Access list

Unanswered Question
spremkumar Wed, 02/07/2007 - 03:50

Hi Mahesh

You configure access-lists to block either outbound or inbound traffic.

In addition to that you can make use of ACLs for other purposes as well.

Below listed are the different types of ACL available.

Standard ACLs

Extended ACLs

Lock and Key (Dynamic ACLs)

IP Named ACLs

Reflexive ACLs

Time-Based ACLs Using Time Ranges

Commented IP ACL Entries

Context-Based Access Control

Authentication Proxy

Turbo ACLs

Distributed Time-Based ACLs

Receive ACLs

Infrastructure Protection ACLs

Transit ACLs

You can refer the below link for more info on the same..



This Discussion