In this video, learn the basics of ACLs and the configuration of standard ACLs.
- [Instructor] Access control lists, or ACLs, … are utilized to identify IP addresses … and ports for subnets or hosts. … So I can match subnet 100.64/24 going anywhere, … or I can match host 100.64.0.1 … accessing anything on port 80, … or I can match 100.64.0.1 source from TCP port 5231 … going to host 100.65.65.1 on TCP port 443. … I can get quite granular if I need to. … While they can be used for filtering traffic on interfaces, … they have many more uses. … They can be used for matching traffic for QoS, … or used for route filtering in dynamic protocols. … When using ACLs for interface filtering, … directionality is very important. … An ACL is applied to an interface … using either the keyword in or out. … The way I remember which is which … is to pretend I'm the router … with my hands be the interfaces. … For example, if my right hand … is the interface I want to do the filtering on, … I'll tell myself if I catch it in my hand, the interface, … then use the in keyword, … if the traffic is leaving through my right hand …
Note: A complete overview of the exam and registration instructions can be found at https://www.cisco.com/c/en/us/training-events/training-certifications/exams/current-list/ccna-200-301.html.
- Elements of a robust security program
- Password policy
- Access control lists
- Dynamic ARP Inspection (DAI)
- Software-defined networking
- Software-Defined Access (SDA)
- Rest APIs
- Automation platforms