Selecting specific traffic as it flows through a network is valuable to make networks function in a predictable way. This course will walk you through the operation, implementation, and troubleshooting of standard and extended access control lists.
Access Control Lists (ACLs) are an important and useful tool on a data network. ACLs allow an administrator to select traffic and filter traffic as it flows through a network. In this course, Building, Configuring, and Troubleshooting ACLs, you'll first examine how standard and extended IPv4 access lists operate. Next, you'll learn how to implement each type of list on a router. Finally, you'll explore common errors and how to troubleshoot ACLs using Wireshark. By the end of this course, you'll be able to write your own access control lists to filter whatever traffic you want to either permit or deny on your networks.
Course Overview Hi, everyone. My name is Ross ________ us and welcome to my course building. Configuring and implementing a C. L's or access control lists. I'm a network engineer with more than 20 years experience building enterprise networks and teaching people about them. Access control lists are one of a network engineers greatest tools to manipulate traffic flow on a network. Understanding a C L's will allow you to manage a network, contain malicious traffic and restrict access to devices. And service is in this course we will learn about standard and extended access control lists and how they can be applied to interfaces and other functions on a router. By the end of this course, you will be able to use wire shark to build an implement and access control list, as well as having a method to troubleshoot a seals that are not functioning as desired. Before beginning this course, you should definitely be familiar with I p. Addressing packet headers, TCP and UDP segments and their headers, as well as how packets are routed through a network which you can all learn in previous courses in the CC and a learning path. After you complete this course, you should feel comfortable diving into the network address translation course. I hope you'll join me on this journey to learn standard and extended access control lists with the building configuring and implementing a C. L's course at Pluralsight.