From: Daniel Cisco Group Study (danielcgs@imc.net.au)
Date: Sun Jun 22 2003 - 21:37:39 GMT-3
Simple question:
I need to create an ACL to filter / redistribute / (whatever) the two routes:
172.16.30.0 / 24
192.168.2.64 / 26
I've always used the "lazy", or what I call the efficient method:
access-list 1 permit 172.16.30.0
access-list 1 permit 192.168.2.64
It has always worked for me no problem.
However, every "authority" always specifies the masks:
access-list 1 permit 172.16.30.0 0.0.0.255
access-list 1 permit 192.168.2.64 0.0.0.63
In my mind, these masks are simply killing electrons, and taking up my time.... I know how to use them, but why bother?
The big questions:
(1) Am I wrong in saying that these masks are unnecessary?
(2) In the lab, do we play it safe, and specify the "useless" masks?
(3) Has anyone (knowingly) got away with the first method in the lab? (without breaking NDA)
I don't mind having to specify the masks, but I'd love to know WHY I should (apart from losing marks if I don't)........
Daniel
**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
This footnote also confirms that this email message has been swept by
MIMEsweeper for the presence of computer viruses.
www.mimesweeper.com
**********************************************************************
This archive was generated by hypermail 2.1.4 : Fri Jul 04 2003 - 11:11:06 GMT-3