InterviewSolution
Saved Bookmarks
| 1. |
What Are Crypto Access Lists? |
|
Answer» CRYPTO access lists specifies which IP traffic is protected by crypto and which traffic is not protected by crypto. To protect IP traffic "PERMIT" keyword is USED in an access LIST. If the traffic is not to be protected than "DENY" keyword is used in access list. Crypto access lists specifies which IP traffic is protected by crypto and which traffic is not protected by crypto. To protect IP traffic "permit" keyword is used in an access list. If the traffic is not to be protected than "deny" keyword is used in access list. |
|