Difficulty: Easy
Correct Answer: access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
Explanation:
Introduction / Context:
Extended IPv4 ACLs can filter based on protocol and ports with precise source and destination fields. To block Telnet to a destination network, you must set the source to any, the destination to the target subnet with a wildcard mask, the protocol to TCP, and the destination port to 23 (telnet).
Given Data / Assumptions:
Concept / Approach:
Correct format: access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23. This denies Telnet sessions to any host in that /24. Place appropriate permit statements after it to allow desired traffic and avoid implicit deny of all else.
Step-by-Step Solution:
Verification / Alternative check:
Attempt a Telnet connection to any host in 192.168.10.0/24; the ACL counter should increment and the session should fail, while other protocols succeed if permitted later in the ACL.
Why Other Options Are Wrong:
Common Pitfalls:
Final Answer:
access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
Discussion & Comments