0% found this document useful (0 votes)
11 views2 pages

Reading Assignment

The document is a reading assignment focused on understanding wildcard masks in Access Control Lists (ACL). It instructs the reader to differentiate between wildcard masks and subnet masks and to answer specific questions related to given addresses and subnet masks. The assignment also prompts a discussion on the advantages of extended ACLs in certain scenarios.

Uploaded by

tnyange909
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views2 pages

Reading Assignment

The document is a reading assignment focused on understanding wildcard masks in Access Control Lists (ACL). It instructs the reader to differentiate between wildcard masks and subnet masks and to answer specific questions related to given addresses and subnet masks. The assignment also prompts a discussion on the advantages of extended ACLs in certain scenarios.

Uploaded by

tnyange909
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Reading Assignment

Wildcard Masks in ACL


Instructions

From the slides about ACL available on Moodle, read the slides about Wildcard Masks and
understand the concepts behind it.

Make sure you understand the di erence between wildcard masks and subnet masks.

Once you have nished, answer the following questions:

1. Find the address and the wildcard masks given the following address and subnet masks

2. What do you thinks will happen here and why do you think extended ACL is better for this
scenario
fi
ff
Write your answers and submit them through Moodle by midnight:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy