Access Lists Overview

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Access Lists Overview:

Access Lists Overview

  • Limit network traffic
  • Provide traffic flow control
  • Provide basic level of security
  • Decide which types of traffic to forward or block
  • Control which areas a client can access
  • Screen hosts to permit or deny them access

Standard Access Lists Overview

  • Checks source address
  • Permits or denies entire protocol suite
  1. Create the ACL

Standard ACL (1-99) – checks source IP address – checks who you are not where you are going

Example: access-list 12 permit…

View Topics

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?