The most common attack on a network today is a denial of service (DoS) because they are the easiest attack to achieve.
To apply an access list , the proper command is ip access - group 101 in.
The extended access list ranges are 100 - 199 and 2000 - 2699, so the access-list number of 100 is valid. Telnet uses TCP, so the protocol TCP is valid. Now you just need to look for the source and destination address. only the third option has the correct sequence of parameters. Option B may work, but the question specifically states "only" to network 192.168.10.0, and the wildcard in option B is too broad.
Of the available choices only the show ip interface command will tell you which interfaces have access lists applied. show access - lists will not show you which interfaces have an access list applied.
The range of 192.168.160.0 to 192.168.191.0 is a block size of 32. The network address is 192.168.160.0 and the mask would be 255.255.224.0, which for an access list must be a wildcard format of 0.0.31.255 . The 31 is used for a block size of 32. The wildcard is always one less than the block size.
The command debug ip nat will show you in real time the translations occurring on your router.
The command ip nat pool name creates the pool that hosts can use to get onto the global internet. What makes option B correct is that the range 171.16.10.65 through 171.16.10.94 includes 30 hosts, but the mask has to match 30 hosts as well, and that mask is 255.255.255.224 . Option C is wrong because there is a lowercase t in the pool name. Pool name are case sensitive.
Instead of the netmask command, you can use the prefix-length length statement.
An inside global address is considered to be the IP address of the host on the private network after translation.
Comments
There are no comments.Copyright ©CuriousTab. All rights reserved.