Selecting specific traffic as it flows through a network is valuable to make networks function in a predictable way. This course will walk you through the operation, implementation, and troubleshooting of standard and extended access control lists.
Access Control Lists (ACLs) are an important and useful tool on a data network. ACLs allow an administrator to select traffic and filter traffic as it flows through a network. In this course, Building, Configuring, and Troubleshooting ACLs, you'll first examine how standard and extended IPv4 access lists operate. Next, you'll learn how to implement each type of list on a router. Finally, you'll explore common errors and how to troubleshoot ACLs using Wireshark. By the end of this course, you'll be able to write your own access control lists to filter whatever traffic you want to either permit or deny on your networks.
Course Overview [Autogenerated] Hi everyone. My name is Ross bigger ____ and welcome to my course. Building configuring and implementing a CLS or access control lists. I'm a network engineer with more than 20 years experience building enterprise networks and teaching people about them. Access control lists are one of a network engineers greatest tools to manipulate traffic flow on a network. Understanding a CLS will allow you to manage a network contain malicious traffic and restrict access to devices and services. In this course we will learn about standard and extended access control lists and how they can be applied to interfaces and other functions on a router. By the end of this course, you'll be able to use Wireshark to build and implement an access control list as well as having a method to troubleshoot a seals that are not functioning as desired. Before beginning this course, you should definitely be familiar with IP addressing packet headers, TCP and UDP segments and their headers as well as how packets are routed through a network, which you can all learn in previous courses in the CCN. A learning path. After you complete this course, you should feel comfortable diving into the network address translation course. I hope you'll join me on this journey to learn standard and extended access control lists with the building Configuring and implementing a C L's course at Pluralsight