Access Control Lists - CompTIA Security+ SY0-401: 1.2

preview_player
Показать описание
- - - - -
Access control lists are used in almost every security device on your network. In this video, you’ll learn how ACLs are used to provide secure access to your important resources.
- - - - -

FOLLOW PROFESSOR MESSER:
Рекомендации по теме
Комментарии
Автор

If you are denying a single IP address on your ACL, why is the subnet mask 0.0.0.0 instead of 255.255.255.255?  Just curious.

CaesarInVa