Type of access lists | The access-list command | The ip access-list command

This video explains the following topics.
Type of access lists
The access-list command
The ip access-list command
Router access-list command
Cisco router ip access-list command
access-list command's options
access-list command's arguments
ip access-list command's arguments
The standard access list
The extended access list
Difference between the numbered and named access lists
Difference between the access-list and ip access-list commands
This video is based on the following tutorials.
www.computernetworkingnotes.c...
www.computernetworkingnotes.c...
www.computernetworkingnotes.c...
www.computernetworkingnotes.c...
www.computernetworkingnotes.c...
Access list types
There are mainly two types of access control lists: standard access lists and extended access lists. These types can be further classified into two subtypes: numbered and named. A standard access list can be either a numbered standard list or a named standard access list. Similarly, you can have a numbered extended access list or a named extended list.
The ip access-list command v/s The access-list command
You can create an access list in two styles: classic style and modern style. The classic style does not support the editing feature. The modern style supports the editing feature. If you use the classic style to create an ACL, you will be able to append it, but you will not be able to modify it. If you use the modern style to create an access list, you will be able to append, edit, and modify it. The classic style uses the 'access-list' command. The modern style uses the 'ip access-list' command.
Standard v/s Extended Access lists
You can create a standard access list in two ways: by using a number or by using a name. If you use a number to create the standard access list, it is known as a numbered standard access list. If you use a name to create the standard access list, it is known as a named standard access list.
An extended access list is mainly used to filter two types of traffic. These types are host-level and application-level. Host-level traffic includes all traffic originating from a specific host. For example, if three applications are running on a host, the host-level traffic involves traffic from all three applications. Application-level traffic includes all traffic originating from a specific application running on a particular host.

Пікірлер