Securing the network, especially at the perimeter, is a critical part of network administration. Discover how to use Access Control Lists to permit or deny access to network resources.
CCENT: Access Control Lists Part 2
- describe additional ACLs that may need to be configured
- use and apply named access lists on a virtual interface