What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?

What is true of standard access control lists when applied to an interface to control inbound
or outbound traffic?

What is true of standard access control lists when applied to an interface to control inbound
or outbound traffic?

A.
The best match of the ACL entries will be used for granularity of control.

B.
They use source IP information for matching operations.

C.
They use source and destination IP information for matching operations.

D.
They use source IP information along with protocol-type information for finer granularity of
control.



Leave a Reply 0

Your email address will not be published. Required fields are marked *