Securing the network, especially at the perimeter, is a critical part of network administration. Discover how to use Access Control Lists to permit or deny access to network resources.
CCENT: Access Control Lists Part 2
- describe additional ACLs that may need to be configured
- use and apply named access lists on a virtual interface
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.