We're Sorry, Full Content Access is for Members Only...

If you like to keep on reading, Become a Member Now! Here is Why:

  • Learn any CCNA, CCNP and CCIE R&S Topic. Explained As Simple As Possible.
  • Try for Just $1. The Best Dollar You've Ever Spent on Your Cisco Career!
  • Full Access to our 637 Lessons. More Lessons Added Every Week!
  • Content created by Rene Molenaar (CCIE #41726)

 

374 New Members signed up the last 30 days!

satisfaction-guaranteed

100% Satisfaction Guaranteed!
You may cancel your monthly membership at any time.
No Questions Asked!

Tags: ,


Forum Replies

  1. On your Introduction to Access-Lists on Cisco IOS Router lesson, you have, in the picture for where to place the ACL, the word inbound twice. I believe that the top router should be “inbound” and the bottom router should be the “outbound.”

  2. Is there any example on how to configure classification on a router.

  3. Hi Rene,

    if i do access list like:

    access-list out_acz_in permit any 10.0.32.10

    access list out_acsz_in udp permit any 10.0.32.10 eq h323

    What isthe difference between both, what will be the default if i don`t mention tcp/udp and destination port in first case -what is the default type?

  4. Asi
    The first thing you have to decide is whether you are creating an standard or extended access-list. The next decision to make is whether you wanted to use an access-list number or an access-list name. In the examples you gave, you chose to use named access-lists for both (out_acsz_in). Also, in your example, we must be using extended access-lists (because you specified the destination of the traffic you are permitting).

    Let’s look at your two examples, and reconfigure them so they are using the proper syntax.
    Your first example is this:
    (config)#access-l

    ... Continue reading in our forum

  5. Hello Siu Kai L,

    Both inbound and outbound get the job done, they filter packets. It depends on the scenario which one you might want to use. For example, let’s say you have a router with 4 interfaces:

    * 1x WAN interface that connects to the Internet
    * 3x LAN interface

    Let’s say you want to restrict internet traffic from your LAN to the Internet. You could attach the same access-list INBOUND on all three LAN interfaces, or you can attach the access-list OUTBOUND on your WAN interface. Both get the job done, the only difference is you have to apply it once inste

    ... Continue reading in our forum

15 more replies! Ask a question or join the discussion by visiting our Community Forum