ABSTRACT

In Chapter 15, you started exploring the concept of access lists. Access lists in all their forms are a key control for regulating access to your network. You learned strictly about standard and static extended access lists. Implicit in the discussion in the chapter were the following principles:

1. Access lists usually deny everything by default, that nothing specifically allowed is denied.