New Training: Configure and Verify Access Control Lists
In this 5-video skill, CBT Nuggets trainer Keith Barker teaches you how to configure and verify access-control lists (ACLs) as part of infrastructure security. Watch this new Cisco training.
Watch the full course: Cisco CCNP Enterprise Core
This training includes:
- 5 videos
- 39 minutes of training
You’ll learn these topics in this skill:
- Introduction to Filtering ACLs
- Access Control List (ACL) Overview
- Standard Numbered ACL Lab
- Standard Named ACL Lab
- Extended ACLs
How Can Access Control Lists Manage IP Traffic?
Access Control Lists of ACLs are network traffic policies that control how data packets traverse a network. ACLs work on the simple principle of applying a set of rules at the router level that define parameters for accepting and transmitting data packets. Administrators can define ACL rules to limit incoming traffic from certain sources, limit the destination targets, or control transmission based on other characteristics of the source data packet itself.
ACLs provide two great benefits to organizations. First, ACLs provide control over how data is transmitted within a network, effectively allowing administrators to prioritize and deprioritize transmission routes depending on the unique characteristics pertaining to the source of the data or the data packets in transit. Secondly, ACLs allow organizations to enhance their security posture by controlling how data is transmitted within the network. This traffic management strategy provides organizations with the enhanced granular control of data transmission required in the modern business environment to support critical business processes and keep organizations safe.