filmov
tv
MicroNugget: What is iACL?

Показать описание
In this video, Keith Barker covers infrastructure ACL and how it can help defend against bogus traffic before it enters your network. He’ll explain what an iACL is, what it’s used for, and how it can help you create a more secure network. You’ll also learn about some of the crucial elements of an iACL and how they work.
One of the challenges you’ll face as an IT pro is the likelihood of some random, unwelcome packets from the internet trying to make their way onto your network via the router.
One mechanism that you can use to reduce your exposure to bogus traffic is something called an Infrastructure Access Control List, or iACL. Keith will talk about several of the key elements that might comprise an iACL, such as using anti-spoofing entries, denying special-use address sources, and filtering RFC 1918 space as a source.
He’ll also discuss some of the driving reasons behind creating an iACL that go beyond merely reducing unwanted traffic.
Start learning with CBT Nuggets:
MicroNugget: What is iACL?
MicroNugget: What is the Global ACL Feature on the ASA Firewall?
MicroNugget: How to Configure Extended ACLs on Cisco Routers
MicroNugget: How to Configure Standard ACLs on Cisco Routers
MicroNugget: What is Context-Based Access Control (CBAC) with IPv6?
MicroNugget: What are IPv4 Wildcard Masks?
MicroNugget: Protected Ports
MicroNugget: What is ASA Active/Standby Failover?
MicroNugget: How to Use the ASA Interface Setup for Different Security Levels
MicroNugget: What are the Different Types & Functions of Security Controls?
MicroNugget: What is Netflow?
MicroNugget: What are Dynamic Access Policies (DAP)?
MicroNugget: What is DHCP Starvation Attack?
MicroNugget: What is a Cut-Through Proxy on the ASA?
MicroNugget: What is Dynamic Access Control (DaC)?
MicroNugget: DHCP Starvation Attack
MicroNugget: ASA Firewall Packet Capture
MicroNugget: What is Clientless SSL VPN Plugins on the ASA
MicroNugget: How to Use ASA Firewall Packet Capture
MicroNugget: How Will IT Soft Skills Improve Your Career
MicroNugget: What is the ASA Virtual Firewall?
MicroNugget: What is a CAM Table Overflow Attack?
MicroNugget: How to Map a Connection Profile on the ASA from a Certificate
MicroNugget: What is Active/Active Failover on the ASA?
Комментарии