![]() ![]() Instead, you want to restrict traffic only between the ports. You don't want to stop all traffic between these two IP addresses. Imagine a computer (192.168.1.50 in the illustration) attempting unauthorized access of 192.168.2.50 via HTTP and HTTPS - and you want to stop that activity. In this example, you'll learn to use ACLs to block a specific source from accessing a targeted computer via specific ports. ![]() They either permit or deny traffic based on protocol, port number, source, destination, and time range. What is an extended access list?Įxtended Access Control Lists (ACLs) act as the gatekeeper of your network. Access lists can be configured for all routed network protocols such as IP. The Quick Definition: Access lists, also known as access control lists, are configured on routers and used to regulate traffic entering and exiting networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |