In this demonstration, explore how to configure an extended access control list. Learn how to create and apply an extended ACL in your networking environment.
- [Instructor] Alright folks let's go ahead and craft…an extended ACL this time.…Now remember the difference between an extended ACL and…a standard ACL.…A standard ACL is just blocking the source,…that's all the information we can use to filter traffic.…An extended ACL can use that little bit of extra,…it can use TCP, UDP, protocol numbers,…all sorts of things, source and destination.…So let's go ahead and craft a little tricky ACL here.…Let's move to global configuration mode while…we're doing this.…
So what we're going to do if you look at the diagram…in the upper right hand side is,…we are going to block traffic specifically Telnet traffic…coming from the internet trying to get into our network.…Now that seems like a pretty slam dunk…security setting to me.…We don't want Telnet traffic coming from the outside…world into our organization.…So let's go ahead and make that happen.…First thing we need to do is craft an access list.…Now we do that from global config,…where we are,…and in order to do this with an extended ACL,…
Released
1/18/2018- Reviewing the basics of the Hot Standby Routing Protocol (HSRP)
- Configuring priority in your HSRP environment
- Reviewing different types of cloud implementation
- Cisco cloud solutions
- Implementing quality of service
- Using access control lists (ACLs) in your network topologies
- Configuring a standard access control list and an extended access control list
- Best practices on crafting and placing ACLs
Share this video
Embed this video
Video: Extended configuration demonstration