Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / 1) What are access lists in routers? Access-Lists provide control of network traffic

1) What are access lists in routers? Access-Lists provide control of network traffic

Computer Science

1) What are access lists in routers? Access-Lists provide control of network traffic. With the rules created, controls such as which traffic will pass and which cannot pass are provided. A number between 1-99 can be given for the list in standard ACLs. In standard access lists, only the source IP address is checked. In extended ACLs, a number between 100-199 can be given for the list. The list looks at both the source and destination IP address. Allows any port 80 from 192.168.1.0 network. Can be used for TCP and UDP. To add other things to the rule in numbered ACLs, the working ACL is first stopped and then added things to be added. It creates a security vulnerability for him. Using ACL with names: Name is used, not number, in ALC list. Ip access-list standard NO_ACCESS deny host 192.168.10.10 • Standard ACLs are written on the device close to the target. • Extended ACL is written to the device close to the source. • If ACL is written, it should be written for all networks. When the list is created for a block or permission for a network, by default all networks that are not listed are stuck in the block list. Therefore, when the access list is created, a list should be made for all networks. Standard Access List 2) What is syslog() and why is it useful?
 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Access List for Routers

Blocking one of the PCs from accessing 8.8.8.8 on the router using access lists requires the use of specific commands. The first command is NSLookup. This command allows the access of the IP address of the different PCs in a network. By typing the NSLookup command, the different PCs in the network are displayed. The name of the PC can also be typed to see whether it accesses 8.8.8.8. The second command is the traceroute. Traceroute provides a list of the PCs in the network (Clinton, 2016). Also, information about how long the PCs have been in the network are brought out. By the use of this command, one PC can be selected and blocked from accessing 8.8.8.8 on the router. Also, the notion of the quality of the connection available is brought out using this command.

Blocking one of the PCs can be done by use of the nmap command. This command is used in the discovery of a network and the different system admins that are available in the network. The determination of whether the PC is online is possible with the use of the nmap command (Clinton, 2016). Also, the Operating system used by a PC is determined by the use of this command. The network distance is also indicated by running this command. The Hostname command would be important in blocking the PCs from accessing 8.8.8.8. Typing this command defines a specific node or PC address and the specific domain name. Hostname command is used in the identification of the specific name of the PC and the specific domain that is running (Clinton, 2016). In addition, all the alliances in the network are displayed with the use of the Hostname command. The identification of the specific PC is the first step to blocking it.

Related Questions