In this video, Todd Lammle will discuss the access-lists covered in the latest Cisco Certified Entry Network Technician (CCENT) objectives regarding security. Access-list, specifically names and numbers standard access-lists will be demonstrated and verified with the most common verification commands used with access-list. Finally, comparing standard and extended access-lists in a lab is shown.
- [Narrator] Now that we have an understanding of…standard access lists and how we can configure them…with both named and numbered access lists,…let's run out to San Francisco…and demonstrate how we can stop the corp router…from telnetting into San Francisco…by using a named standard access list.…Let's take a look.…The first thing I want to as Corp…is I'm gonna ping corp 10.2…and telnet to Corp or San Francisco from Corp.…All right, looking good, and we'll get back out.…And let's run out.…
I wanna call (mumbles) San Francisco…because I'm gonna block Corp.…So I'm gonna say config T.…Now I can type access list and use a numbered access list…for standard B1 to 99.…We also have 13 to 1999, we usually don't use those.…You don't usually use standard access list really,…but IP that's the (mumbles) objective.…IP access list standard.…So we're using a named.…I'm gonna call this Block Corp.…
Nice, okay.…Not much we can do here, guys,…with the standard access list.…Block the source, right?…So I'm gonna say deny host 172.16.10.1.…
Author
Released
9/30/2016For more information on the CCENT exam, visit Cisco's website.
- Overview of internetworking
- Ethernet
- The TCP/IP networking model
- Easy subnetting
- VLSM
- Managing Cisco IOS
- Managing Cisco networks and devices
- IP routing
- Layer 2 switching
- VLANs and InterVLAN routing
- Security
- Network address translation
- IPv6
Skill Level Intermediate
Duration
Views
Related Courses
-
Introduction
-
Welcome54s
-
The CCNA exam58s
-
Lab environment overview1m 3s
-
-
1. Internetworking
-
Internetworking devices4m 20s
-
2. Ethernet
-
Ethernet overview2m 23s
-
Ethernet addressing3m 51s
-
Ethernet cables4m 55s
-
-
3. Introduction to TCP/IP
-
Overview of TCP/IP model2m 40s
-
Application/process layer2m 19s
-
Internet layer3m 37s
-
IP addressing4m 33s
-
-
4. Easy Subnetting
-
Subnet basics1m 28s
-
Subnet block sizing5m 25s
-
Subnet by example5m 6s
-
Class B subnetting3m 53s
-
-
5. VLSM, Summarization, and Troubleshooting TCP/IP
-
VLSM2m 38s
-
VLSM by hand6m 28s
-
-
6. Cisco Internetworking Operating System (IOS)
-
Introduction to the IOS CLI3m 55s
-
Basic CLI commands5m 23s
-
Telnet and SSH5m 4s
-
-
7. Managing a Cisco Internetwork
-
Router and switch components2m 27s
-
Configure DHCP3m 48s
-
-
8. IP Routing
-
Overview of IP routing3m 45s
-
The IP routing process3m 50s
-
Configure IP routing6m 41s
-
Static routing5m 28s
-
Default routing5m 36s
-
Configure RIPv26m 52s
-
Verify RIPv2 routing5m 55s
-
-
9. Layer 2 Switching
-
Configure a Catalyst switch7m 33s
-
Configure port security5m 5s
-
10. VLANs and InterVLAN Routing (IVR)
-
Overview of VLANs3m 2s
-
Configure VLANs3m 8s
-
Configure trunk links5m 15s
-
Configure IVR on a router2m 42s
-
-
11. Security
-
Introduction to access lists2m 24s
-
Configure access lists4m 3s
-
-
12. Network Address Translation (NAT)
-
Introduction to NAT2m 18s
-
Static NAT2m 53s
-
Configure static NAT3m 11s
-
Dynamic NAT2m 44s
-
Configure dynamic NAT3m 44s
-
NAT overload (PAT)3m 56s
-
Configure NAT overload5m 26s
-
-
13. IPv6
-
Introduction to IPv62m 22s
-
Overview of ICMPv62m 55s
-
Configure IPv66m 7s
-
-
Conclusion
-
Next steps51s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Configure access lists