Войти
  • 37477Просмотров
  • 5 лет назадОпубликованоPractical Networking

Numbered ACL Configuration Demonstration -- Access Control Lists (ACLs) -- Part 3 of 8

Welcome to Part 3 of an eight part video series discussing Access Control Lists on Cisco IOS Routers. In this video we'll be applying what we learned about the Syntax of Numbered ACLs in Part 2 as we configure various access-list entries together. While configuring, I'll also be talking through some important considerations for access lists. 00:00 - Intro & Part 2 Recap 00:27 - ACL Remarks 01:28 - Matching IP traffic between two Hosts 02:37 - Specifying IP Addresses 02:45 - Matching IP traffic between a Subnet and a Host 03:32 - Matching all ICMP traffic (pings, traceroute, etc) 04:36 - Matching a single TCP packet explicitly 05:40 - Five fields of an Extended ACL 05:57 - Typical way to write ACL statements 06:39 - Matching TCP/UDP traffic from a particular application 07:20 - Matching Response traffic 07:54 - Implicit Deny 09:04 - Denying TCP/UDP traffic from a particular application 10:37 - First Match processing 12:22 - Summary 12:57 - Removing entries from Numbered ACLs 13:57 - Outro Part 1 - What are Access Lists? Part 2 - Numbered ACL Syntax Part 3 - Numbered ACL Configuration Demonstration Part 4 - Named ACL Syntax Part 5 - Named ACL Configuration Demonstration Part 6 - IPv6 ACLs - Syntax and Demonstration Part 7 - Applying ACLs to Interfaces Part 8 - Where should you apply ACLs (closer to source or destination?) Entire Series: