O'Reilly logo

Cisco CCENT ICND1 100-101 Flash Cards and Exam Practice Pack by Eric Rivard

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Section 6. Managing Traffic Using Access Lists

Access lists can be used to protect specific networks from certain users or other networks. You can even use them to block web traffic or any other type of TCP/IP traffic.

Access lists are used for many reasons. Cisco security devices, such as firewalls and Virtual Private Network (VPN) concentrators, use access lists to define access to the network. For example, Cisco firewalls use access lists to define rules to specify traffic and ports that are allowed through the firewall. Access lists define the traffic that a firewall or VPN concentrator will encrypt. Cisco routers also use access lists for quality of service (QoS), route filters, and Network Address Translation. In short, as a network administrator, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required