![]() The knowledge from this case study can be applied across devices from other vendors. Furthermore, to make this article as practical as possible, we will consider a case study where we configure ACLs on a Cisco IOS device. We will consider the structure of an ACL, how ACLs are processed, and also how to apply configured ACLs. In this article, we will be doing a deep-dive into ACLs as applicable to network access control. In the same way, we may want to control who/what has access to different parts of our network and one of the ways we do this is using Access Control Lists (ACLs). ![]() ![]() In a normal scenario, only people who have the keys to unlock your door should have access to your house. When you leave your house in the morning, you (probably) lock the doors behind you.
0 Comments
Leave a Reply. |