Practical Networking .net

Named ACL Configuration

Part 5 of the video series on Access Control Lists is a demonstration of the configuration of Named ACLs. We begin by re-configuring the Numbered ACL from Part 3 as a Named ACL in order to show you the similarities between the syntax of Named ACLs and Numbered ACLs. Then we step through and demonstration […]


Looking for Reviewers for my Practical TLS course

I am beginning the process of recording my Practical TLS course. It is one of the most requested classes from the Course Survey. The course is a deep dive on TLS and SSL, the protocols which secure the Internet. The course will take anyone with any amount of exposure to SSL/TLS and make them a […]


CCNA Training Videos from Jeremy’s IT Lab

I recently made a recommendation for a full CCNA training course. I’ve come across another resource that I would also recommend. Jeremy of has been putting together videos on Youtube covering the entire CCNA 200-301 curriculum. He hasn’t completed the entire video series yet, but he is regularly releasing new videos. This is a […]


Named ACL Syntax

Part 4 of the video series on Access Control Lists picks apart the syntax required to configure a Named Access List. In the video, we will continue where we left off in the prior videos by re-configuring the Numbered ACL as a Named ACL. You’ll see just how similar the syntax is between Numbered ACLs […]


Numbered ACL Configuration

In Part 3 of the series on ACLs, we go through a live demonstration of the configuration of various Numbered ACL statements. We’ll use the syntax we learned in the prior video to create access list entries to match specific packets. In doing so, we’ll get to talk through some important concepts — the implicit […]


Numbered ACL Syntax

Part 2 of the video series on Access Control List picks apart the syntax for configuring Numbered ACL. We’ll step through each field in the command of a Numbered ACL and explain the ins and outs of what they mean and how they work. Specifically, we’ll cover these items: 0:00 – Start / Review of […]


What are Access Control Lists?

This is the first video in an eight-part video series which discusses the concepts and configuration for Access Control Lists, or ACLs. In this video we answer the core question: What are Access Control Lists? We discuss the idea of simply identifying traffic with an ACL, and provide examples of the many different ways of […]


Discontiguous Wildcard Masks

If you’ve been doing Networking, then you are probably familiar with CIDR notation, and how it correlates to Subnet Masks and Wildcard Masks. Which means you know that a /26 correlates to a Subnet Mask of and a Wildcard Mask of But what is the purpose of a Wildcard Mask if you already […]