Course Overview
Access control lists (ACLs) provide a means to filter packets by allowing a user to permit or deny IP packets from crossing specified interfaces. Access lists filter network traffic by controlling whether packets are forwarded or blocked at the router’s interfaces based on the criteria you specified within the access list. To use ACLs, the system administrator must first configure ACLs and then apply them to specific interfaces. There are 3 popular types of ACL: Standard, Extended and Named ACLs.
This comprehensive course is all about Access control list configuration. Through this course we are going to learn about what ACL is and its information, how the ACL is processed and we will understand this using an example. Further we would understand the configuration of ACL and why it is done. The next would be how to edit the ACL and its instructions, standard ACL theory, wildcard mask information. Going further we will have a look at the extended ACL and controlling Telnet and Placing ACL along with the practical’s using Packet tracer.
This course is for individuals who desire to develop a solid understanding of all aspects of IP technology. It will be beneficial for network managers, technicians, designers and consultants who are involved in supporting, managing, designing or implementing IP networks. A general understanding of data communication principles is recommended. At the end of the course the individuals will learn about Access Control List (ACL) configuration, editing of ACL and its instruction, Standard ACL Theory and telnet access controlling.
Target Customers (Who should go for this training):
• Network administrators/engineers/managers/designers
• Project managers
• Individuals seeking the CCENT or CCNA certifications
Pre-Requisites (Any requirements before undertaking the training):
• Basic Computer Knowledge
• Passion to learn
• Computer networking basic concept
• Any server knowledge
Course Objective:
• To learn about Access Control List (ACL) configuration
• To learn the editing of ACL and its instruction
• To learn Standard ACL Theory
• To understand telnet access controlling