You are on page 1of 1

Access control lists

- Mimic a firewall
- Gives some control over restricting network traffic up to layer 4
Core: Main servers
Distribution: from A-B as fast as possible
Access: End user accessibility. This is where ACL’s are implemented
Commands
Permit any any: grant all access to everyone
Deny any any: denies all access to everyone
Typically, deny everything then permit what is necessary
ACL Testing and operation
Extended and basic ACL’s, works in a hierarchical structure
Write down each test that is done with access control
Tests such as show ip route, show ip etc
Configure ACL’s LAST AFTER TESTING THE NETWORK

You might also like