ក្រុមការងារយើងខ្ញុំនិងខិតខំសិក្សារស្រាវជ្រាវចំនេះដឹងបន្ថែមទៀតសំរាប់លោកអ្នក សូមអរគុណសំរាប់ការគាំទ្រ !

Named ACL Configuration

Named ACL Configuration
Overview
Standard and Extended ACL are better filter traffic in network, but they come with the same thing hardly to modify
statement. In Standard and Extended ACL, we cannot added or remove one or more statement of access lists.
Sometime, If we make a mistake by missing some statements and then we want to add new statement to exiting
access list, the new statement will be listed under the previous statements. As we mention in the previous lesson, ACL
filtering works from the top to bottom. So if specific statement lay under general statement, they will not match this new
statement. Solution for using both ACL, you should delete access list number. After you deleted one of access list
number, every statements under that access list will be deleted too. So you need to create new access list, and write
down you statement again. If that access list is 100 statements, how have you done it?
The best solution you should use named ACL. Every medium and enterprise businesses use named access list over
90% for security of their network infrastructure. named ACL let you to do the more powerful that you never met. named
ACL let you easy to modify every statements without delete access list. If you you want to add or remove one of
statement, you may use command line no 10 (remove) or 10 (add) under access list named. Learn4ccna recommend
you should pay attention for this section.
Topology
Click here to download topology of Named ACL configuration.pkt


EmoticonEmoticon