MindTap Course List)

What is a negative feedback loop? How is it used to keep a project in control?

Principles of Information Security (MindTap Course List)

___________ is the process of attaching gage blocks to each other.

Precision Machining Technology (MindTap Course List)

Calculate the reactions at the built-in support at C, neglecting the weights of the members.

International Edition---engineering Mechanics: Statics, 4th Edition

Will online transactions eventually replace person-to-person contact? Why or why not?

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

How much heavier, on average, will an aluminum-alloy tennis racquet be if it is made from titanium alloy? Obtai...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

What are business rules? Why are they important to a database designer?

Database Systems: Design, Implementation, & Management

Define the term, malware. List ways you can protect yourself from malware.

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)

What protects the molten weld metal from atmospheric contamination in GTAW welding?

Welding: Principles and Applications (MindTap Course List)