Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
27Activity
0 of .
Results for:
No results containing your search query
P. 1
Access Lists

Access Lists

Ratings:
(0)
|Views: 230|Likes:
Published by api-3832698

More info:

Published by: api-3832698 on Oct 18, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/31/2014

pdf

text

original

\u00a9 2003, cdaga tech. All rights reserved.
1
Access Lists
Objectives
\u00a9 2003, cdaga tech, Inc. All rights reserved.
Course acronym #-2
Upon completion of this chapter, you will be able
to perform the following tasks:
\u2022Identify the key functions and special processing of IP
access lists

\u2022Configure standard IP access lists
\u2022Control virtual terminal access with access class
\u2022Configure extended IP access lists
\u2022Verify and monitor IP access lists

Why Use Access Lists?
\u00a9 2003, cdaga tech, Inc. All rights reserved.
Course acronym #-3
FDDI
Token
Ring
\u2022Manage IP Traffic as network access grows

Activity (27)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
shamanth13 liked this
shamanth13 liked this
vikash_cse liked this
ave_hearts liked this
mutungwa liked this
mutungwa liked this
it_man liked this
rbrsekhar liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->