PLU | Building, Configuring, And Troubleshooting ACLs (2020 EN)

Discussion in 'Information Technology' started by Kanka, Apr 13, 2020.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Likes Received:
    Trophy Points:

    Company: Pluralsight
    Author: Ross Bagurdes
    Full Title: Building, Configuring, And Troubleshooting ACLs
    Year: 2020
    Language: English
    Genre: Educational: Networking
    Skill Level: Intermediate
    Price: -
    Files: MP4 (+ Exercise Files, Slides .PDF)
    Time: 02:37:54
    Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 200 kbps
    Audio: AAC at 96 Kbps, 2 channels, 48.0 KHz

    Selecting specific traffic as it flows through a network is valuable to make networks function in a predictable way. This course will walk you through the operation, implementation, and troubleshooting of standard and extended access control lists.

    Access Control Lists (ACLs) are an important and useful tool on a data network. ACLs allow an administrator to select traffic and filter traffic as it flows through a network. In this course, Building, Configuring, and Troubleshooting ACLs, you'll first examine how standard and extended IPv4 access lists operate. Next, you'll learn how to implement each type of list on a router. Finally, you'll explore common errors and how to troubleshoot ACLs using Wireshark. By the end of this course, you'll be able to write your own access control lists to filter whatever traffic you want to either permit or deny on your networks.

    1. Course Overview
    01. Course Overview
    2. Introduction to ACLs
    02. Introduction
    03. Access Control Lists in the Human World
    04. Access Control List Selection Criteria
    05. How Standard Access Control Lists Work
    06. Applying Access Control Lists
    07. Summary
    3. Standard ACLs
    08. Introduction
    09. Using the Wildcard Mask
    10. Implementing a Standard Access Control List
    11. Demo: Implementing a Standard ACL on a Router
    12. Demo: Testing That Your ACLs Work
    13. Summary
    4. Extended ACLs
    14. Introduction
    15. Extended Access Control Lists in Depth
    16. Building a Extended Access Control List Table
    17. Extended Access Control List Syntax
    18. Demo: Implementing an Extended Access Control List on a Router
    19. Demo: Testing Your Extended ACLs
    20. Demo: Fixing the Extended ACL to Allow SSH Access from Your Workstation
    21. Summary
    5. Check Your Knowledge: Wildcard Masks, Logging, and ACL Scenarios
    22. Introduction
    23. Wildcard Mask Problems
    24. Demo: Implementing Logging ACLs
    25. ACL Scenario: Denying a Single Host
    26. ACL Scenario: Multiple Permits and Deny Statements in an ACL
    27. Summary
    6. Check Your Knowledge: Using Wireshark and Telnet to Test ACLs
    28. Introduction
    29. Demo: Using Wireshark to Help Build ACLs
    30. Demo: Using Telnet to Test Your ACLs
    31. Demo: Using ACLs to Restrict SSH Access
    32. Summary