GroupStudy.com GroupStudy.com - A virtual community of network engineers
 Home  BookStore  StudyNotes  Links  Archives  StudyRooms  HelpWanted  Discounts  Login
RE: Access List posted 10/01/2007
[Chronological Index] [Thread Index] [Top] [Date Prev][Date Next] [Thread Prev][Thread Next]


This is why I like Brians' teaching methodology. They will make things
look pretty easy.

Cheers
Subodh 

-----Original Message-----
From: Ajay Prakash [mailto:ajay.prakash@xxxxxxxxxxxxxxxxxxx] 
Sent: Monday, October 01, 2007 10:16 AM
To: Subodh Singh Rawat (WT01 - TELECOM SERVICE PROVIDER);
ccielab@xxxxxxxxxxxxxx
Subject: RE: Access List

Cool,, This link makes it look so easy :)

Thanks a ton.

Ajay

-----Original Message-----
From: subodh.rawat@xxxxxxxxx [mailto:subodh.rawat@xxxxxxxxx]
Sent: Sunday, September 30, 2007 9:34 PM
To: ajay.prakash@xxxxxxxxxxxxxxxxxxx; ccielab@xxxxxxxxxxxxxx
Subject: RE: Access List


Ajay,

Check this out. Excellent stuff.

http://www.internetworkexpert.com/resources/01700370.htm

~Subodh

-----Original Message-----
From: nobody@xxxxxxxxxxxxxx [mailto:nobody@xxxxxxxxxxxxxx] On Behalf Of
Ajay Prakash
Sent: Sunday, September 30, 2007 3:17 PM
To: ccielab@xxxxxxxxxxxxxx
Subject: Access List

Hello,

 

Someone please help me understand the access-list provided below. The
task states that only the Hosts mentioned below have to be denied access
in the fewest lines of access list. Also no other hosts should be
blocked.

 

200.0.1.2

200.0.1.10

200.0.1.18

200.0.1.26

200.0.3.2

200.0.3.10

200.0.3.18

200.0.3.26

 

 

The solution listed only a single deny statement in ACL, the second
statement being permit ip any any

 

Access-list 1 deny 200.0.1.2  0.0.2.24

 

Please help me understand the math behind this solution.

 

Thanks,

Ajay

_______________________________________________________________________
Subscription information may be found at: 
http://www.groupstudy.com/list/CCIELab.html


The information contained in this electronic message and any attachments
to
this message are intended for the exclusive use of the addressee(s) and
may
contain proprietary, confidential or privileged information. If you are
not
the intended recipient, you should not disseminate, distribute or copy
this
e-mail. Please notify the sender immediately and destroy all copies of
this
message and any attachments. 

WARNING: Computer viruses can be transmitted via email. The recipient
should
check this email and any attachments for the presence of viruses. The
company accepts no liability for any damage caused by any virus
transmitted
by this email.
 
www.wipro.com



The information contained in this electronic message and any attachments to this message are intended for the exclusive use of the addressee(s) and may contain proprietary, confidential or privileged information. If you are not the intended recipient, you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately and destroy all copies of this message and any attachments. 

WARNING: Computer viruses can be transmitted via email. The recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email.
 
www.wipro.com