Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CCNA Routing and Switching 200-125 Certification Guide

You're reading from   CCNA Routing and Switching 200-125 Certification Guide The ultimate solution for passing the CCNA certification and boosting your networking career

Arrow left icon
Product type Paperback
Published in Oct 2018
Publisher Packt
ISBN-13 9781787127883
Length 504 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Lazaro (Laz) Diaz Lazaro (Laz) Diaz
Author Profile Icon Lazaro (Laz) Diaz
Lazaro (Laz) Diaz
Arrow right icon
View More author details
Toc

Table of Contents (24) Chapters Close

Preface 1. Internetworking Models FREE CHAPTER 2. Ethernet Networking and Data Encapsulations 3. Introducing the TCP/IP 4. Subnetting in IPv4 5. Variable Length Subnet Mask and Route Summarization 6. The IOS User Interface 7. Managing the Cisco Internetwork 8. Managing Cisco Devices 9. The IP Routing Process 10. The IPv6 Protocol 11. Introduction to IPv6 Routing 12. Switching Services and Configurations 13. VLANs and Inter-VLAN Routing 14. Introduction to the EIGRP Routing Protocol 15. The World of Open Shortest Path First (OSPF) 16. Border Gateway Protocol 17. Access-Control List 18. Network Address Translation 19. Wide Area Networks 20. Advanced Networking Topics 21. Mock Test Questions
22. Assessments
23. Other Books You May Enjoy

Access-Control List

Security is the most vital part of any network. We must make sure that our information is secure from the outside as well as from the inside. Not only do we have to worry about unauthorized personnel coming in through our WAN connections, we also must be concerned about the employees who are already present inside our network. There could be a potential threat to the company inside as well.

In this chapter, we will cover how to create an Access-Control List that will mitigate threats externally and internally. We will cover standard ACLs, Extended ACLs, Named ACLs, and Remarks. We will briefly cover some aspects of firewalls and their policies.

While going through this chapter, keep in mind that security is done in layers. You need to ask yourself, How vital is the information I am trying to secure, and, How determinedly are people trying to get in?

The following...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime