ACL Principles and Configuration
| Institution | Jomo Kenyatta University of Science and Technology |
| Course | Bsc. Computer Scienc... |
| Year | 2nd Year |
| Semester | Unknown |
| Posted By | Chris |
| File Type | |
| Pages | 20 Pages |
| File Size | 972.72 KB |
| Views | 136 |
| Downloads | 0 |
| Price: |
Buy Now
|
Description
On completion of this course, you will be able to:
Describe the basic principles and functions of ACLs.
Understand the types and characteristics of ACLs.
Describe the basic composition of ACLs and ACL rule ID matching order.
Understand how to use wildcards in ACLs.
Complete the basic configurations of ACLs.
Below is the document preview.
12 ACL Principles and Configuration
Trending!
Rapid network development brings challenges to network security and quality of service(QoS). Access control lists (ACLs) are closely related to network security and QoS. By accurately identifying packet flows on a network and working with other technologies, ACLs can control network access behaviors, prevent network attacks, and improve network bandwidth utilization, thereby ensuring network environment security and QoS reliability. This course describes the basic principles and functions of ACLs, types and characteristics of ACLs, basic composition of ACLs, ACL rule ID matching order, usage of wildcards, and ACL configurations.
27 Pages
2181 Views
0 Downloads
993.55 KB