Understanding Cybersecurity: Configuring Access Controls Lists on Cisco Devices
ฝัง
- เผยแพร่เมื่อ 21 เม.ย. 2021
- In this video Travis configures an access control list and demonstrates how to block specific protocols using Cisco's IOS. He uses Cisco's Modeling Lab (CML/VIRL2) to set-up a network and confirm that ICMP and SSH are working. He then creates an ACL with Access Control entries to deny ICMP and SSH and verifies that each protocol is denied.
► Stay in touch!
Follow: / travisiq
Website: intelligencequ...
Instagram: / travis_iq
Linkedin: / traviswentworthiq - บันเทิง
Hi there.
Greetings from Algeria
Welcome back!
@@intelligencequest Thank you