Section 6. Managing Traffic Using Access Lists
Access lists can be used to protect specific networks from certain users or other networks. You can even use them to block web traffic or any other type of TCP/IP traffic.
Access lists are used for many reasons. Cisco security devices, such as firewalls and Virtual Private Network (VPN) concentrators, use access lists to define access to the network. For example, Cisco firewalls use access lists to define rules to specify traffic and ports that are allowed through the firewall. Access lists define the traffic that a firewall or VPN concentrator will encrypt. Cisco routers also use access lists for quality of service (QoS), route filters, and Network Address Translation. In short, as a network administrator, ...
Get Cisco CCENT ICND1 100-101 Flash Cards and Exam Practice Pack now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.