In this demonstration, explore how to configure a named access control list. Learn how to create and apply a named access control list in your networking environment.
- [Instructor] Alright folks, so we've done…a standard and extended ACL, let's go for the gusto here,…let's go for a named access control list.…Now our goal here, for this access control list,…if we look at our topology in the upper right here,…we are going to be denying telnet access for PC1…to anything outside of the router.…So that interface F0/1 that leads up into…that internet cloud, we want to block all access…for telnet for PC1, we don't want it to be able…to leave this local area network…using that telnet protocol.…
So how are we going to do this?…Let's use the named access control list.…First thing we need to do is get into global…configuration mode.…I don't know what termianl is, but we don't need…to be there, we need to be at terminal.…Alright, so configure, we need to go with IP access list,…and right now it looks just like every other…access list we've created, but now we need to…identify whether this is going to be a standard…or extended, and we do that by, not the number…that we used to use, but by actually putting in extended.…
Released
1/18/2018- Reviewing the basics of the Hot Standby Routing Protocol (HSRP)
- Configuring priority in your HSRP environment
- Reviewing different types of cloud implementation
- Cisco cloud solutions
- Implementing quality of service
- Using access control lists (ACLs) in your network topologies
- Configuring a standard access control list and an extended access control list
- Best practices on crafting and placing ACLs
Share this video
Embed this video
Video: Named configuration demonstration