Chapter 11. Configuring ACLs for Threat Mitigation
This chapter covers the following topics:
• Mitigating Threats Using ACLs
• ACL Configuration Guidelines
• Filtering with Numbered Extended ACLs
• Configuring a Numbered Extended ACL Example
• Filtering with Named Extended ACLs
• Configuring a Named Extended ACL Example
• Configuring an Extended ACL Using CCP Example
Enhancing ACL Protection with Object Groups
• Using Object Groups in Extended ACLs
• Configuring Object Groups in ACLs Example
• Configuring Object Groups in ACLs Using CCP Example
Get CCNA Security (640-554) Portable Command Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.