160 likes | 274 Vues
This PowerPoint presentation is designed to introduce the fundamentals of Access Control Lists (ACLs) within the CCNA version 3.0 curriculum. It aims to provide instructors with a flexible resource to adapt for teaching ACLs, including key topics such as their purpose, functionality, and verification methods. Objectives include explaining what ACLs are, how they work with various protocols, and different types of ACLs, including standard and extended. This presentation should not be used as a study guide for final assessments or the CCNA certification exam.
E N D
Purpose of This PowerPoint • This PowerPoint primarily consists of the Target Indicators (TIs) of this module in CCNA version 3.0. • It was created to give instructors a PowerPoint to take and modify as their own. • This PowerPoint is: • NOT a study guide for the module final assessment. • NOT a study guide for the CCNA certification exam. • Please report any mistakes you find in this PowerPoint by using the Academy Connection Help link.
To Locate Instructional Resource Materials on Academy Connection: • Go to the Community FTP Center to locate materials created by the instructor community • Go to the Tools section • Go to the Alpha Preview section • Go to the Community link under Resources • See the resources available on the Class home page for classes you are offering • Search http://www.cisco.com • Contact your parent academy!
Objectives Access control list fundamentals Access control lists (ACLs)
What are ACLs? • ACLs are lists of instructions you apply to a router's interface to tell the router what kinds of packets to accept and what kinds to deny.
Verifying ACLs • There are many show commands that will verify the content and placement of ACLs on the router. • show ip interface • show access-lists • Show running-config
Placing ACLs • Standard ACLs should be placed close to the destination. • Extended ACLs should be placed close to the source.
Firewalls A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders.