Kent Hundley has authored several books that each have an algorithm for
determining the correct mask(s). One of his books deals with Cisco Security,
the other with Access Lists. Check out Amazon.com for the exact titles.
> -----Original Message-----
> From: Ronnie Toolte [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, July 12, 2000 12:26 PM
> To: [EMAIL PROTECTED]
> Subject: access-list ?
>
>
> Does anyone know of a good resource that explains extended
> access-list?
> I'm having problems understanding how to take a range of networks and
> reduce them in number by summarizing them. For example, if I want to
> filter out all networks from 24.1.0.0 to 24.20.0.0, how would I
> determine what inverse mask to use?
>
> access-list 101 deny ip 24.1.0.0 ?.?.?.? any
>
> I know if I want to filter just 24.1.0.0, I would do
> access-list 101 deny ip 24.1.0.0 0.0.255.255 any
>
> thanks in advance....
>
> ___________________________________
> UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
> FAQ, list archives, and subscription info: http://www.groupstudy.com
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>
___________________________________
UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
FAQ, list archives, and subscription info: http://www.groupstudy.com
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]