I'M not sure.
access-list
IP addresses Telnet traffic Upper-layer IP protocols
Access-lists are used for limiting the traffic say mainly for security purpose. Using access-list you can deny or permit the traffic from source address based on standard access list or deny or permit the traffic by classification of source or destination ip address, or by protocols . these are written in sequential order. So order of statement is very important . We should be clear of what to permit or deny .. sample config Standard access-list Router(config)#access-list 5 <permit> or <deny> <source ip address> Extended access-list Router(config)#access-list 111 <permit> or <deny> <protocol> <source ip address> <destination ip address> After creating access-list it will not be useful without applying on the interface where the traffic runs along the path. these should be applied in inbound direction or outbound direction of the interface as per our requirement. Most importantly when u want make changes , copy to text editor or notepad , do changes on them and remove the access-list config in the router and copy them fresh from the notepad.
Extended IP Access List
The list of rules that a firewall uses to determine which traffic to block is called an "Access Control List" (ACL). An ACL defines the criteria for allowing or denying network traffic based on attributes such as IP addresses, port numbers, and protocols. Firewalls apply these rules to filter incoming and outgoing traffic, ensuring that only authorized communication is permitted while unauthorized access is blocked.
The simplest method of filtering traffic is using a basic access control list (ACL) on a router or firewall. This approach allows you to define rules that permit or deny traffic based on criteria such as IP addresses, protocols, or port numbers. By specifying what types of traffic are allowed or blocked, you can effectively manage and control the flow of data through your network. ACLs are straightforward to implement and can be customized to fit specific security needs.
ACL stands for Access Control List. ACLs are used in networking to control which types of traffic are allowed to pass through a network device, such as a router or firewall. They can be configured to permit or deny traffic based on criteria such as source IP address, destination IP address, protocol, and port number.
When creating a standard access control list (ACL), the two key pieces of information required are the source IP address and the action to be taken (permit or deny). The source IP address specifies which hosts are affected by the ACL rules, while the action determines whether traffic from those addresses is allowed or blocked. This combination allows for effective management of network traffic based on specific criteria.
To set up an access list in Cisco, you typically use the Command Line Interface (CLI). First, enter global configuration mode by typing configure terminal. Then, create an access list using the command access-list [number] [permit/deny] [source] [wildcard mask]. Finally, apply the access list to an interface with the command ip access-group [number] in|out, depending on whether you want to filter incoming or outgoing traffic.
An IP address that is not on a list. This is in the context of access lists, and there are two primary variants:Blacklist - block these IP addressesWhitelist - allow only these IP addressesUnlisted then means that the IP address is not in the list, which could mean either that it is blocked (if missing from a whitelist) or that it is allowed (if not on a blacklist).
BIG-IP is an Application Delivery Networking system. It provides such services as load balancing, web acceleration, access control, and traffic management.
show ip interface