CCNA CyberOps SECFND Objective 5.3 – 5.5
5.3 Describe these concepts as they relate to security monitoring Access Control List: ACLs are used to filter traffic based on source and/or destination. Logs created by ACLs can be useful to monitor for certain types of traffic. NAT/PAT: Network Address Translation and Port Address Translation hide internal addresses behind public IP addresses. For security […]