Please enable JavaScript.
Coggle requires JavaScript to display documents.
(Guidelines for using ACLs (Configure ACLs for each network protocol…
-
-
ACL Best Practices
Base your ACLs on the security policy of the organization= This will ensure you implement organizational security guidelines.
Prepare a description of what you want your ACLs to do.= This will help you avoid inadvertently creating potential access problems.
Use a text editor to create,edit,and save ACLs.= This will help you create a library of reusable ACLs.
Test your ACLs on a development network before implementing them on a production network.= This will help you avoid costly errors.
-
-
-
-
-
Wildcard mask
Just like subnet mask,wildcard mask is also used to draw a boundary in IP address. Where subnet mask is used to seperate network address from host address,wildcard mask is used to distinguish the matching portion from th rest. Wildcard mask is the invert of Subnet mask. Wildcard can be calculated in decimal or in binary from subnet mask
Subtract subnet mask from 255.255.255.255
255.255.255.255-Subnet mask=Wildcard mask
-
-
-