Premium Essay

Access List in 21 Days

In:

Submitted By pimptouch
Words 13656
Pages 55
ACL
Standard

Extended

Any

Access 0.0.0.0 Lists permit deny

Workbook
Version 1.0

Instructor’s Edition

access-group
Wildcard Mask

access-list

Access-List Numbers
IP Standard IP Extended Ethernet Type Code Ethernet Address DECnet and Extended DECnet XNS Extended XNS Appletalk 48-bit MAC Addresses IPX Standard IPX Extended IPX SAP (service advertisement protocol) IPX SAP SPX Extended 48-bit MAC Addresses IPX NLSP IP Standard, expanded range IP Extended, expanded range SS7 (voice) Standard Vines Extended Vines Simple Vines Transparent bridging (protocol type) Transparent bridging (vender type) Extended Transparent bridging Source-route bridging (protocol type) Source-route bridging (vender type) 1 100 200 700 300 400 500 600 700 800 900 1000 1000 1100 1200 1300 2000 2700 1 101 201 200 700 1100 200 700 to to to to to to to to to to to to to to to to to to to to to to to to to to 99 199 299 799 399 499 599 699 799 899 999 1099 1099 1199 1299 1999 2699 2999 100 200 300 299 799 1199 299 799

Produced by: Robb Jones jonesr@careertech.net Frederick County Career & Technology Center Cisco Networking Academy Frederick County Public Schools Frederick, Maryland, USA Special Thanks to Melvin Baker and Jim Dorsch for taking the time to check this workbook for errors. Instructors (and anyone else for that matter) please do not post the Instructors version on public websites. When you do this your giving everyone else worldwide the answers. Yes, students look for answers this way. It also discourages others; myself included, from posting high quality materials. Inside Cover

What are Access Control Lists?
ACLs... ...are a sequential list of instructions that tell a router which packets to permit or deny.

General Access Lists Information
Access Lists... ...are read sequentially. ...are set up so that as soon as the packet matches a statement it

Similar Documents

Premium Essay

Ad Policica

...http://www.k9webprotection.com/support.html http://www.k9webprotection.com For concerns or feedback about the documentation: documentation@bluecoat.com Copyright© 1999-2008 Blue Coat Systems, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the written consent of Blue Coat Systems, Inc. All right, title and interest in and to the Software and documentation are and shall remain the exclusive property of Blue Coat Systems, Inc. and its licensors. ProxyAV™, CacheOS™, SGOS™, SG™, Spyware Interceptor™, Scope™, ProxyRA Connector™, ProxyRA Manager™, Remote Access™ and MACH5™ are trademarks of Blue Coat Systems, Inc. and CacheFlow®, Blue Coat®, Accelerating The Internet®, ProxySG®, WinProxy®, AccessNow®, Ositis®, Powering Internet Management®, The Ultimate Internet Sharing Solution®, Cerberian®, Permeo®, Permeo Technologies, Inc.®, and the Cerberian and Permeo logos are registered trademarks of Blue Coat Systems, Inc. All other trademarks contained in this document and in the Software are the property of their respective owners. BLUE COAT SYSTEMS, INC. DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR...

Words: 13961 - Pages: 56

Free Essay

Organizational Policy Statement

...(certificate revocation list and access control list). This way a previous employee will not have access to company systems. Previous employees having account access to the company’s virtual private networks (VPN) from home or remote locations will be terminated immediately upon employee termination. See ref A, Annex A.8.3.3, pg. 16 a. Any employee going on company approved travel that will require him/her to access company networks remotely, will request access tens days prior to travel. b. Any employee requesting access to the company’s VPN will request access via the proper channels. See ref A, Annex, A.8.1.1, pg 15, A.11.2, pg 22 c. All access requests will be logged and finalized by human resources after employee have reviewed a confidentiality and non-disclosure agreement of company sensitive information IAW ref A, section 8, Annex A.11.4.1, pg 23 A.11.2 pg 22 d. Employee account will expire ten days before employee leaves the company or termination to ensure that all accounts have been closed and access revoked. The network management team will run account active program to see all account active for the employee that is to be released on the 10th day to ensure that the employee is not accessing any resources via remote terminal. See ref A, Annex A.8.3.3, pg 16 All company access requests will be ignited and finalized by human resources. This way the company will be able to keep track of all personnel with internal and external access to the company...

Words: 600 - Pages: 3

Free Essay

Bus 245 Database Essentials

...Top of Form Week 2: Tables, ER Modeling, and The DBMS - Discussion |Database Table Design (graded) | |When designing database tables, the difference between a good design and a bad design can be a few seconds in response time and | |several minutes. You may think that this is not a huge difference, but imagine waiting several minutes on a web page for your results | |to load. How long would you wait? A slow database can mean the loss of customers. So let's begin by discussing some of the common | |elements of tables and how you would approach the table design. What would you do to ensure that your page loads in a few seconds? | |Discuss the relationship types and how they affect your design. | |Responses | |[pic|[pic|Response |Author |Date/Time | |] |] | | | | | | |[pic] ...

Words: 10657 - Pages: 43

Premium Essay

A Guide to Using Linux Chapter 1 Discover Excercise

...DISCOVERY EXERCISES  1. Use the whatis command to determine the purpose of the ls command.  whatis ls ls (1)               ­ list directory contents    2. Use the man program to find out what the ­R option does when used with the date  command.  ­R, ­­rfc­2822 output date and time in RFC 2822 format.  Example: Mon, 07 Aug 2006  12:34:56­0600    3. Use the man program to determine what other commands you should also see in  relation to the clear command.  SEE ALSO         tput(1), terminfo(5)    4. Use the cal command to determine on what day of the week you were born.  user:~$ cal 8 1989      August 1989  Su Mo Tu We Th Fr Sa         1  2  3  ​ 5  4​    6  7  8  9 10 11 12  13 14 15 16 17 18 19  20 21 22 23 24 25 26  27 28 29 30 31      5. Use the cal command to determine which years between 2006 and 2015 are leap years.  user:~$ cal 2 2008     February 2008  Su Mo Tu We Th Fr Sa                  1  2   3  4  5  6  7  8  9  10 11 12 13 14 15 16  17 18 19 20 21 22 23  24 25 26 27 28 29    6. Clear the screen, and view the online manual to determine how to display today’s  date in UTC.   ­u, ­­utc, ­­universal print or set Coordinated Universal Time    7. Display the current UTC.  user:~$ date ­­utc  Tue Jan 19 11:01:14 UTC 2016    8. Create a file called month containing the current month.  user:~$ cat > month  user:~$ cal 1 2016 >> month    9. View the contents of the month file you created in Exercise 8.  user:~$ less month  ...

Words: 1364 - Pages: 6

Premium Essay

Member Benefit

...Health Net Access Member Handbook A helpful guide to getting services (Combined Evidence of Coverage and Disclosure Form) Benefit Year 2014 1 HELP IN ANOTHER LANGUAGE AND FOR THE DISABLED: HOW CAN I GET HELP? As a member of Health Net, you have access to a service that offers interpretive services in over 150 different languages. If you need this handbook or other health information in another language or in an alternative format such as large font, audio or accessible pdf, please contact Member Services at [1-888-788-4408 TTY/TDD: 1-888- 788-4872]. Also, if you need interpretive services, please call Member Services at least five (5) days before your medical appointment to arrange language interpretive services in time for your appointments. There is no cost for language interpretation services. You are not required to use family or friends to interpret for you. Como afiliado a Health Net, usted tiene acceso a servicios de interpretación en más de 150 idiomas. Si necesita este manual u otro tipo de información sobre salud traducido a otro idioma o en un formato diferente (como letra grande, audio o PDF accesible), comuníquese con el Departamento de Servicios al Afiliado al 1-888-788-4408 o a la línea TDD/TTY 1-888-7884872. Además, si necesita servicios de interpretación, comuníquese con el Departamento de Servicios al Afiliado al menos cinco (5) días antes de su cita médica para coordinar los servicios de interpretación de idiomas; así podrá disponer de ellos en sus citas...

Words: 17524 - Pages: 71

Free Essay

Factors Affecting the Academic Performance of Hrm Students

... Presented to: Kimberly C. Rivera, MS Chemistry In partial fulfillment of the requirements in PHYS-420 Research in Physical Science Presented by: Evalle, Leslie Joy P. Bugarin, Lyka A. STORY TELLING: AN APPROACH TO INCREASE STUDENTS’ UNDERSTANDING OF THE ATOMIC STRUCTURE Acknowledgements Foremost, we would like to thank the Almighty God for giving us enough strength and knowledge to come up with this study. We would also like to express our sincerest thanks to Ms. Catherine R. Tolero for helping us all throughout the process of our data gathering in Bataan National High School. Also, our deepest sense of gratitude to Mr. and Mrs. Ocampo for letting us stay in their home and use their computer unit and access the internet all day. To our research adviser, Ms. Kimberly Cabrera, a lot of thanks for guiding us all throughout the process of conducting this study. Lastly, to our parents to whom we wholeheartedly dedicate all our efforts and hardwork, a lot of thanks to them. Abstract This study focuses on determining the effectivity of storytelling in teaching Atomic Structure. The goal of this study is to show that storytelling greatly helps in the teaching-learning process. This study also aims to test the conceptual understanding of the students and as well as their interest when listening to stories. The instruments used are pre and post-tests and anecdotal records. The result of this study will help educational specialists in developing teaching...

Words: 620 - Pages: 3

Free Essay

Bibliography

...How to Make a Bibliography - A Handy Guideline -- Based on the 6th Edition of MLA Handbook for Writers of Research Papers. A BIBLIOGRAPHY is a list of sources used by the writer of a research paper, including books, encyclopedias, newspapers, magazines, pamphlets, interviews, and electronic media.  All the sources used are listed alphabetically.      NOTE:  Book titles must be either underlined: Ants or italicized: Ants.  NOTE:  Pay attention to spacing, capitalization and punctuation. NOTE: When more than one publication location is cited on the title page, the first city should be the one noted on your bibliopgraphy. Place of publication usually includes the Name of the City, and the abbreviation of the State: Greenwood, CT. NOTE: The information for your bibliography should come from the Title Page of each book, NOT THE COVER, the SPINE or other sources (such as WebCat.) BOOKS  ONE AUTHOR  Overbeck, Cynthia.  Ants.  Minneapolis:  Lerner Publication         Company, 1982.   Author's last name, Author's first name.  Title.  Place of publication:  Publisher, copyright date.   TWO OR THREE AUTHORS   Sewell, Barbara and Patrick Lynch.  A First Look at Ants.  New York:           Walker & Company, 1992. First Author's last name, First Author's first name and Full Names of 2nd and 3rd Authors. Title. Place of publication: Publisher, copyright date.    MORE THAN THREE AUTHORS Anderson, Norman D., et al. Ants : using biological indicators to                  ...

Words: 2414 - Pages: 10

Free Essay

Bis 220 Information Systems Proposal

...Information Technology Raymond Hintz BIS/220 January 21, 2014 Oswald Angst Information Technology The phone rings, your in the middle of a project. Your monthly plan is almost out of minutes, you do not recognize the number but you are expecting an important call. You answer the call only to hear a recorded message asking, “If I could teach you how to make $1000.00 dollars a week would you be interested?” great another telemarketing call. Wasted time, wasted minutes on your phone plan and aggravation at the interruption of your day. There should be a law about this! Wait, there is. Advances in information technology have led to a huge increase in telemarketing calls to consumers. Calls come in from every avenue, marketing questions; solicitation for sales, investment opportunities, and political outreach, if you can talk about it a telemarketer is calling consumers to get their opinion, their vote or their money. Call centers have expanded from office buildings with employees making one call at a time calls to computers mass dialing consumers. Robo-calling has decreased the cost to telemarketers while increasing the volume of calls consumers receive. The per minute fees incurred by consumers for telemarketing calls to cellular phones led to many complaints and an increase in the need for a “Do Not Call” law. Consumers had for many years been irritated at telemarketers however the increase in volume of calls along with the new charges paid by consumers for calls to cellular...

Words: 820 - Pages: 4

Free Essay

Requirement Engineering

...General No. Requirement Description 1 Ability to designate and provide users with read only access to screens and tables 2 Ability to generate reports on an ad-hoc basis 3 Ability to access features and functionality in a disconnected state 4 5 6 Ability to easily configure workflow and system automation Ability for citizens to create an account online for access to services provided via the Internet Designated City personnel must have capability to adjust commonly altered variables, such as codes, tables, fields, report parameters, pick lists, etc. without the services of a professional programmer. Ability to restrict access through roles and definable properties Ability to export data to Microsoft Excel format System should conform to open architecture standards System should be able operate on a Microsoft compatible database format such as Microsoft SQL Built-in report writer for flexible reporting that doesn't require the need to use a 3rd party Report Writer Ability for user defined edit and validation rules to control data integrity Ability to assign security at the table, record and field level System documentation is available online System documentation and user help is available within the program itself Ability to integrate with ESRI based GIS system System supports date fields with calendar drop downs System enables easy access to historic data System allows simultaneous access to data by concurrent users y Ability to send email notifications Ability to schedule processes...

Words: 2726 - Pages: 11

Premium Essay

Risk

...Phase I: Preparation / Planning B. Phase II: Information Gathering C. Phase III: Function Analysis D. Phase IV: Creativity E. Phase V: Evaluation F. Phase VI: Development G. Phase VII: Presentation / Implementation Planning Figure 1: Company Logo This activity focuses on the application of Value Engineering functions to Signature Packaging Co. A. Preparation / Planning – Plan, organize, and establish the objective for the VE study. The general objective of this project is to establish a manufacturing company of secondary packaging material out of sugarcane’s bagasse. Table 1: Project Time Table Development Start Date | End Date | Description | Duration Days (days) | 4/27/15 | 6/26/15 | Project Studies & Planning | 60 | 6/27/15 | 7/18/15 | Identify Investors | 21 | 7/19/15 | 9/17/15 | Negotiation for Project Planning | 60 | 9/18/15 | 10/18/15 | Locate & Negotiate Plant Site Acquisition | 30 | 10/19/15 | 11/18/15 | Plant Site Development | 30 | 11/19/15 | 12/10/15 | Purchase...

Words: 1077 - Pages: 5

Free Essay

Bsr 64k Command Reference Guide

...BSR 64000 Command Reference Guide Compass ID: 271820115 Version 3 Release 5.0.0 Notice Copyright © 2008 Motorola, Inc. All rights reserved No part of this publication my be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation or adaptation) without written permission from Motorola, Inc. Motorola reserves the right to revise this publication and to make changes in content from time to time without obligation on the part of Motorola to provide notification of such revision or change. Motorola provides this guide without warranty of any kind, either implied or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Motorola may make improvements or changes in the product(s) described in this manual at any time. Motorola and the stylized M logo are registered trademarks of Motorola, Inc. Broadband Services Router, BSR, BSR 64000, RiverDelta, and SmartFlow are trademarks of Motorola, Inc. All other trademarks and registered trademarks are the property of their respective owners. Caring for the Environment by Recycling When you see this symbol on a Motorola product, do not dispose of the product with residential or commercial waste. Recycling your Motorola Equipment Please do not dispose of this product with your residential or commercial waste. Some countries or regions, such as the European Union, have set up systems to collect and recycle electrical...

Words: 97484 - Pages: 390

Premium Essay

Major Themes in Health Care in Canada

...HADM 339 – Essay Major themes in health care in Canada include access to services. Identify the issues, identify the changes you believe are needed and discuss the approach you would propose to implement these changes. Simply put, access in the health care sector refers to the ability for a patient to receive the care and services required to maintain a healthy quality of life. Access to health care services continues to be a key issue for Canadians and health policy makers.1,2 Key issues exist in several dimensions of the health care process, including access to a specialist, non-emergency surgery and non-emergency diagnostic testing. More specifically, it is the significant amount of time one will spend waiting for their opportunity to receive these services that remains a concern. Among those who had waited for specialist visits, 29% reported unacceptable waits. This was also true for 17% of patients who were waiting for a non-emergency surgery and 20% for those waiting for diagnostic testing.3 Median waiting times for all specialized services remained relatively stable between 2003 and 2005 at 3 to 4 weeks, depending on the kind of care. Approximately 18% of individuals who visited a specialist indicated that waiting for the visit affected their life, compared with 11% and 12% for non-emergency surgery and diagnostic tests respectively.4 Despite several efforts made by government agencies, access still remains one of the foremost issues identified. Billions of...

Words: 2552 - Pages: 11

Premium Essay

Strategy

...follow, please check your module guides or speak to your lecturers. If you look at other Harvard Referencing guides available in print or online, you may notice variation between them. The important thing is to be consistent and to follow any specific instructions from your lecturers. Contents 1. Why do we need to reference? ............................................................................................................ 3 2. The two stages of the Harvard system ................................................................................................. 3 2.1 In-text citation............................................................................................................................... 3 2.2 Reference list ................................................................................................................................ 3 3. Citing references within the text .......................................................................................................... 3 3.1 Work by a corporate author ......................................................................................................... 3 3.2 Work with three or more authors................................................................................................. 4 3.3 Multiple references with the same author and publication year ................................................. 4 3.4 Citing a direct...

Words: 5554 - Pages: 23

Premium Essay

Keystone Conference

...DU Keystone Conference: Initial Planning Abstract Ducks Unlimited is one of the world’s leaders in habitat conservation. Management plans to flesh-out the organization’s long-term strategy for the next ten years at the upcoming Keystone Conference. The conference is scheduled to take place 21 months from now in Charlottesville, NC. This paper documents the project scope, the preliminary Work Breakdown Structure (WBS), and the recommended communication plan. DU Keystone Conference: Initial Planning Elements of Scope Project Objective The objective for this project is to stage the Keystone Conference in Charlottesville, NC in 21 months at a cost not to exceed $1.2 million. Deliverables The major deliverables that are expected throughout the life of the Keystone project are as follows. * Memo identifying selected venue * List of projects to be presented * List of project team rosters * List of topics and presenters * Promotional materials * Guest register * Agenda Milestones 1. Select ten projects which will be presented at conference – December 1, 2011 2. Formation and briefing of ten individual project teams – December 16, 2011 3. Secure the venue – January 10, 2012 4. Initial distribution of promotional materials – January 23, 2012 5. Selection and briefing of presenters – February 1, 2012 6. Begin registration – April 16, 2012 7. Close registration – March 20, 2013 8. Finalize guest register...

Words: 629 - Pages: 3

Premium Essay

Pt2520 Database Concepts

...List the major topics for this database. The major topics of the database are: Lease Form (tracks leases of one apartment complex); Rent Payment Form (tracks rent payment of one apartment complex); Maintenance Request Form (tracks requests for maintenance and apartment manager’s resolution); Sample Quarterly Report (shows revenues and expenses of a particular building, address). STATEMENT OF WORK Project Name: Wild Wood Apartments June 21, 2014 • History: The Wild Wood Apartments are made up of 20 different complexes in Washington, Oregon, California and Idaho with each complex containing from 10 to 60 separate apartments. Leases are from 6 months to a year and the company’s practice is to hire one of the tenants to run the complex, collecting rent, conducting repairs, etc. The company requires a quarterly report to track the lease occupancy, rent payment, maintenance, and revenue and expenses; all of which is done in paper form. The forms are considered time consuming by the property managers, and the corporate office has concerns over their accuracy. A centralized database is being considered to simplify and better manage this data. • Scope: The contractor will include hardware, website, software and data storage support for the headquarters and all property offices that belong to Wild Wood Apartments. The main storage for the data will be offsite and the contractor is responsible for maintaining it. • Constraints: The contractor and the headquarters office of Wild...

Words: 706 - Pages: 3