O'Reilly logo

Cisco® Networking All-in-One For Dummies® by Edward Tetz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3: Securing Networks with ACLs and NAT

In This Chapter

check.png Working with Access Control Lists (ACLs) to restrict traffic flow

check.png Creating ACLs

check.png Detecting viruses with ACLs

check.png Configuring NAT

I could cover Access Control Lists (ACLs) along with switches, routers, or firewalls because most Cisco products use ACLs in one manner or another. As such, I cover them all in one place. Although the syntax may vary slightly from platform to platform, the principles and application of ACLs remain fairly consistent.

ACLs are actually required as part of implementing Network Address Translation (NAT) on your network, so I discuss both ACLs and NAT within this chapter. Additionally, I show you how easy it is to restrict traffic with just a few key strokes (and therefore, how easy it is to mess up traffic flow on your network with just a few key strokes).

Securing Networks with ACLs

ACL stands for Access Control List. An ACL has a list of entries, which are called Access Control Entries (ACEs). The entries that make up the list affects the access that one network device has to another network device. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required