Networking

Standard Access Lists

Posted on

In these standard access list activities we walk through how firewalls evaluate traffic and the 5 tuples used to permit or deny traffic. We then walk through an example activity using packet tracer. Second activity using Standard Access Lists. This walks through evaluating our firewall requirements, viewing the flow of data, and identifying the rules […]