hands-on lab

Configuring Access Control Lists on Cisco Routers

Intermediate
Up to 3h
80
5/5
Get guided in a real environmentPractice with a step-by-step scenario in a real, provisioned environment.
Learn and validateUse validations to check your solutions every step of the way.
See resultsTrack your knowledge and monitor your progress.

Description

Standard ACLs allow a network security technician to control the traffic moving through their network and limit its propagation based on the kind of traffic and the source address.

Cisco devices use a proprietary Command Line Interface (CLI) called the Internetworking Operating System (IOS) to configure and manage them. They are also the most commonly occurring brand of networking appliance used throughout most organisations so knowing how to navigate the IOS CLI is a valuable skill.

You will be using a Cisco virtual network simulator called Cisco Packet Tracer. It is freely available on the web and is a great tool, not only for learning how to configure Cisco devices but also for learning networking and protocol functions.

This lab is part of a series on cyber network security.

Learning Objectives

Upon completion of this lab you will be able to:

  • Demonstrate to delegates how to configure and deploy Access Control Lists (ACLs) on Cisco routers using Packet Tracer as a virtual environment

Intended Audience

This lab is intended for:

  • Cyber and network security specialists

Prerequisites

You should possess:

  • A basic understanding of Windows operating system environments

About the author

Avatar
QA, opens in a new tab
Training Provider
Students
54,011
Labs
189
Courses
2,709
Learning paths
51

A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.

Covered topics

Lab steps

Starting the Cyber Network Security Lab Exercise