How can you utilize access control lists in your IPV4 security protocols? In this video, learn about adding access control entries to your ACLs.
- [Instructor] Access Control Lists are one … of the most commonly used features in iOS, … we can use those for traffic filtering … for route redistribution, packet identification … for policy based routing, and much more. … So it's important to be able to interpret … and troubleshoot those. … That's what we're going to examine here. … Specifically, look at troubleshooting … IP version 4 access control lists … used for traffic filtering. … A few key things you want to remember about ACLs … when troubleshooting are first ACLs are processed … in a top down manner, they are made up … of multiple access control entries, or ACEs … and the order of these ACEs does matter. … Entries are processed in order from top to bottom. … Also, remember that when a packet arrives, … the first ACE that matches the packet values … which are being examined, will be applied, … and the processing will stop. … So if a packet matches multiple entries in the ACL, … the only action that's going to be taken … is whatever the first match in that access control list is, …
This course was created by Kevin Wallace Training. We are pleased to offer this training in our library.
- MPLS overview
- DMVPN overview
- AAA troubleshooting
- IPv6 traffic filters
- Control plane policing
- IPV6 neighbor discovery inspection
- IPv4 ACL troubleshooting