##### ###### ##### ### # # ### # # ###### ## ## ## ## ## ## ## # # # # # ## ##### #### ##### # # # # # # # #### ## # ## ## ## ## # # # # # ## ## # ###### ## ### # ### # ######
##### ###### ##### ### # # ### # # ###### ## ## ## ## ## ## ## # # # # # ## ##### #### ##### # # # # # # # #### ## # ## ## ## ## # # # # # ## ## # ###### ## ### # ### # ######
##### ###### ##### ### # # ### # # ###### ## ## ## ## ## ## ## # # # # # ## ##### #### ##### # # # # # # # #### ## # ## ## ## ## # # # # # ## ## # ###### ## ### # ### # ######
Traffic filtering and security
Section overview
Defining access control lists
Why filter traffic
Source IP filtering only
Multi-field filtering
Building complex rules
Top-down evaluation
The hidden rule
The inverse mask concept
Converting masks
ACL identification methods
Test your understanding
Filtering incoming traffic
Filtering exiting traffic
Where to apply rules
Network security device
Comparing security tools
Packet-by-packet filtering
Connection-aware filtering
How state tracking works
Test your understanding
Segmenting security
Trusted network area
Untrusted network area
Public-facing segment
Defining zone rules
Advanced security features
Layer 7 inspection
Content examination
Monitoring for attacks
Active threat blocking
Comparing detection options
Test your understanding
Writing effective policies
Errors to avoid
Summary of concepts