Practical Networking .net

Applying ACLs to Interfaces

In Part 7 of the video series on Access Control Lists we finally apply access lists to an Interface. In Video 1 we discussed that an ACL is simply a tool used to identify traffic on a Cisco Router. We discussed that what an ACL does is a result of how you apply it. In […]


IPv6 Access Lists

In Part 6 of the video series on Access Lists we look at the syntax and configuration of IPv6 ACLs. This video picks up where we left off and is a direct follow up to the five videos before it. The core of this video simply shows you how IPv6 ACLs are just a little […]


Named ACL Configuration

Part 5 of the video series on Access Control Lists is a demonstration of the configuration of Named ACLs. We begin by re-configuring the Numbered ACL from Part 3 as a Named ACL in order to show you the similarities between the syntax of Named ACLs and Numbered ACLs. Then we step through and demonstration […]


Looking for Reviewers for my Practical TLS course

I am beginning the process of recording my Practical TLS course. It is one of the most requested classes from the Course Survey. The course is a deep dive on TLS and SSL, the protocols which secure the Internet. The course will take anyone with any amount of exposure to SSL/TLS and make them a […]


CCNA Training Videos from Jeremy’s IT Lab

I recently made a recommendation for a full CCNA training course. I’ve come across another resource that I would also recommend. Jeremy of has been putting together videos on Youtube covering the entire CCNA 200-301 curriculum. He hasn’t completed the entire video series yet, but he is regularly releasing new videos. This is a […]


Named ACL Syntax

Part 4 of the video series on Access Control Lists picks apart the syntax required to configure a Named Access List. In the video, we will continue where we left off in the prior videos by re-configuring the Numbered ACL as a Named ACL. You’ll see just how similar the syntax is between Numbered ACLs […]


Numbered ACL Configuration

In Part 3 of the series on ACLs, we go through a live demonstration of the configuration of various Numbered ACL statements. We’ll use the syntax we learned in the prior video to create access list entries to match specific packets. In doing so, we’ll get to talk through some important concepts — the implicit […]


Numbered ACL Syntax

Part 2 of the video series on Access Control List picks apart the syntax for configuring Numbered ACL. We’ll step through each field in the command of a Numbered ACL and explain the ins and outs of what they mean and how they work. Specifically, we’ll cover these items: 0:00 – Start / Review of […]