Good idea Dennis - I'll have a go:

1.  permit ip 10.0.201.32  0.255.54.31      (oooooh need to check it out on
paper but being lazy)

2.  deny tcp host 173.3.8.41 host 155.66.75.1 eq 23
     permit ip any any

3.  permit tcp any host 172.16.2.12 eq 80

4.  access-list 1 permit 192.168.1.52  255.255.255.255
     line vty 0 4
     access-class 1 in


Gaz


""Dennis Laganiere""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > I was cruising through the archives and a few other sources, and I to
put
> > together some fun looking Access List questions.  Hopefully this starts
a
> > new thread, because we're due for some new threads...
> >
> >
> > Q1) Write a one-line access list that will meet the following criteria:
> >
> > * First octet must be 10
> > * Second octet can be anything
> > * Third octet must allow the odd values, starting with 200
> > * Fourth octet must be in the .32 subnet, assuming a /27 mask length
> >
> >
> > Q2) Create an access list to be applied to an outbound interface that
will
> > deny the loser on external host 173.3.8.41 from accessing telnet service
> > on an internal host with the address of 155.66.75.1 while allowing all
> > other traffic to pass.
> >
> >
> > Q3) Write an access list that will allow users to access web pages on
> > server 172.16.2.12, but nothing else.
> >
> >
> > Q4) Create and apply an access list that will allow only host
192.168.1.52
> > access to a VTY console session.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=20448&t=20442
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to