New Skills

New Training: Configure and Verify Access Control Lists

by Team Nuggets
New Training: vSphere vApps & Snaps picture: A
Published on March 4, 2021

In this 5-video skill, CBT Nuggets trainer Keith Barker teaches you how to configure and verify access-control lists (ACLs) as part of infrastructure security. Watch this new Cisco training.

Watch the full course: Cisco CCNP Enterprise Core

This training includes:

  • 5 videos

  • 39 minutes of training

You’ll learn these topics in this skill:

  • Introduction to Filtering ACLs

  • Access Control List (ACL) Overview

  • Standard Numbered ACL Lab

  • Standard Named ACL Lab

  • Extended ACLs

How Can Access Control Lists Manage IP Traffic?

Access Control Lists of ACLs are network traffic policies that control how data packets traverse a network. ACLs work on the simple principle of applying a set of rules at the router level that define parameters for accepting and transmitting data packets. Administrators can define ACL rules to limit incoming traffic from certain sources, limit the destination targets, or control transmission based on other characteristics of the source data packet itself.

ACLs provide two great benefits to organizations. First, ACLs provide control over how data is transmitted within a network, effectively allowing administrators to prioritize and deprioritize transmission routes depending on the unique characteristics pertaining to the source of the data or the data packets in transit. Secondly, ACLs allow organizations to enhance their security posture by controlling how data is transmitted within the network. This traffic management strategy provides organizations with the enhanced granular control of data transmission required in the modern business environment to support critical business processes and keep organizations safe.

Recommended Articles