Building, Configuring, and Troubleshooting ACLs

Selecting specific traffic as it flows through a network is valuable to make networks function in a predictable way. This course will walk you through the operation, implementation, and troubleshooting of standard and extended access control lists.
Course info
Level
Intermediate
Updated
Apr 2, 2020
Duration
2h 37m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 2, 2020
Duration
2h 37m
Description

Access Control Lists (ACLs) are an important and useful tool on a data network. ACLs allow an administrator to select traffic and filter traffic as it flows through a network. In this course, Building, Configuring, and Troubleshooting ACLs, you'll first examine how standard and extended IPv4 access lists operate. Next, you'll learn how to implement each type of list on a router. Finally, you'll explore common errors and how to troubleshoot ACLs using Wireshark. By the end of this course, you'll be able to write your own access control lists to filter whatever traffic you want to either permit or deny on your networks.

About the author
About the author

For nearly 20 years, Ross has taught and managed data networks.

More from the author
Building Hardware Labs for CCNA Study
Intermediate
4h 11m
Apr 29, 2020
More courses by Ross Bagurdes
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, everyone. My name is Ross ________ us and welcome to my course building. Configuring and implementing a C. L's or access control lists. I'm a network engineer with more than 20 years experience building enterprise networks and teaching people about them. Access control lists are one of a network engineers greatest tools to manipulate traffic flow on a network. Understanding a C L's will allow you to manage a network, contain malicious traffic and restrict access to devices. And service is in this course we will learn about standard and extended access control lists and how they can be applied to interfaces and other functions on a router. By the end of this course, you will be able to use wire shark to build an implement and access control list, as well as having a method to troubleshoot a seals that are not functioning as desired. Before beginning this course, you should definitely be familiar with I p. Addressing packet headers, TCP and UDP segments and their headers, as well as how packets are routed through a network which you can all learn in previous courses in the CC and a learning path. After you complete this course, you should feel comfortable diving into the network address translation course. I hope you'll join me on this journey to learn standard and extended access control lists with the building configuring and implementing a C. L's course at Pluralsight.