Securing the network, especially at the perimeter, is a critical part of network administration. Discover how to use Access Control Lists to permit or deny access to network resources.
CCENT: Access Control Lists Part 2