This article is a part of a video series on Access Control Lists (ACLs).
Part 2 of the video series on Access Control List picks apart the syntax for configuring Numbered ACL.
We’ll step through each field in the command of a Numbered ACL and explain the ins and outs of what they mean and how they work.
Specifically, we’ll cover these items:
- 0:00 – Start / Review of Part 1
- 0:42 – Two sets of Syntax (Named vs Numbered)
- 1:05 – Syntax for Numbered ACL (Standard and Extended)
- 1:26 – Command: access-list
- 1:37 – ID Number
- 3:28 – Action
- 4:42 – Protocol
- 5:37 – Source and/or Destination
- 5:57 – Specifying IP Address
- 6:39 – Specifying Ports
- 8:11 – Summary and Outro
Enjoy!