Chapter 15. Standard and Extended Access Lists
This chapter covers the following topics:
Standard access lists
Extended access lists
This chapter covers the difference between standard and extended access lists and their various uses. You will configure access lists according to the lab objectives stated in the chapter, verify their operation, and apply them to the router interfaces appropriately.
Network security using access list is a fundamental requirement that Cisco expects from CCNAs. Although you can use a variety of methods to write access lists, it is important that you understand the logic behind the access lists. This chapter briefly reviews the different access lists and the commands needed to configure and apply them in the appropriate ...