If you wanted to deny all Telnet connections to only network 192.168.1...
The extended access list ranges are 100-199 and 2000-2699, so the access-list number of 100 is valid. Telnet uses TCP, so the protocol TCP is valid. Now you just need to look for the source and destination address. Only the third option has the correct sequence of parameters. Answer B may work, but the question specifically states "only" to network 192.168.10.0, and the wildcard in answer B is too broad.
View all questions of this test
If you wanted to deny all Telnet connections to only network 192.168.1...
Denying Telnet Connections to Network 192.168.10.0
To deny all Telnet connections to network 192.168.10.0, the correct command to use is:
access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
Let's break down the command and explain each part:
1. access-list 100: This command creates an access control list (ACL) with the number 100. ACLs are used to filter traffic based on specific criteria.
2. deny: This keyword specifies that the ACL rule will deny the specified traffic.
3. tcp: This keyword specifies the protocol to be filtered, in this case, TCP.
4. any: This keyword represents any source IP address, indicating that the denial applies to all source addresses.
5. 192.168.10.0: This is the destination network address that we want to deny Telnet connections to.
6. 0.0.0.255: This is the wildcard mask that matches any host within the destination network.
7. eq 23: This specifies that the destination port must be equal to port 23, which is the default port for Telnet.
Explanation:
The given command denies TCP traffic from any source IP address to the network 192.168.10.0 with a wildcard mask of 0.0.0.255. It specifically targets destination port 23, which is used by the Telnet protocol.
By denying Telnet traffic to the network 192.168.10.0, this command effectively blocks any Telnet connections attempting to connect to devices within that network. This can be useful for security purposes, as Telnet is an unencrypted protocol and can pose a potential security risk.
Using the correct ACL rule ensures that only Telnet connections to the specific network are denied, without affecting other traffic or networks.