CCNA Exploration 4.0. Accessing the WAN.

Chapter 5: ACLs

{PREVIOUS_CHAPTER} {NEXT_CHAPTER}

5.1 Using ACLs to Secure Networks

5.1.1 A TCP Conversation

5.1.2 Packet Filtering

5.1.3 What is an ACL?

5.1.4 ACL Operation

5.1.5 Types of Cisco ACLs

5.1.6 How a Standard ACL Works

5.1.7 Numbering and Naming ACLs

5.1.8 Where to Place ACLs

5.1.9 General Guidelines for Creating ACLs

5.2 Configuring Standard ACLs

5.2.1 Entering Criteria Statements

5.2.2 Configuring a Standard ACL

5.2.3 ACL Wildcard Masking

5.2.4 Applying Standard ACLs to Interfaces

5.2.5 Editing Numbered ACLs

5.2.6 Creating Standard Named ACLs

5.2.7 Monitoring and Verifying ACLs

5.2.8 Editing Named ACLs

5.3 Configuring Extended ACLs

5.3.1 Extended ACLs

5.3.2 Configuring Extended ACLs

5.3.3 Applying Extended ACLs to Interfaces

5.3.4 Creating Named Extended ACLs

5.4 Configure Complex ACLs

5.4.1 What are Complex ACLs?

5.4.2 Dynamic ACLs

5.4.3 Reflexive ACLs

5.4.4 Time-based ACLs

5.4.5 Troubleshooting Common ACL Errors

5.5 Chapter Labs

5.5.1 Basic Access Control Lists

5.5.2 Access Control Lists Challenge

5.5.3 Troubleshooting Access Control Lists

5.6 Chapter Summary

5.6.1 Summary

5.7 Chapter Quiz

5.7.1 Chapter Quiz

{PREVIOUS_CHAPTER} {NEXT_CHAPTER}

netacad.kiev.ua