July 2013
Intermediate to advanced
496 pages
6h 10m
English
Access lists can be used to protect specific networks from certain users or other networks. You can even use them to block web traffic or any other type of TCP/IP traffic.
Access lists are used for many reasons. Cisco security devices, such as firewalls and Virtual Private Network (VPN) concentrators, use access lists to define access to the network. For example, Cisco firewalls use access lists to define rules to specify traffic and ports that are allowed through the firewall. Access lists define the traffic that a firewall or VPN concentrator will encrypt. Cisco routers also use access lists for quality of service (QoS), route filters, and Network Address Translation. In short, as a network administrator, ...