You are required to fill in the protocol, address, and mask in this command using the choices below:

DRAG DROP
You are configuring the office. In particular the host C, with the IP address 192.168.125.34/27,
needs to be configured so that it cannot access hosts outside its own subnet. You decide to use
the following command:
access-list 100 deny protocol address mask any
You are required to fill in the protocol, address, and mask in this command using the choices
below:

DRAG DROP
You are configuring the office. In particular the host C, with the IP address 192.168.125.34/27,
needs to be configured so that it cannot access hosts outside its own subnet. You decide to use
the following command:
access-list 100 deny protocol address mask any
You are required to fill in the protocol, address, and mask in this command using the choices
below:

Answer:

Explanation:
1) protocol: ip2) address: 192.168.125.343) mask: 0.0.0.0

The syntax of extended access-list:
access-list 100-199 {permit|deny} {ip|tcp|udp|icmp} source source-mask [lt|gt|eq|neq] [source-port]
destination dest-mask [lt|gt|eq|neq] [dest-port]
By telling the router to drop traffic originated from host C (source), we can guarantee that host C
can just communicate with hosts inside its own subnet (because this kind of traffic does not need
to pass the router and will not be prevented).



Leave a Reply 0

Your email address will not be published. Required fields are marked *