1 / 17

CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)

CCNA 2 v3.1 Module 11 Access Control Lists (ACLs). Purpose of This PowerPoint. This PowerPoint primarily consists of the Target Indicators (TIs) of this module in CCNA version 3.1. It was created to give instructors a PowerPoint to take and modify as their own. This PowerPoint is:

osgood
Download Presentation

CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)

  2. Purpose of This PowerPoint • This PowerPoint primarily consists of the Target Indicators (TIs) of this module in CCNA version 3.1. • It was created to give instructors a PowerPoint to take and modify as their own. • This PowerPoint is: • NOT a study guide for the module final assessment. • NOT a study guide for the CCNA certification exam. • Please report any mistakes you find in this PowerPoint by using the Academy Connection Help link.

  3. To Locate Instructional Resource Materials on Academy Connection: • Go to the Community FTP Center to locate materials created by the instructor community • Go to the Tools section • Go to the Alpha Preview section • Go to the Community link under Resources • See the resources available on the Class home page for classes you are offering • Search http://www.cisco.com • Contact your parent academy!

  4. Objectives

  5. What are ACLs? • ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny.

  6. How ACLs Work

  7. Protocols with ACLs Specified by Numbers

  8. Creating ACLs

  9. The Function of a Wildcard Mask

  10. Verifying ACLs • There are many show commands that will verify the content and placement of ACLs on the router. • show ip interface • show access-lists • Show running-config

  11. Standard ACLs

  12. Extended ACLs

  13. Named ACLs

  14. Placing ACLs • Standard ACLs should be placed close to the destination. • Extended ACLs should be placed close to the source.

  15. Firewalls A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders.

  16. Restricting Virtual Terminal Access

  17. Summary

More Related