O'Reilly logo

CCIE Practical Studies: Security (CCIE Self-Study) by Raymond Morrow, Andrew G. Mason, Dmitry Bokotey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Defining ACLs

Although you can create an ACL for many types of protocols that you might want to filter, you are only going to concentrate on IP ACLs in this chapter. For a complete explanation of ACLs that are used by other protocols, refer to either the Cisco IOS Security Configuration Guide for your appropriate IOS level or Configuring Network Security with ACLs for your appropriate 3550 software release.

Your first consideration when creating an ACL is to decide whether the ACL is to be applied to inbound traffic or outbound traffic. The direction is referenced as to whether the packet is entering or exiting an interface.

When creating your ACL, you are defining logically ordered ACEs that comprise the ACL. The ACEs are what your device uses ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required