Monday, July 21, 2008

Orientation bash


What a tiring day during the orientation bash (Camping, Sungai Congkak). Being in the games commitee is such a hard jobs. Especially when u have to handle almost everything during the whole process of the orientation bash.

First Night, we all trying to connect the rope from camp 6 to camp 7 accross the river. Din get any leeches during the process and it's only like 4 guys and 2 girls there. Actually i was suprise that i din get the leeches, but instead yun ling got all the leeches. LOL. Right after we finish the tieing the rope, the night has come. We setting up our camp in camp site 3 where I thought the orientation bash camp site will be there. Anyway, that time i got bitten by forest ant. What the Kwan, pain like crazy for few minutes. We sleep quite late after that, around 3am morning. I can hardly sleep because everyone are sleeping so near in the camp. I dunno how many times i row at the same place, trying to find a comfort position to sleep. LOL.


Next Day, Kim Han and I wake up around 9am and getting ready to welcome the new student at the main entrance. After that, we gets ready our games station while the new students and buddy chilling at the riverside. Well, the setting up taking to long because some committee dunno what they should do and some committee are actually having fun together with the new students. The game that we playing is call the councils hunt. Find the councils member and go through with their tasks. I personally think that my part is the hardest part compare to all of the other councils member. IT WASN'T MY IDEA. I dunno why always my part is the hardest and lamest tasks. My tasks for the new students always making me like i'm the evil person trying to torture the students. My part games goes like these, if there is 8 students are playing then i say "I want 5 hands and 10 legs on the ground." Then all 8 students need to figure it out how to make only 5 hands and 10 legs on the ground. The worst part is the task getting harder and harder. Some needs head or heads on the ground. LOL. Poor new students. Anyway, everyone just enjoy the sweetness torture.

Then we have our lunch if i remember. I don't remember if i have a lunch that day but i definately remember that i DON'T have my dinner. Oh...ya! Remember now, I have a sandwishes for my lunch. We were going up and down like crazy just to make sure that students actually having fun with all the activities. We even setting up the camp fire where is damn far away from the camp site. Unfortunately, the fire went off when we ready ourself for the "nightwalk".

After the dinner time, students all are lead by me and my committee to the campfire. We have some ice breaking in front of a small campfire. LOL. Then we go for the NightWalk in Jungle. I remember that night i was a Troop Leader taking over group 6, group 7, and group 4. I bring them straight to the NightWalk. Damn lame. That night so many leeches around me but i dunno. Somemore go to my tummy button and my butt hole. After all the NightWalk and game, that time already around 2 am morning. We go back to our camp site around 3am. Trying to get some shower but unfortunately the water is cold. Cold water cannot clean almost anything. Gosh! still can smell some burn fire on my body.

The next day, we all have a better meal. Rice with chicken curry and milo ice....LOL. Nothing special that day cause everything seem to be normal. We just chill and chit chat. Well, after lunch time we still have a few games to play before we actually go back home. According to plan, we suppose to go play some sport with so many people and only 2 mini balls. LOL. Anyway, students just enjoying themself. Hahaha. So happy wei doing so much thing for the students. So noble right, but what can i do? I'm gemini, a noble friend...hehehe


I would like to conclude my story by saying.....I love camping trip! unfortunately Christina not here with me but she will always in my heart. I miss you baby, Christina.

what a dangerous face!

Wednesday, July 16, 2008

A warning letter

Just finish my Uni today, sitting in my office thinking about what should i do after receiving a warning letter from the board of school regarding my academic presentation. Lower than 50% passing rate and a few subjects are repeating for more than twice.

I went to see my lecturer. Lecturer told me that i'm very into "non-academic". Non-academic is actually good but however i need to have a time management. Is this means i have no time management? NO...Of course i have time management. Just that i'm not very bond with my course mate. That's why i use IT not regularly. Anyway, I will change things that happen before and be something more than just one thing. Remember this," Everyone have a choice disregarding of what choice you made, be firm with the choice you made. Don't let anyone or anybody at all to interrupt the choice you made".

Waiting for Christina to finish her meeting then go back home......

Phone Number Update

Comfirm edi....My number will be 016-8319574.. Thou i have comfirm my phone number but you will still can't find me cause i don't have a phone now. I don't know my previous phone is so alcoholic. W850i Sony Erricson just drank my whole bottle of tequila. hahaha. Sound so exargerate.
Anyway, the real thing happen is my phone was in the bag together with a bottle of tequila. So my lovely rough fren throw my bag on the floor without realising there is a bottle of tequila in my bag. I was so blur cause i just wake up while he trying to clean up the mess. T.T

Don't know why my parent suddenly change to 016 when i realise most of my fren were 012 holder. BTW, Mom giving me her 6500 Nokia. Yahoo!! thou she edi use it for like 3-4 months. Well, I'm still taking it. HAHAHAHA. Finally, i change my phone from Sony Erricson to Nokia. After so much frustration from Sony Erricson, like example, phone charger problem and white screen of death problem.

Saturday, July 5, 2008

Phone rosak again

How lar? my phone rosak again.....the white screen of death again
one mins i can see the screen saver then the next mins cannot see anymore.
Damn Sien lor......should i go repair or not leh? I wan buy new phone lar but then no money...how lar? I'm so going to change from sony ericsson to Nokia....MCH!!!

Anyway, I'm going to change to a new number. Reason is because i keep using my phone "unlimited". That's why parent wanna cut my phone usage. Phone number going to change either to 016-830 9574 or 016-831 9574 . So remember to change my number. The old one will not use anymore....the 012-829 1887. I'm so going to miss my number......T.T

Thursday, June 5, 2008

Reason why i don't want to visit my Rich Friend

Once while visiting a very rich friend, the maid approached me and.....

Question : 'What would you like to have...?
Fruit juice, Soda,Tea, Chocolate, Capuccino, Frapuccino, or Coffee?'

Answer : ' Tea please'

Question : ' Ceylon tea, Indian tea, Herbal tea, Bush tea, Honeybush tea, iced tea or green tea?'

Answer : ' Ceylon tea'

Question : 'How would you like it? Black or white?

Answer : 'white'

Question : 'Milk, or fresh cream?

Answer : 'With milk'

Question : 'Goat's milk, or cow's milk'

Answer : 'With cow's milk please.

Question : 'Freezeland cow or Afrikanercow?'

Answer : 'Um, I'll just take it black.'

Question : 'Would you like it with sweetener, sugar or honey?'

Answer : 'With sugar'

Question : 'Beet sugar or cane sugar?'

Answer : 'Cane sugar'

Question : 'White, brown or yellow sugar?'

Answer : 'Forget about the tea, just give me a glass of water instead.'

Question : 'Mineral water, tap water or distilled water?'

Answer : 'Mineral water'

Question : 'Flavored or non-flavored?'

Answer : 'I think I'll just die of thirst'

-fin-

Tuesday, May 27, 2008

Mindless Night

Here I am in the middle of the night........


4 o'clock in the morning, assignment still not finish. Suppose to pass up yesterday, instead of trying very hard to do my assignment, I think how make a story so that lecturer won't deduct my assignment mark. Suddenly in mind, thinking about a sick certificate that i have last month. Trying very hard to change the date from 28/4/2008 to 26/5/2008.



Ma lou...izzit obvious?


Even obvious right?

I don't think so.....sek kao peng la lou si

What brand kao peng nei oi?


I'm stuck in the middle of my assignment, that's why trying to blogging see if i can come out with something. You think i very free ar? I always planning an evil plan for all the lou si in Monash, where got time to sleep? What? Welfare Officer? Part time only...

-fin-

Monday, May 26, 2008

Awakening

That morning whisper
A gentle kiss
A suspended moment
Of perfect bliss
That precious feeling
As eyes first meet
Bodies entwined
In sleepy heat
Fingers touching
Breath as one
Hearts in rhythm
We greet the sun
Content, in truth
Just to be
Simply enjoying
You and me
- Jamie Vogel -
This poem is for Christina, I love you Christina

Monday, April 28, 2008

Ben's Bitches Conquer Monash Street Carnival



Monash Street Carnival, what a best place to enjoy after all the stress you have in UNI. Totally a blast off during the Monash Street Carnival. Especially when your favourite band shout out your name. Hahaha. Special thanks to CK.

Here i would like to introduce to you my favourite band from subang jaya, Ben's Bitches. OMG...they are so so so great. For the 1st time i love a band so much, especially their songs. Even Linkin Park oso not that great for me. Keep it up for the good work in producing new album by end of this year. Looking forward for new album from you guys.







1. Policemen
2. Mamak Conspiracy
3. Aku Suka Jolok
4. Awek Lu Fit Nya
5. Amber Chia
6. Peter the Pirate
7. Cialat
8. Pencil Ku
9. Ah Beng's Love Songs
10. The Mumbai Songs
11. Kotek berbulu

C.K. the bass guitarist

Wednesday, April 23, 2008

Beauty of Math

1 x 8 + 1 = 9
12 x 8 + 2 = 98
123 x 8 + 3 = 987
1234 x 8 + 4 = 9876
12345 x 8 + 5 = 98765
123456 x 8 + 6 = 987654
1234567 x 8 + 7 = 9876543
12345678 x 8 + 8 = 98765432
123456789 x 8 + 9 = 987654321

---------------------------------------------------------

1 x 9 + 2 = 11
12 x 9 + 3 = 111
123 x 9 + 4 = 1111
1234 x 9 + 5 = 11111
12345 x 9 + 6 = 111111
123456 x 9 + 7 = 1111111
1234567 x 9 + 8 = 11111111
12345678 x 9 + 9 = 111111111
123456789 x 9 +10= 1111111111
---------------------------------------------------------------

9 x 9 + 7 = 88
98 x 9 + 6 = 888
987 x 9 + 5 = 8888
9876 x 9 + 4 = 88888
98765 x 9 + 3 = 888888
987654 x 9 + 2 = 8888888
9876543 x 9 + 1 = 88888888
98765432 x 9 + 0 = 888888888
987654321 x 9 - 1 = 8888888888
9876543210 x 9 - 2 = 88888888888

Brilliant, isn't it?

---------------------------------------------------------
And look at this symmetry:

1 x 1 = 1
11 x 11 = 121
111 x 111 = 12321
1111 x 1111 = 1234321
11111 x 11111 = 123454321
111111 x 111111 = 12345654321
1111111 x 1111111 = 1234567654321
11111111 x 11111111 = 123456787654321
111111111 x 111111111=12345678987654321

------------------------------------------------------------

Now, take a look at this...

101%

From a strictly mathematical viewpoint:

What Equals 100%?
What does it mean to give MORE than 100%?
Ever wonder about those people who say they are
giving more than 100%?
We have all been in situations where someone wants
you to GIVE OVER 100% .

How about ACHIEVING 101%?

What equals 100% in life?

Here's a little mathematical formula that might help
answer these questions:


If:
A B C D E F G H I J K L M N O
P Q R S T U V W X Y Z

Is represented as:

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
16 17 18 19 20 21 22 23 24 25 26.


If:
H-A-R-D-W-O-R- K

8+1+18+4+23+15+18+11 = 98%

And:
K-N-O-W-L-E-D-G-E

11+14+15+23+12+5+4+7+5 = 96%

But:
A-T-T-I-T-U-D-E

1+20+20+9+20+21+4+5 = 100%



THEN,
look how far the love of God will take you:


L-O-V-E-O-F-G-O-D

12+15+22+5+15+6+7+15+4 = 101%



Therefore, one can conclude with
mathematical certainty that:

While Hard Work and Knowledge
will get you close, and Attitude
will get you there,
It's the Love of God that will
put you over the top!

Tuesday, April 22, 2008

Semester 3 - Chapter 6-Access Control Lists

Here you will learn how to create and apply access lists to control both traffic flow and network security. You will review the use and rules of access lists. You will be introduced to the creation of standard and extended IP access lists. After learning the proper techniques for creating access lists, you will review how to apply such lists to router interfaces. Finally, you will learn how to monitor and verify access lists.

Access lists are permit or deny statements that filter traffic based on the source address, destination address, and protocol type of a packet. (Another way to say this is that packets can be checked by the router based on IP address, port number, or packet type). This is all available for IP, IPX, AppleTalk, and many other protocols.

Sample Network




The basic structure of an access list to block access from Network 4 to Network 1:

Access-list 1 deny Network 4
Access-list permit any

All access list end with an implicit deny any, which block all packets that do not meet the requirements of the access list. Access-list 1, if applied to the interface of RouterA connected to Network 1, blocks only the traffic coming from Network 4 to Network 1. If you wanted to deny traffic from Network 3 and Network 4 the conceptual access list syntax would then become the following:

access-list 1 deny Network 3
access-list 1 deny Network 4
access-list 1 permit any

The final permit any statement is necessary because all access lists end with an implicit deny any. If you apply the access list to the interface of RouterA that is connected to Network 1, it blocks traffic from Networks 3 and 4, while allowing all other network traffic to access Network 1.

NOTE: The above access-list statements are not the exact Cisco IOS syntax for the access list command. Actual IOS syntax will be covered later in these notes.

PROBLEMS WITH ACCESS LISTS

One of the most common problems associated with access lists is a lack of planning. Before you even begin the process of creating access lists on your router, you must plan exactly what needs to be filtered and where it needs to be filtered.

Another troublesome area is the sequential nature in which you must enter the lists into the router. You cannot move individual statements once they are entered. When making changes, you must remove the list, using the no access-list command, and then retype the commands.

Finally, many new network administrators find themselves in trouble when they Telnet into a router and begin applying an access list. Access list begin working the second they are applied to an interface. It is very possible that many new administrators will find themselves inadvertently blocked from the very router on which they are applying an access list.

ACCESS LIST RULES

Regardless of the type of access list you create, standard or extended, you must follow certain rules. For instance, you must create and apply access lists sequentially. Also, as stated earlier, access lists end with an implicit deny.

RouterA(config)#access-list 1 deny 172.22.5.2 0.0.0.0
RouterA(config)#access-list 1 deny 172.22.5.3 0.0.0.0
RouterA(config)#access-list 1 permit any

The previous example is a standard IP access list that denies the hosts 172.22.5.2 and 172.22.5.3, while allowing all other traffic. The list is applied sequentially from the top down as the router checks the packets arriving at the interface where this access list is applied, in order to check if the packets match the permit and deny statements.

In the process of applying access lists, the router first checks an arriving packet to determine if it matches the deny 172.22.5.2 0.0.0.0 statement. If it does, the router discards the packet. If it does not, the router applies the second statement, deny 172.22.5.3 0.0.0.0. If the packet matches the second statement, the router discards the packet. Once again, if the packet does not meet the rules of the first two lines, the router applies the final permit any statement, and the packet is forwarded through the interface.

If you wish to remove an access-list, you use the no access-list (list #) command. For example, to remove the above list, you enter global configuration mode and type the no access-list command. The information below shows the correct procedure for typing this command.

NoAccessList command



This command will remove the entire list. You cannot remove a particular line in an access list. As a general rule, you should place first in the lists the lines with the most potential matches so that packets will not undergo unnecessary processing. You should also avoid unnecessarily long access lists. A very long access list will consume large sums of CPU processing time and could cause your router to act as a bottleneck on your network.

After you create access list, you must apply them to interfaces so they can begin filtering traffic. You apply a list as either an outgoing or an incoming filter. To determine how to apply the list, you have to look through the eyes of "The Man in the Router." Traffic coming in to the man in the router, through any of the interfaces, is considered inbound and needs to be filtered using incoming traffic filters.

You would apply the access list to an interface as the below example shows:

RouterA>enable
RouterA#config t
RouterA(config)# int e0
RouterA(config-if)#ip access-group 1 in

Notice that the final step is to apply the access list to one or more interfaces. Once the traffic gets to the "The man in the router," he must push it out to one of the interfaces. Access list to block his outward delivery much be applied as outbound filters. You would use the command similar to the one below.

ip access-group 1 out

Outbound is the default, if the direction is not specified in the command. The final rule that access list must follow states that an interface cannot have more than one inbound or outbound list, per protocol, assigned to it. This means that a router can have no more than one inbound Internet Protocol (IP) access list and one outbound applied at the same time. Multiple lists are allowed only if the lists are different protocols.

In summary, all access lists follow these rules:

· Routers apply lists sequentially in the order in which you type them into the router.
· Routers apply lists to packets sequentially, from top down, one line at a time.
· Packets are processed only until a match is made and then they are acted upon based on the access list criteria contained in the access list statements.
· Lists always end with an implicit deny. Routers discard any packets that do not match any of the access list statements.
· Access lists must be applied to an interface as either inbound or outbound traffic filters.
· Only one list, per protocol, per direction can be applied to an interface.

Standard IP Access Lists

Standard IP access lists filter network traffic based on the source IP address. Using a standard IP access list, you can filter traffic by a host IP, subnet, or a network address. In order to configure standard IP access lists, you must create the list and then apply it to an interface using the syntax following this paragraph. A detailed explanation of each item is contained in the subsequent bulleted list. The parenthesis in each command syntax are not part of the command; they group items that are replaced within each specific entry.

Access-list (list #) (permit deny) (source address) (source wildcard mask)

· (list #) - Standard IP access lists are represented by a number in the range of 1-99 (in IOS versions 11.2 and greater, they can also be represented by text names).

· (permit deny) - Used to specify the nature of the access list line. It is either a permit or a deny statement.

· (source address) - The IP address of the source.

· (source wildcard mask) - A wildcard mask applied to determine which bits of the source address are significant.

Wildcard mask bits are one of the most important concepts in IP access lists. Routers use them to determine which bits in an address will be significant. Unlike subnet masks, 0's are placed in bit positions deemed significant (they must match), and 1's are placed in positions that are not significant (ignore). Consider these addresses and wildcard mask bits:

172.22.5.2 0.0.0.0 - All bit positions must match exactly. Therefore, the access list line will only be applied to host 172.22.5.2

172.22.5.0 0.0.0.255 - Bit positions in the first three octets must match exactly, but the last octet can be any valid number. The access list line will apply to all hosts in the 172.22.5.0 subnet.
172.22.1.0 0.0.254.255 - The first two octets must match exactly, as must the least significant bit position in the third octet. The last octet can be any valid number. This mask would allow you to permit or deny odd subnets from the 172.22.0.0 major network. The example assumes a subnet mask of 255.255.255.0 for a Class B network.

These three examples are converted to binary below for a better explanation.

Wildcard masking example matching a single host

IP address:
Decimal 172.22.5.2
Binary 10101100.00010110.00000101.00000010

Wildcard Mask:
Decimal 0.0.0.0
Binary 00000000.00000000.00000000.00000000

All bit positions occupied by a 0 in the wildcard mask are significant and must match when a packet is examined by the router for access list criteria. Therefore, if you had an access list with a deny 172.22.5.2 0.0.0.0 (IP address and then wildcard mask), the router would deny all packets that matched the IP address 172.22.5.2.

Since 0's represent significant bits, you can see that in the above wildcard mask of 0.0.0.0 requires that the source address match exactly.

Wildcard masking example matching a complete subnet

IP Address
Decimal 172.22.5.0
Binary 10101100.00010110.00000101.00000000

Wildcard Mask
Decimal 0.0.0.255
Binary 00000000.00000000.00000000.11111111

All bit positions occupied by a 0 in the wildcard mask are significant and must match when a packet is examined by the router for access list criteria. This wildcard mask requires that the first three octets match exactly. Since the final octet is all 1's, the final octet is not significant. It can be any valid value from 1 to 254.

If you remember that 0's represent significant bits, you see that the first three octets must match. The final octet of the wildcard mask consists of 1s and signifies that the value of the fourth octet is not significant.

Third and more difficult example

This final example of wildcard masking is a bit tougher and requires examining two IP addresses to fully understand it. This first example illustrates an odd subnet.

IP address
Decimal 172.22.1.0
Binary 10101100.00010110.00000001.00000000

Wild card Mask
Decimal 0.0.254.255
Binary 00000000.00000000.11111110.11111111

This wildcard mask requires that the first two octets and the final bit position of the third octet match the IP address in the access list. The values in the last octet are not significant. Since the final bit positions in the third octet of the IP address in the access list are turned on (set to 1), all packets that the access list will permit or deny must have a 1 in the final bit position of the third octet.

In the above example, the first two octets must match exactly. Also, the final bit place in the third octet must match; it must be a 1! Therefore, an access list that states access-list 1 permit 172.22.1.0 0.0.254.255 will allow traffic from any odd-numbered subnet to pass. Even-numbered subnets are blocked because their last bit position in the third octet is a 0.

If you use a source of 172.22.1.0 and a wildcard mask of 0.0.254.255, any packet that the list will act upon must have a 1 in the least significant bit position of the third octet. If a packet with the IP address of 172.22.2.1 is examined by the access list in the previous paragraph, the router ignores it because the least significant bit of the third octet (see below) is a 0, not a 1. The next example shows why this is true.

Since the least significant bit positions do not match, any address within the subnet 172.22.2.0 is out of the required range of the access list and is thus discarded (or ignored, depending on the function of the access list).

IP Address
Decimal 172.22.2.1
Binary 10101100.00010110.00000010.00000001

Wildcard Mask
Binary 00000000.00000000.11111110.11111111

This wildcard mask requires that the first two octets and the final bit position of the third octet match the IP address in the access list. The values in the last octet are not significant. Since the final bit position in the third octet of the examined IP address and the IP address in the access list do not match (one is a 0 and the other is a 1), any line in an access list with a permit or deny 172.22.1.0 0.0.254.255 would not apply to the address 172.22.2.1. In fact, no even subnet could be affected because all even subnets would have a value of 0 in the last bit position of the third octet.

Standard IP Access List Example

Standard IP access lists permit or deny packets based only upon the source address. These addresses that the router checks to see if packets should be processed can be a single host address, a subnet address, or a full network address. Consider the following example.

AccessListExample




Using the example above you can create a standard IP access list that blocks host 172.22.5.2 from accessing subnet 172.22.2.0. The commands you need to do this are given below.

RouterB#config t
Enter configuration commands, one per line. End with CNTL/Z.
RouterB(config)#access-list 1 deny 172.22.5.2
RouterB(config)#access-list 1 permit 0.0.0.0 255.255.255.255
RouterB(config)#int e0
RouterB(config-if)#ip access-group 1 out

Monitoring Standard IP Access Lists

Three main commands are available for monitoring access lists on your router. The first two, show access-lists and show ip access-lists, display the exact syntax of all access lists and IP access lists, respectively. The show interface or show ip interface command is used to verify that an access list has been successfully applied to an interface. Show ip interface will show you where access lists have been set. It is a good idea to run each of these commands after creating and applying access lists, to visually inspect and verify that statements were typed in correctly and that the lists will function as entered.

Extended IP Access Lists

Standard IP access list are limited to filtering by source IP addresses only. Extended IP access lists, on the other hand, can filter by source IP address, destination IP address, protocol type, and application port number. This allows you to design extended IP access lists that permit or deny a single type of IP protocol, such as TCP, and then filter by a particular port of a particular protocol, port 21 or FTP, for example.

In order to configure extended IP access lists, you must create the list and then apply it to an interface using the following syntax (a detailed explanation of each item is contained in the list below.

Access-list (list#) (permit deny) (source IP address) (source wildcard mask) (destination IP address) (destination wildcard mask) (operator) (port) (log)

· (list #) - Extended IP access lists are represented by a number in the range of 100-199 (in IOS versions 11.2 and greater, they can also be represented by text names).
· (permit deny) - Used to specify the nature of the access list line. It is either a permit or a deny statement.
· (protocol) - The IP protocol to be filtered can be IP (which includes all protocols in the TCP/IP suite) TCP, UDP, ICMP, or others.
· (source address) - The IP address of the source
· (source wildcard mask) - A wildcard mask, or inverse mask, applied to determine which bits of the source address are significant
· (destination address) - The IP address of the destination
· (destination wildcard mask) - A wildcard mask, or inverse mask, applied to determine which bits of the destination address are significant
· (operator) - Can contain lt (less than), gt (greater than), eq (equal to), or neq (not equal to). It is used if an extended list filters by a specific port number.
· (port) - If necessary, the port number of the protocol to be filtered
· (log) - Turns on logging of access list activity

Extended IP Access List Example

With extended IP access lists, you should determine what the list will filter before you create the list itself. Using the sample below the paragraph will discuss how to block host 172.22.5.2 from accessing Web service on server 172.22.2.2. This extended IP access list example shows how to block WWW and how to apply a list that blocks WWW access.



Use the following steps to accomplish the blocking of WWW access.

RouterC>enable
Password:
RouterC#config t
RouterC(config)#access-list 100 deny tcp host 172.22.5.2 host 172.22.2.2 eq www
RouterC(config)#access-list 100 permit ip any any
RouterC(config)#int e0
RouterC(config-if)#ip access-group 100 in

Once an extended IP access list is created, it must be applied to an interface, just like a standard list. The difference is the placement of the list. Standard IP access lists examine the source address only. As a result, you must place them as close to the destination as possible to avoid blocking traffic bound for another interface/network. On the other hand, extended IP access list are able to filter based on source and destination. Therefore, they are placed as close to the source as possible.

In the above sample, the list is best placed as in inbound filter on the Ethernet0 interface of RouterC. Traffic from host 172.22.5.2 destined for the Web server at 172.22.2.2 will be blocked before it has a chance to even enter the network. Because of their placement, extended access lists create less traffic across the internetwork. The above sample displays the proper commands for adding the extended access list as an inbound list on interface Ethernet0.

Access Lists Short Cuts

The following access lists do the same thing and it works for both standard and extended access lists.

access-list 1 deny 172.22.2.2 0.0.0.0
or
access-list 1 deny host 172.22.2.2

The word "host" is short for a wildcard mask of 0.0.0.0, but notice that when this is used the word "host" comes before the IP address.

access-list 1 permit 0.0.0.0 255.255.255.255
or
access-list 1 permit any

Instead of typing 0.0.0.0 255.255.255.255, the administrator can use the word any by itself as the keyword.

Monitoring Extended IP Access Lists

The same commands used to monitor standard IP access lists are used to monitor extended IP access lists. If you wish to view the access lists configured on your router, you use the show access-lists or show ip access-lists command.

Standard IPX Access Lists


Standard IPX access lists are very similar to their IP cousins, but they have one distinct difference. While standard IP access lists only filter based on source addresses, standard IPX access lists can filter based on source and destination nodes or on networks. In all other respects, they act just like standard IP access lists. Standard IPX access lists are represented by a number in the range of 800-899.

Thursday, April 17, 2008

I finally lost my pen drive

Dear black house,

My pendrive lost la like everyone else in monash. I just can't believe that i have lost it. I always been so careful with my belongings especially my handphone and wallet. This pendrive is my most favourite pendrive. It have a jade chain on the pendrive. Well, now is gone now. My assignment is due today and i still able to finish it on time. Is not only about the pendrive was lost, but also my desktop got virus. I hate this spyware thingy. Damn shity. It makes me unable to online and everything seem to be very slow than it use to be. Portable hard disk also "hang kang". How la...aiyoyo.

Tommorrow got welfare committee meeting at 12pm and i need to send a report to General secretary by 12pm. How i transfer file la. Only place i can transfer my data is through email to email. So many work need to be done and some many work need a portable data transfer. I hope i can save some money and buy a new pendrive or something better to store my data.

Damn sien la.....saturday got student councils meeting and i got two assignment due next week. I haven even start. I hope this weekend can do my assignment with Luke. Sunday pulak got Zoo negara. First i thought going to Zoo Negara to have fun. Mana la tau, go there to clean and do charity work. Well, anyway, good also la at least this is the only time i do charity thing. hahaha



Anyway, i continue my blog again. Hope to write more

-fin-