Security is an important part of everything we do today. It's extremely important to understand how Cisco routers and enterprise switch running the Cisco Internetworking Operating System (IOS) can provide security using access control lists (ACLs). This video by Todd Lammle will provide the introduction you need to help you understand how access control lists are used in an internetwork.
- If you're a Sys Admin, shielding sensitive, critical data…as well as your network resources from every possible…evil exploit is a top priority of yours.…Cisco has some really effective security solutions…to equip you with the tools you'll need to make this…happen in a very real way.…The first power tool is known as…the Access Control List, or ACL.…Access lists give network managers a huge amount of control…over traffic flow throughout the enterprise.…With access lists we can gather basic statistics…on packet flow and we can implement security policies.…
These dynamic tools enable us to protect sensitive devices…from the dangers of unauthorized access.…An access lists is essentially a list of conditions…that categorize packets to be either permitted or denied.…They really come in handy when you need to exercise…control over network traffic.…One of the most common and easiest to understand uses…of access lists is to filter unwanted packets when…implementing security policies.…For example, you can set them up to make very specific…
Author
Released
9/30/2016For more information on the CCENT exam, visit Cisco's website.
- Overview of internetworking
- Ethernet
- The TCP/IP networking model
- Easy subnetting
- VLSM
- Managing Cisco IOS
- Managing Cisco networks and devices
- IP routing
- Layer 2 switching
- VLANs and InterVLAN routing
- Security
- Network address translation
- IPv6
Skill Level Intermediate
Duration
Views
Related Courses
-
Introduction
-
Welcome54s
-
The CCNA exam58s
-
Lab environment overview1m 3s
-
-
1. Internetworking
-
Internetworking devices4m 20s
-
2. Ethernet
-
Ethernet overview2m 23s
-
Ethernet addressing3m 51s
-
Ethernet cables4m 55s
-
-
3. Introduction to TCP/IP
-
Overview of TCP/IP model2m 40s
-
Application/process layer2m 19s
-
Internet layer3m 37s
-
IP addressing4m 33s
-
-
4. Easy Subnetting
-
Subnet basics1m 28s
-
Subnet block sizing5m 25s
-
Subnet by example5m 6s
-
Class B subnetting3m 53s
-
-
5. VLSM, Summarization, and Troubleshooting TCP/IP
-
VLSM2m 38s
-
VLSM by hand6m 28s
-
-
6. Cisco Internetworking Operating System (IOS)
-
Introduction to the IOS CLI3m 55s
-
Basic CLI commands5m 23s
-
Telnet and SSH5m 4s
-
-
7. Managing a Cisco Internetwork
-
Router and switch components2m 27s
-
Configure DHCP3m 48s
-
-
8. IP Routing
-
Overview of IP routing3m 45s
-
The IP routing process3m 50s
-
Configure IP routing6m 41s
-
Static routing5m 28s
-
Default routing5m 36s
-
Configure RIPv26m 52s
-
Verify RIPv2 routing5m 55s
-
-
9. Layer 2 Switching
-
Configure a Catalyst switch7m 33s
-
Configure port security5m 5s
-
10. VLANs and InterVLAN Routing (IVR)
-
Overview of VLANs3m 2s
-
Configure VLANs3m 8s
-
Configure trunk links5m 15s
-
Configure IVR on a router2m 42s
-
-
11. Security
-
Introduction to access lists2m 24s
-
Configure access lists4m 3s
-
-
12. Network Address Translation (NAT)
-
Introduction to NAT2m 18s
-
Static NAT2m 53s
-
Configure static NAT3m 11s
-
Dynamic NAT2m 44s
-
Configure dynamic NAT3m 44s
-
NAT overload (PAT)3m 56s
-
Configure NAT overload5m 26s
-
-
13. IPv6
-
Introduction to IPv62m 22s
-
Overview of ICMPv62m 55s
-
Configure IPv66m 7s
-
-
Conclusion
-
Next steps51s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Introduction to access lists