access list and inverse mask
ok iam studying for my ccna and also taking ccna classes. We haven't got to the chapter on acl but i wanted to get a good jump on it. I read over the chapter and tech notes from this site, excuse my english but that confused the **** out of me. I wanted to know is there a easier way to understand acl? i pretty much know that is security purposes and you can block subnets, you can block different protocols used on those subnets. But when i started to read about the inverse mask i just went . Can anyone help me break it down or haha hell put it in lemans terms so i can grasp it better. thank you
I am going for broke, and i love every minute of it.