Which four TCP packets sourced from 10.1.1.1 port 1030 and routed to the FA0/0 interface are permitted?

Refer to the exhibit.

This Cisco IOS access list has been configured on the FA0/0 interface in the inbound direction.
Which four TCP packets sourced from 10.1.1.1 port 1030 and routed to the FA0/0 interface are
permitted? (Choose four.)

Refer to the exhibit.

This Cisco IOS access list has been configured on the FA0/0 interface in the inbound direction.
Which four TCP packets sourced from 10.1.1.1 port 1030 and routed to the FA0/0 interface are
permitted? (Choose four.)

A.
destination ip address: 192.168.15.37 destination port: 22

B.
destination ip address: 192.168.15.80 destination port: 23

C.
destination ip address: 192.168.15.66 destination port: 8080

D.
destination ip address: 192.168.15.36 destination port: 80

E.
destination ip address: 192.168.15.63 destination port: 80

F.
destination ip address: 192.168.15.40 destination port: 21

Explanation:

http://www.cisco.com/en/US/tech/tk648/tk361/technologies_configuration_example09186a00801
00548.shtml
Extended ACLs (registered customers only) control traffic by comparing the source and destination
addresses of the IP packets to the addresses configured in the ACL. You can also make extended
ACLs more granular and configured to filter traffic by criteria such as:
Protocol
Port numbers
Differentiated services code point (DSCP) value
Precedence value
State of the synchronize sequence number (SYN) bit
The command syntax formats of extended ACLs are:
IP
access-list access-list-number [dynamic dynamic-name [timeout minutes]]
{deny | permit} protocol source source-wildcard destination
destination-wildcard
[precedence precedence] [tos tos] [log | log-input]
[time-range time-range-name][fragments]
Internet Control Message Protocol (ICMP)
access-list access-list-number [dynamic dynamic-name [timeout minutes]]
{deny | permit}
icmp source source-wildcard destination destination-wildcard [icmp-type
[icmp-code] | [icmp-message]] [precedenceprecedence] [tos tos] [log |
log-input] [time-range time-range-name][fragments]
Transport Control Protocol (TCP)
access-list access-list-number [dynamic dynamic-name [timeout minutes]]
{deny | permit} tcp
source source-wildcard [operator [port]] destination destination-wildcard
[operator [port]] [established] [precedence precedence] [tos tos] [log |
log-input] [time-range time-range-name][fragments]
User Datagram Protocol (UDP)
access-list access-list-number [dynamic dynamic-name [timeout minutes]]
{deny | permit} udp
source source-wildcard [operator [port]] destination destination-wildcard
[operator [port]] [precedence precedence] [tos tos] [log | log-input]
[time-range time-range-name][fragments]



Leave a Reply 0

Your email address will not be published. Required fields are marked *