Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Access Control Lists Our next lesson which ties into layer 4 is Access Control List. We cover how ACLs impact the flow of traffic to and from routing devices and the process with which that takes place. You'll learn about Standard vs. Extended ACL types, why locally generated traffic is unaffected by Access Control Lists and why the source address plays a critical part in the function of an Access Control List. We'll discuss why and where you are able to determine if Protocol, destination wildcards and other network specific components will be granted access and why that delineation is important.