1.

What is an IP access list?

Answer»

An IP access list is a rule set for traffic control in the network and for reducing the possibilities of network attacks. This list will be useful in filtering the traffic BASED on rules that are defined for incoming as well as outgoing networks. The standard IP access list features are:

  • PROVIDE bandwidth control: IP Access lists on a slower link are helpful in preventing excess traffic on a network.
  • Trigger dial-on-demand: Access lists do have the right to enforce the criteria for dial and disconnect.
  • Provide NAT control: Access lists are helpful in controlling which addresses are translated by NAT (Network Address Translation).
  • Control access to Virtual teletype (VTY): Access lists on an inbound vty are capable of controlling which person can access the lines to a device. Access lists on an outbound vty are capable of controlling the destinations to which can be reached by the lines from a device.
  • Authenticate remote shell (rsh) and Rate Control Protocol (RCP): Using access lists, it is possible to simplify the remote hosts, remote users, and local users identification in an authentication database that is configured for controlling the device access. For receiving incoming rsh as well as rcp protocol REQUESTS, the authentication database will enable the Cisco software.
  • Block UNWANTED traffic: These access lists are capable of filtering incoming/outgoing packets on an interface, thus helpful in controlling the network access depending on the source address, destination address, or user authentication. It is also useful in determining the traffic type that is forwarded or blocked at the device interface.
  • Limit debug command output: We can limit the debug output using access lists, depending on an IP address or a protocol.


Discussion

No Comment Found