Chapter 4

ACL Concepts

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • How do ACLs filter traffic?

  • How do ACLs use wildcard masks?

  • How do you create ACLs?

  • What are the differences between standard and extended IPv4 ACLs?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

access control entry (ACE) page 164

inbound ACL page 167

outbound ACL page 167

implicit deny page 167

wildcard mask page 168

numbered ACL page 175

standard ACL page 175

extended ACL page 175

named ACL page 176

Introduction (4.0)

Say that you have arrived at your grandparents’ residence. It is a beautiful gated community with walking paths and gardens. For the safety of the ...

Get Enterprise Networking, Security, and Automation Companion Guide (CCNAv7) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.