Chapter 28. IP Access Control List Security


This chapter provides information and commands concerning the following topics:

  • The numbers assigned to the different types of access control lists (ACLs)

  • The use of wildcard masks in ACLs

  • The any and host keywords used by ACLs

  • How to create, apply, verify, and remove standard IP ACLs

  • How to create, apply, verify, and remove extended IP ACLs

  • How to create named ACLs

  • How to restrict virtual terminal access




CCNA Self-Study(c) CCNA Portable Command Guide
CCNA Portable Command Guide
ISBN: 1587201585
EAN: 2147483647
Year: 2006
Pages: 261
Authors: Scott Empson

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net