Company: Pluralsight Author: Ross Bagurdes Full Title: Building, Configuring, And Troubleshooting ACLs Year: 2020 Language: English Genre: Educational: Networking Skill Level: Intermediate Price: - - Files: MP4 (+ Exercise Files, Slides .PDF) Time: 02:37:54 Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 200 kbps Audio: AAC at 96 Kbps, 2 channels, 48.0 KHz Selecting specific traffic as it flows through a network is valuable to make networks function in a predictable way. This course will walk you through the operation, implementation, and troubleshooting of standard and extended access control lists. Access Control Lists (ACLs) are an important and useful tool on a data network. ACLs allow an administrator to select traffic and filter traffic as it flows through a network. In this course, Building, Configuring, and Troubleshooting ACLs, you'll first examine how standard and extended IPv4 access lists operate. Next, you'll learn how to implement each type of list on a router. Finally, you'll explore common errors and how to troubleshoot ACLs using Wireshark. By the end of this course, you'll be able to write your own access control lists to filter whatever traffic you want to either permit or deny on your networks. Lessons: 1. Course Overview 01. Course Overview 2. Introduction to ACLs 02. Introduction 03. Access Control Lists in the Human World 04. Access Control List Selection Criteria 05. How Standard Access Control Lists Work 06. Applying Access Control Lists 07. Summary 3. Standard ACLs 08. Introduction 09. Using the Wildcard Mask 10. Implementing a Standard Access Control List 11. Demo: Implementing a Standard ACL on a Router 12. Demo: Testing That Your ACLs Work 13. Summary 4. Extended ACLs 14. Introduction 15. Extended Access Control Lists in Depth 16. Building a Extended Access Control List Table 17. Extended Access Control List Syntax 18. Demo: Implementing an Extended Access Control List on a Router 19. Demo: Testing Your Extended ACLs 20. Demo: Fixing the Extended ACL to Allow SSH Access from Your Workstation 21. Summary 5. Check Your Knowledge: Wildcard Masks, Logging, and ACL Scenarios 22. Introduction 23. Wildcard Mask Problems 24. Demo: Implementing Logging ACLs 25. ACL Scenario: Denying a Single Host 26. ACL Scenario: Multiple Permits and Deny Statements in an ACL 27. Summary 6. Check Your Knowledge: Using Wireshark and Telnet to Test ACLs 28. Introduction 29. Demo: Using Wireshark to Help Build ACLs 30. Demo: Using Telnet to Test Your ACLs 31. Demo: Using ACLs to Restrict SSH Access 32. Summary Our members see more. Join us! ------------- Our members see more. Join us!