Access Control Lists allow you to permit and deny traffic transmitted into or out of network interfaces, based on a range of criteria. Presented by Mark Cooksley. #PlainlyExplained
Network Security with Hirschmann Operating System consists of the following videos:
Part 1 – Introduction
Part 2 – Protecting Your Network Infrastructure - Communication
Part 3 – Protecting Your Network Infrastructure - Interaction
Part 4 – Enforcing Network Access Policy
Part 5 – Deploying Access Control Lists
Part 6 – Controlling Malicious Traffic
Part 7 – Logging Security Events
Part 8 – IEC 62443 – Independent Certification
Part 9 – Conclusion – Next Steps
Download this information in PDF format: [ Ссылка ]
Ещё видео!