Compare cert salaries and plan your next career move
vishaw1986 wrote: » Hey Jojn , Yes its is in program to use wild card mask with the access-list , as it has benefit of using the wildcard mask with the access-list , as subnet mask is contiguous and wild card mask is non-contiguous means suppose If we wanted to match on 2 IP addresses, based on the first 8 bits matching, as well as bits 17-24, a traditional mask can't pull that one off (because they have to be in order, from high to low), but the wild card mask could using 0.255.0.255
vishaw1986 wrote: » Hey John , Yes its is in program to use wild card mask with the access-list , as it has benefit of using the wildcard mask with the access-list , as subnet mask is contiguous and wild card mask is non-contiguous means suppose If we wanted to match on 2 IP addresses, based on the first 8 bits matching, as well as bits 17-24, a traditional mask can't pull that one off (because they have to be in order, from high to low), but the wild card mask could using 0.255.0.255
Compare salaries for top cybersecurity certifications. Free download for TechExams community.