From the course: Implementing Cisco Software-Defined Wan (SD-WAN) for your Enterprise and Cloud
Unlock this course with a free trial
Join today to access over 24,400 courses taught by industry experts.
Access control lists (ACLs) - Cisco Tutorial
From the course: Implementing Cisco Software-Defined Wan (SD-WAN) for your Enterprise and Cloud
Access control lists (ACLs)
- [Instructor] This lesson will be the start into getting into policies. We're going to start with localized policies first. And so, we're going to start with access control list, or ACLs. ACLs are commonly used for filtering packets as they flow in or out of a device. They're placed on a network interface. Now, in addition to that, we can also use them for other functions. We could use them for quality-of-service packet classification or marking. We could use them for policing within quality of service. We could actually use them to copy packets onto other devices or on the network. We could use it for counting traffic flows that match a specific access control entry, or you could also think of it as a sequence rule, depending upon which mentality you want to go with. We could also log the flows that match that access control entry. And then we're going to apply ACLs on the interface feature template. So, when we talk about building out an ACL, here is the process we're going to do…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Learning objectives1m 2s
-
(Locked)
Policy overview15m 59s
-
(Locked)
Access control lists (ACLs)23m 17s
-
(Locked)
Route policy26m 57s
-
(Locked)
Traffic data policy overview15m 26s
-
(Locked)
Traffic data policy configuration24m 46s
-
(Locked)
Application pinning with local TLOCs17m 58s
-
(Locked)
Application pinning with remote TLOCs14m 11s
-
(Locked)
VPN membership policy10m 22s
-
(Locked)
Topology policy (hub and spoke)17m 34s
-
(Locked)
Customized topology policy (hub and spoke)21m 47s
-
(Locked)
Dynamic on-demand tunnels17m 6s
-
(Locked)
Advanced topology policies (multi-region)30m 47s
-
(Locked)
Traffic engineering with topology policies18m 41s
-
(Locked)
Route leaking (shared services)23m 15s
-
(Locked)
Service chaining15m 29s
-
(Locked)
Application aware routing (AAR), part 130m 11s
-
(Locked)
Application aware routing (AAR), part 215m 50s
-
(Locked)
Policy review4m 44s
-
(Locked)
-
-
-
-
-
-
-
-