This article is a part of a video series on Access Control Lists (ACLs).
This is the first video in an eight-part video series which discusses the concepts and configuration for Access Control Lists, or ACLs.
In this video we answer the core question: What are Access Control Lists? We discuss the idea of simply identifying traffic with an ACL, and provide examples of the many different ways of applying ACLs.
Then, we unpack and illustrate the ideas of applying an ACL once per interface, per direction, and per protocol.
The specific time stamps for what is taught in this video are below: