Securing the network, especially at the perimeter, is a critical part of network administration. Discover how to use Access Control Lists to permit or deny access to network resources.
CCENT: Access Control Lists Part 1
- describe the configuration and operation of Standard Access Control Lists
- apply standard ACLs to an interface and describe how extended ACLs can be created