Please enable JavaScript.
Coggle requires JavaScript to display documents.
CHAPTER 7 : ACCESS CONTROL LISTS (7.1 ACL OPERATION (7.1.2 WILDCARD MASKS…
CHAPTER 7 : ACCESS CONTROL LISTS
7.0.1: WELCOME
7.0.1.1 ACCESS CONTROL LISTS
most important skills a network administrator needs is mastery of access control lists.
provide security for a network.
hardware or software solutions that enforce network policies.
network designers use firewalls to protect networks from unauthorized use.
7.1 ACL OPERATION
7.1.2 WILDCARD MASKS IN ACLs
7.1.2.1 INTRODUCING ACL WILDCARD MASKING
IPv 4 ACEs - use of wildcard masks.
7.1.3
7.1.1 PURPOSE OF ACLs
7.1.1.1 WHAT IS AN ACL?
a series of IOS commands that control - a router forwards / drops based on information found in the packet header.
a router does not have ACLs configured
traffic that enters the router is routed solely based on information within the routing table.
7.1.1.2 PACKET FILTERING
controls access to a network by analyzing the incoming and outgoing packets and forwarding or discarding
is a sequential list of permit or deny statements.
7.1.1.3 ACL OPERATION
1) Inbound ACLs
2) Outbound ACLs