589689.xyz

Pluralsight - Building, Configuring, and Troubleshooting ACLs by Ross Bagurdes

  • 收录时间:2020-05-07 06:58:10
  • 文件大小:379MB
  • 下载次数:27
  • 最近下载:2021-01-21 20:07:46
  • 磁力链接:

文件列表

  1. 5. Check Your Knowledge- Using Wireshark and Telnet to Test ACLs/1. Demo- Using Wireshark to Help Build ACLs.mp4 45MB
  2. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/4. ACL Scenario- Multiple Permits and Deny Statements in an ACL.mp4 33MB
  3. 5. Check Your Knowledge- Using Wireshark and Telnet to Test ACLs/2. Demo- Using Telnet to Test Your ACLs.mp4 32MB
  4. 2. Standard ACLs/4. Demo- Testing That Your ACLs Work.mp4 30MB
  5. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/2. Demo- Implementing Logging ACLs.mp4 22MB
  6. 2. Standard ACLs/3. Demo- Implementing a Standard ACL on a Router.mp4 21MB
  7. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/1. Wildcard Mask Problems.mp4 17MB
  8. 3. Extended ACLs/5. Demo- Testing Your Extended ACLs.mp4 17MB
  9. 2. Standard ACLs/2. Implementing a Standard Access Control List.mp4 15MB
  10. 3. Extended ACLs/6. Demo- Fixing the Extended ACL to Allow SSH Access from Your Workstation.mp4 14MB
  11. 3. Extended ACLs/4. Demo- Implementing an Extended Access Control List on a Router.mp4 13MB
  12. 1. Introduction to ACLs/3. How Standard Access Control Lists Work.mp4 13MB
  13. 3. Extended ACLs/2. Building a Extended Access Control List Table.mp4 12MB
  14. 3. Extended ACLs/1. Extended Access Control Lists in Depth.mp4 12MB
  15. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/3. ACL Scenario- Denying a Single Host.mp4 12MB
  16. 1. Introduction to ACLs/1. Access Control Lists in the Human World.mp4 10MB
  17. 3. Extended ACLs/3. Extended Access Control List Syntax.mp4 10MB
  18. 5. Check Your Knowledge- Using Wireshark and Telnet to Test ACLs/3. Demo- Using ACLs to Restrict SSH Access.mp4 9MB
  19. 1. Introduction to ACLs/4. Applying Access Control Lists.mp4 8MB
  20. 2. Standard ACLs/1. Using the Wildcard Mask.mp4 6MB
  21. 1. Introduction to ACLs/2. Access Control List Selection Criteria.mp4 5MB
  22. building-configuring-troubleshooting-acls.zip 4MB
  23. 0. Course Overview/0. Course Overview.mp4 3MB
  24. 1. Introduction to ACLs/0. Introduction.mp4 3MB
  25. 5. Check Your Knowledge- Using Wireshark and Telnet to Test ACLs/4. Summary.mp4 2MB
  26. 5. Check Your Knowledge- Using Wireshark and Telnet to Test ACLs/0. Introduction.mp4 1MB
  27. 3. Extended ACLs/7. Summary.mp4 1MB
  28. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/0. Introduction.mp4 1MB
  29. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/5. Summary.mp4 1MB
  30. 1. Introduction to ACLs/5. Summary.mp4 1MB
  31. 2. Standard ACLs/0. Introduction.mp4 1MB
  32. 2. Standard ACLs/5. Summary.mp4 969KB
  33. 3. Extended ACLs/0. Introduction.mp4 968KB
  34. 5. Check Your Knowledge- Using Wireshark and Telnet to Test ACLs/1. Demo- Using Wireshark to Help Build ACLs.srt 21KB
  35. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/4. ACL Scenario- Multiple Permits and Deny Statements in an ACL.srt 21KB
  36. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/1. Wildcard Mask Problems.srt 18KB
  37. 5. Check Your Knowledge- Using Wireshark and Telnet to Test ACLs/2. Demo- Using Telnet to Test Your ACLs.srt 15KB
  38. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/2. Demo- Implementing Logging ACLs.srt 15KB
  39. 2. Standard ACLs/2. Implementing a Standard Access Control List.srt 15KB
  40. 1. Introduction to ACLs/3. How Standard Access Control Lists Work.srt 13KB
  41. 2. Standard ACLs/3. Demo- Implementing a Standard ACL on a Router.srt 12KB
  42. 3. Extended ACLs/1. Extended Access Control Lists in Depth.srt 12KB
  43. 2. Standard ACLs/4. Demo- Testing That Your ACLs Work.srt 12KB
  44. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/3. ACL Scenario- Denying a Single Host.srt 12KB
  45. 1. Introduction to ACLs/1. Access Control Lists in the Human World.srt 12KB
  46. 3. Extended ACLs/2. Building a Extended Access Control List Table.srt 10KB
  47. 3. Extended ACLs/3. Extended Access Control List Syntax.srt 9KB
  48. 3. Extended ACLs/5. Demo- Testing Your Extended ACLs.srt 8KB
  49. 1. Introduction to ACLs/4. Applying Access Control Lists.srt 7KB
  50. 1. Introduction to ACLs/2. Access Control List Selection Criteria.srt 7KB
  51. 3. Extended ACLs/4. Demo- Implementing an Extended Access Control List on a Router.srt 7KB
  52. 3. Extended ACLs/6. Demo- Fixing the Extended ACL to Allow SSH Access from Your Workstation.srt 7KB
  53. 2. Standard ACLs/1. Using the Wildcard Mask.srt 6KB
  54. 5. Check Your Knowledge- Using Wireshark and Telnet to Test ACLs/3. Demo- Using ACLs to Restrict SSH Access.srt 5KB
  55. 1. Introduction to ACLs/0. Introduction.srt 4KB
  56. 0. Course Overview/0. Course Overview.srt 3KB
  57. 5. Check Your Knowledge- Using Wireshark and Telnet to Test ACLs/4. Summary.srt 2KB
  58. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/5. Summary.srt 2KB
  59. 3. Extended ACLs/7. Summary.srt 2KB
  60. 5. Check Your Knowledge- Using Wireshark and Telnet to Test ACLs/0. Introduction.srt 2KB
  61. 1. Introduction to ACLs/5. Summary.srt 2KB
  62. content.txt 2KB
  63. 4. Check Your Knowledge- Wildcard Masks, Logging, and ACL Scenarios/0. Introduction.srt 2KB
  64. 2. Standard ACLs/0. Introduction.srt 2KB
  65. 2. Standard ACLs/5. Summary.srt 1KB
  66. 3. Extended ACLs/0. Introduction.srt 1KB