While going through NAT Chapter I came across a VERY BASIC doubt about Access Control List (ACL). They used ACL to match the source address 10.0.0.0 /24. At one place they used following ACL to explain SIMPLE NAT:
#access-list 1 permit 10.0.0.1 0.0.0.255
and at another place they used following ACL to explain STATIC NAT (where only 10.0.0.1 is STATICed):
#access-list 1 permit 10.0.0.0 0.0.0.255
Now I got a basic doubt that whats the difference between the two access-list commands WITH RESPECT TO 10.0.0.1.
Hope someone can help me to stress on my GREY cells.
both the above should allow all hosts on network 10.0.0.0
i.e. 10.0.0.1 to 10.0.0.255
this will happen because of the wild-card mask which is 0.0.0.255 (00000000.0000000.00000000.11111111) and therefore needs only to match the first 24 bits of the address and ignors the last 8 bits (in binary)
Just for completeness netmask 0.0.0.0 can be abbreviated with the alias "host" which ges in front of the address. Therefore the list can also be written (and, if you enter what vijayendra said and then do a sho running you will see):
[toc:faq]The ProblemOn traditional switches whenever we have a trunk
interface we use the VLAN tag to demultiplex the VLANs. The switch needs
to determine which MAC Address table to look in for a forwarding
decision. To do this we require the switch to do...
[toc:faq]Introduction:Netdr is a tool available on a RSP720, Sup720 or
Sup32 that allows one to capture packets on the RP or SP inband. The
netdr command can be used to capture both Tx and Rx packets in the
software switching path. This is not a substitut...
IntroductionOSPF, being a link-state protocol, allows for every router
in the network to know of every link and OSPF speaker in the entire
network. From this picture each router independently runs the Shortest
Path First (SPF) algorithm to determine the b...