Access List

In: Computers and Technology

Submitted By ADOLFA
Words 13898
Pages 56
ACL
Standard

Extended

Any

Access 0.0.0.0 Lists permit deny

Workbook
Version 1.0

Instructor’s Edition

access-group
Wildcard Mask

access-list

Access-List Numbers
IP Standard IP Extended Ethernet Type Code Ethernet Address DECnet and Extended DECnet XNS Extended XNS Appletalk 48-bit MAC Addresses IPX Standard IPX Extended IPX SAP (service advertisement protocol) IPX SAP SPX Extended 48-bit MAC Addresses IPX NLSP IP Standard, expanded range IP Extended, expanded range SS7 (voice) Standard Vines Extended Vines Simple Vines Transparent bridging (protocol type) Transparent bridging (vender type) Extended Transparent bridging Source-route bridging (protocol type) Source-route bridging (vender type) 1 100 200 700 300 400 500 600 700 800 900 1000 1000 1100 1200 1300 2000 2700 1 101 201 200 700 1100 200 700 to to to to to to to to to to to to to to to to to to to to to to to to to to 99 199 299 799 399 499 599 699 799 899 999 1099 1099 1199 1299 1999 2699 2999 100 200 300 299 799 1199 299 799

Produced by: Robb Jones jonesr@careertech.net Frederick County Career & Technology Center Cisco Networking Academy Frederick County Public Schools Frederick, Maryland, USA Special Thanks to Melvin Baker and Jim Dorsch for taking the time to check this workbook for errors. Instructors (and anyone else for that matter) please do not post the Instructors version on public websites. When you do this your giving everyone else worldwide the answers. Yes, students look for answers this way. It also discourages others; myself included, from posting high quality materials. Inside Cover

What are Access Control Lists?
ACLs... ...are a sequential list of instructions that tell a router which packets to permit or deny.

General Access Lists Information
Access Lists... ...are read sequentially. ...are set up so that as soon as the packet matches a statement it…...

Similar Documents

The Bucket List

...The Bucket List Felicia Holland BSHS/342 September 1, 2012 Marcy Stern, PhD. The Bucket List The Bucket List is a film about two middle age men who have nothing in common other than that they are both diagnosed with terminal cancer. Edward Cole, a White man, is a billionaire who owns many hospitals. He is a self-made man with a bitter outlook on life. Edward has married and divorced four times, and has no relationship his only child. Carter Chambers, a Black man, is a blue-collar mechanic who once aspired to becoming a history professor until he gave up his dreams to support his growing family. Carter and his wife have been married for 45 years, they have three children. The two men eventually bond as they endure the rigors of their respective cancer treatments. Carter begins to draft a “bucket list” of the things that he wants to see and do before he dies. Edward finds the list and begins to add his own aspirations to it. He convinces Carter to leave the hospital with him, and they set off to fulfill their desires and wishes on the list. Biological Perspective Men and Cancer Cancer and cardiovascular disease are the leading causes of death in middle age with men being more vulnerable to disease than women (Berk, 2010). In men cancer deaths rate slightly higher than in women (Berk, 2010). The likelihood of survival is affected by the socioeconomic status of the patient. The SES of the two characters in the film is opposed. Edward is a wealthy man. He can afford to......

Words: 1017 - Pages: 5

File Access

...File Access Computers have become an important tool for the companies. They are used as time clocks, keep track of inventory, to communicate with customers and to do research. In some cases, the computer is used to assign tasks and inform employees of upcoming events. Though computers are good tool and resource, there is the potential an employee may misuse or access files they have no clearance to access. For this reason there is a need to restrict access. If a company has 5000 employees who have access to the computer system and there is a need to restrict 10 users from accessing a specific file, there is a need to establish protocols to prevent access. How this is done differs in each operating system. In Unix there are ways to set parameters for the 4990 users to access a single file. These are set within the types of files. They are called regular, directory, special, named pipes, links and symbolic links. Unix operating systems operate these files and routes them into a uniformed system that operates in the background supporting files and giving disk space as needed for files. This is done by using inode (Index node) which controls information the system needed for a specific file. Multiple files can be connected to one inode, but if active the inode will only be associated with one file and a file will be controlled by one inode. A file’s attributes, permissions, and control information are stored within the inode. In the FreeBSD inode for example......

Words: 654 - Pages: 3

The List

...The List Story by 10/16/2013 I find myself on the ledge of a building with two of his thugs grabbing me. I think to myself how did I get here? Should I have done what I did? Is this the end? I should start from the beginning. I grew up in a wealthy house hold. My father was well known for breakthroughs in the technology field. He was working on many projects but the one that made him a multi-millionaire was the work in self-sustaining energy. When I was eighteen, my father and I went on a trip to China, a trip that would change our lives forever. It was a pretty quiet plane ride. Dad was working on his laptop and I was listening to music. I noticed there was a very bad storm out of the window. The plane was shaking. Suddenly the lights went out and the oxygen masks deployed. Something hit my head. The next thing I know we are in the water and my dad is yelling my name. I see him in the distance swimming towards me. He gets to me and gives me his life vest. He tells me that I have to survive, that his company isn’t what I thought it was. He gives me a book with a list of names and tells me that everyone on that list has done terrible things to stay rich, and that he is no different. He told me stories of how he and the people on this list got wealthy by stepping on the necks of the poor. That he has had people hurt or killed to keep his company on top. He stayed with me as long as he could but as time went by he got weaker. He couldn’t......

Words: 1099 - Pages: 5

Set Up Access Control List for a Router

...Set Up Access Control List for a Router Author Note This paper is being submitted on August 24, 2013, for N235/CET2629 Section 02 Cisco Networking Fundamentals and Routing course. Set Up Access Control List for a Router This configuration allows the IP packets with an IP header that has a source address in the network 182.64.0.0 and a destination address in the network 182.62.0.0 access to Network A. There is the implicit deny all clause at the end of the ACL which denies all other traffic passage through Ethernet 0 inbound on R1. Hostname R1 ! Interface Ethernet 0 IP access-group 101 in ! Access-list 101 permit IP 182.62.0.0 0.0.255.255 182.64.0.0 0.0.255.255 Hostname R1 ! Interface Ethernet 0 IP access-group 101 in ! Access-list 101 permit IP 182.62.0.0 0.0.255.255 182.64.0.0 0.0.255.255 In the command access-list 101 permit IP 182.62.0.0 0.0.255.255 182.64.0.0 0.0.255.255, the "0.0.255.255" is the inverse mask of network 182.62.0.0 with mask 255.255.0.0. ACLs use the inverse mask to know how many bits in the network address need to match. In the table, the ACL permits all hosts with source addresses in the 182.62.0.0 network and destination addresses in the 182.64.0.0 network. Deny Telnet Traffic (TCP, Port 23) Hostname R1 ! Interface ethernet0 IP access group 102 in ! Access-list 102 deny tcp any any eq 23 Access-list 102 permit IP any any Hostname R1 ! Interface ethernet0 IP access group 102......

Words: 527 - Pages: 3

List

...STRATEGY PORTER’S FIVE COMPITITIVE FORCES SWOT: TIEUPS AND ACQUISITIONS CABLE AND WIRELESS FLAG Telecom CRITICISM ON STRATEGY ADOPTED BY RELIANCE 4 RELIANCE GROUP ABOUT The Reliance Group was founded by Dhirubhai H. Ambani is India's largest business house. Total revenues : Rs 99,000 crore Cash profit : Rs 12,500 crore Net profit : Rs 6,200 crore Exports : Rs 15,900 crore Reliance Group revenue is equivalent to about 3.5% of India's GDP. The Group contributes nearly 10% of the country's indirect tax revenues and over 6% of India's exports. Reliance is trusted by an investor family of over 3.1 million - India's largest. Every 4th investor in India has Reliance shares. Reliance is the only Indian private company to make the Fortune 500 list of the world’s largest corporations FACTS Some facts about Reliance Group: 5 Company Profile The Reliance Group founded by Dhirubhai H. Ambani (1932-2002) is India's largest business house with total revenues of over Rs 99,000 crore (US$ 22.6 billion), cash profit of Rs 12,500 crore (US$ 2.8 billion), net profit of Rs 6,200 crore (US$ 1.4 billion) and exports of Rs 15,900 crore (US$ 3.6 billion). The Group's activities span exploration and production (E&P) of oil and gas, refining and marketing, petrochemicals (polyester, polymers, and intermediates), textiles, financial services and insurance, power, telecom and infocomm initiatives. The Group exports its products to more than 100 countries the world over. Reliance......

Words: 5752 - Pages: 24

Lists, Lists and More Lists

...and more like computers. Telephone Network Topology consists of the following components 1. The demarcation point is the location within a home or office where the line from a telephone company enters the building. This point is also known as the minimum point of entry (MPOE) 2. The access network connects directly to the end user, and also connects to the backbone. The switching points in the backbone could be buildings on a campus or cities in a country. 3. Equipment includes all the wires, fiber-optic or copper, that connect a few different components together. This also includes Switches. 4. Regional/Metro Networks are a communication network that covers a geographical area such as a town, city, or suburb. Cable TV 1. Broadcast TV is broadcasted from radio wave, which sends a signal from one antenna to another. It has a limitation flaw of going in and out of range. 2. Community antennas have come from being a copper cable on the highest point, to a very complex combination of cabling and electronics. This antenna consists of the following cables, and components, the Head end, Trunk cables, feeder cables, and drop cables. 3. Network access point is located close to the homes of buildings it services. The NAP is a terminal that serves as a connection point for drop cables. 4. From the NAP a cable runs to the Network Interface Device. The NID is typically mounted outside of the house or building. It is an all-plastic enclosure...

Words: 685 - Pages: 3

List of Protocols

...List of network protocols (OSI model) This article is about network protocols organized by OSI model. For network protocols organized by TCP/IP model, see Internet Protocol Suite. This is a list of network protocols, categorized by their nearest Open Systems Interconnection (OSI) model layers. This list is not exclusive to only the OSI protocol family. Many of these protocols are originally based on the Internet Protocol Suite (TCP/IP) and other models and they often do not fit neatly into OSI layers. The OSI model | 7 Application layer | 6 Presentation layer | 5 Session layer | 4 Transport layer | 3 Network layer | 2 Data link layer | * LLC sublayer * MAC sublayer | 1 Physical layer | * v * t * e | பொருளடக்கம் * 1 Layer 1 protocols (physical Layer) * 2 Layer 2 protocols (Data Link Layer) * 3 Layer +3 protocols * 4 Layer 3 protocols (Network Layer) * 5 Layer 3.5 protocols * 6 Layer 3+4 protocol suites * 7 Layer 4 protocols (Transport Layer) * 8 Layer 5 protocols (Session Layer) * 9 Other protocols * 10 Layer 7 protocols (Application Layer) * 11 Protocol description languages * 12 See also * 13 Further reading * 14 External links Layer 1 protocols (physical Layer) * Telephone network modems- V.92 * IRDA physical layer * USB physical layer * EIA RS-232, EIA-422, EIA-423, RS-449, RS-485 * Ethernet physical layer Including 10BASE-T, 10BASE2, 10BASE5, 100BASE-TX,......

Words: 1041 - Pages: 5

List

...FOLD FOLD Channel Lineup ATHeNs TWC BAsiC serviCe 2..............................WOuB (PBs) 3 ..............................WsAZ (NBC) 4..............................WCmH (NBC) 5..............................Government Access 6 .............................WsYX (ABC) 7 ..............................WLPX (iON) 8..............................WvAH (FOX) 9 .............................Public Access 10...........................WOWK (CBs) 11 .............................WCHs (ABC) 12............................TLC 13............................WQCW (CW) 14 ...........................Travel Channel 15............................The Weather Channel 16 ...........................WGN 17............................TBs 18 ...........................QvC 19 ...........................univision 20 .........................History 21............................HsN 22 ..........................C-sPAN 23 ..........................Hallmark 24 ..........................Time Warner Cable Connection 25 ..........................educational Access 26..........................Local Weather radar 27 ..........................HLN 56 .........................CNBC 57 ..........................msNBC 58..........................Big Ten Network 59..........................NBC sports Network 60 ........................Animal Planet 61 ...........................National Geographic 62..........................Golf Channel 63..........................Fox News 64 .........................FX 65.....

Words: 2128 - Pages: 9

Angie's List

...The Market Company’s Market Angie’s List is located in all 50 states in the United States and several markets in Canada. Though they are located in every state but they are not in every market within those states. Many states are missing some key markets but that would be a potential growth opportunity for them in the near future. Even in the current markets, Angie’s List can still improve their overall market share. Though there is not a true competitor to Angie’s List, there is still market penetration within its current markets. With its current market base of 600,000 paying customers, there is still ample room of growth both within its current markets and any new markets. Potential Market When meeting with Angie’s List, they were able to help us define what the typical customer’s characteristics are. After looking through their website, you are able to see those characteristics through some of their marketing plans. A typical customer at Angie’s List is a homeowner, well-educated, has children and earns more than $100k in income. Those four main characteristics are very important for the growth at Angie’s List. With the company offering so many different types of services, the most frequent type of service would be those found around the household. A couple of different examples would include home contractors for home additions, lawn services, painters, and the list goes on and on. Many homeowner’s like to see personal reviews from other homeowner’s that have had both...

Words: 1321 - Pages: 6

Access

... Define first normal form. Define second normal form. What types of problems would you find in tables that are not in second normal form? 6. Define third normal form. What types of problems would you find in tables that are not in third normal form? 7. Define fourth normal form. What types of problems would you find in tables that are not in fourth normal form? 8. Define interrelation constraint and give one example of such a constraint. How are interrelation constraints addressed? 9. Consider a Student table containing StudentNum, StudentName, student’s StudentMajor, student’s AdvisorNum, student’s AdvisorName, student’s AdvisorOfficeNum, student’s AdvisorPhone, student’s NumCredits, and student’s Class (freshman, sophomore, and so on). List the functional dependencies that exist, along with the assumptions that would support those dependencies. 10. Convert the following table to an equivalent collection of tables that are in third normal form. This table contains information about patients of a dentist. Each patient belongs to a household. Patient (HouseholdNum, HouseholdName, Street, City, State, Zip, Balance, PatientNum, PatientName, (ServiceCode, Description, Fee, Date)) The following dependencies exist in the Patient table: PatientNum  HouseholdNum, HouseholdName, Street, City, State, Zip, Balance, PatientName HouseholdNum  HouseholdName, Street, City, State, Zip, Balance ServiceCode  Description, Fee PatientNum, ServiceCode  Date 11. Using your knowledge of the......

Words: 1004 - Pages: 5

Access the Pcaob Website ( Www.Pcaob.Org) and List Two New or Proposed Auditing Standards Issued by the Pcaob.

...Access the PCAOB Website ( www.pcaob.org) and list two new or proposed auditing standards issued by the PCAOB. Auditing Standard no .18: Related Parties The Securities and Exchange Commission (SEC) approved a new Public Company Accounting Oversight Board (PCAOB) standard on auditing transactions with related parties and amendments to PCAOB standards on significant unusual transactions and a company’s transactions and financial relationships with its executive officers. The standard includes new requirements for evaluating how a company identifies, accounts for and discloses its transactions and relationships with related parties. The amendments also require auditors to perform procedures to (1) help them identify and evaluate the business purpose of the significant unusual transaction (2) Obtain understanding of a company’s financial relationship with its executive officers and also understanding their employment contracts. The PCAOB developed this standard and amendment to focus on the auditor’s areas that have been associated with risks and fraudulent financial reporting errors, the PCAOB hopes the new standard will increase the auditors like hood to identify material misstatement on financial statements. Auditing Standard (AS) No.18, Related Parties, will supersede an interim auditing standard and is effective for fiscal year beginning on or after December 15, 2014. The PCAOB noticed the existing standard provided example of procedures an auditor could perform but...

Words: 564 - Pages: 3

Access Training

...What is Access? Simple databases store information in only one table. These simple databases are often called flat file databases, or just flat databases. More complex database programs, such as Access, store information in multiple related tables, thereby creating what are referred to as relational databases. If the information in a relational database is organized correctly, you can treat these multiple tables as a single storage area and pull information electronically from different tables in whatever order meets your needs. Tables are one of the types of database objects you work with in Access. Other types include forms, queries and reports. Of these object types, only tables are used to store information. The others are used to enter, manage, manipulate, analyze, retrieve, or display the information stored in tables—in other words, to make the information as accessible and therefore as useful as possible. Table – data storage, the actual location of data Forms – used to enter, to change or to delete data Queries Reports Starting Microsoft Access If you are using an IT Services machine, login as usual by entering your username and password. Then, to start up the program: 1. Open the Windows Start button and choose All Programs 2. Select Microsoft Office 2013 then Access 2013 Tip: If you right click on the Microsoft Access entry in the menu and choose Send To then Desktop (create shortcut) you’ll have an icon on the Desktop for future easy access. You......

Words: 1697 - Pages: 7

Access

...PPE: safety shoes, safety boots, leggings, Spat. [pic] Future Scope of Occupational Safety Occupational health and safety has come a long way from its beginnings in the heavy industry sector. It now has an impact on every worker, in every work place, and those charged with managing health and safety are having more and more tasks added to their portfolio. The most significant responsibility is environmental protection. The skills required to manage occupational health and safety are compatible with environmental protection, which is why these responsibilities are so often bolted onto the workplace health and safety professional. Future Risks Nanotechnology is another example of a new technology with few studies available that access the risks to human health. A Swiss survey of one hundred thirty eight companies using or producing nanoparticulate matter in 2006, resulted in forty completed questionnaires. Sixty five per cent of respondent companies stated they did not have a formal risk assessment process for dealing with nanoparticulate matter [11] Nanotechnology in the near future presents unique challenges for occupational health and safety professionals to anticipate and control, this will only become more difficult as nanostructures become more complex. The size of the particles renders most containment and personal protective equipment ineffective. The toxicology values for macro sized industrial substances are rendered inaccurate due to the unique nature......

Words: 2432 - Pages: 10

Access

...Introduction to Microsoft Access 2003 Zhi Liu School of Information Fall/2006 Introduction and Objectives Microsoft Access 2003 is a powerful, yet easy to learn, relational database application for Microsoft Windows. This tutorial is designed for users who are new or only have little experience using Access 2003. It introduces fundamental database concepts and operations and illustrates how they are performed in Microsoft Access 2003. This tutorial does not cover all of the features and functions of Microsoft Access 2003; emphasis will be on basic and frequently-used features, such as the creation of tables and queries, or importing spreadsheet into Access. Please be aware that Microsoft Access is only available for Windows users; Mac users may want to seek out a FileMaker Pro Tutorial. Objectives By using this tutorial, you will learn to perform the following operations in Access 2003: • • • • • • Launch Access and identify the parts of the screen. Define fields and field properties constructing table structures. Enter and edit records in a table. Find, sort data. Design custom queries to display data. Import and export data between Excel and Access. Definitions These words are used often in Access so you will want to become familiar with them before using the program and this tutorial. Relational Database: in relational databases such as Access, data is stored in tables made up of one or more fields (Access calls a column a field). The data stored in each 1 ...

Words: 3238 - Pages: 13

Access List in 21 Days

...ACL Standard Extended Any Access 0.0.0.0 Lists permit deny Workbook Version 1.0 Instructor’s Edition access-group Wildcard Mask access-list Access-List Numbers IP Standard IP Extended Ethernet Type Code Ethernet Address DECnet and Extended DECnet XNS Extended XNS Appletalk 48-bit MAC Addresses IPX Standard IPX Extended IPX SAP (service advertisement protocol) IPX SAP SPX Extended 48-bit MAC Addresses IPX NLSP IP Standard, expanded range IP Extended, expanded range SS7 (voice) Standard Vines Extended Vines Simple Vines Transparent bridging (protocol type) Transparent bridging (vender type) Extended Transparent bridging Source-route bridging (protocol type) Source-route bridging (vender type) 1 100 200 700 300 400 500 600 700 800 900 1000 1000 1100 1200 1300 2000 2700 1 101 201 200 700 1100 200 700 to to to to to to to to to to to to to to to to to to to to to to to to to to 99 199 299 799 399 499 599 699 799 899 999 1099 1099 1199 1299 1999 2699 2999 100 200 300 299 799 1199 299 799 Produced by: Robb Jones jonesr@careertech.net Frederick County Career & Technology Center Cisco Networking Academy Frederick County Public Schools Frederick, Maryland, USA Special Thanks to Melvin Baker and Jim Dorsch for taking the time to check this workbook for errors. Instructors (and anyone else for that matter) please do not post the Instructors version on public websites. When you do this your giving everyone else worldwide the answers. Yes, students look......

Words: 13656 - Pages: 55

Hi Security premium | Contacto | Survivor 7.8