Section 6. Managing Traffic Using Access Lists

Access lists can be used to protect specific networks from certain users or other networks. You can even use them to block web traffic or any other type of TCP/IP traffic.

Access lists are used for many reasons. Cisco security devices, such as firewalls and Virtual Private Network (VPN) concentrators, use access lists to define access to the network. For example, Cisco firewalls use access lists to define rules to specify traffic and ports that are allowed through the firewall. Access lists define the traffic that a firewall or VPN concentrator will encrypt. Cisco routers also use access lists for quality of service (QoS), route filters, and Network Address Translation. In short, as a network administrator, ...

Get Cisco CCENT ICND1 100-101 Flash Cards and Exam Practice Pack now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.