The document discusses access control lists (ACLs) including creating standard and extended ACLs, applying ACLs to interfaces, using named ACLs with sequence numbers, adding comments to ACL entries, and examples of restricting Telnet access.
The document discusses access control lists (ACLs) including creating standard and extended ACLs, applying ACLs to interfaces, using named ACLs with sequence numbers, adding comments to ACL entries, and examples of restricting Telnet access.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
The document discusses access control lists (ACLs) including creating standard and extended ACLs, applying ACLs to interfaces, using named ACLs with sequence numbers, adding comments to ACL entries, and examples of restricting Telnet access.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd