Preview

ACLs Notes

Good Essays
Open Document
Open Document
822 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ACLs Notes
******************************************************************
Example No 1  Permit Network  172.16.0.0
******************************************************************
Example No 2  Deny a Specific Host  172.16.4.13
******************************************************************
Example No 3  Deny a Specific Subnet  172.16.4.0
******************************************************************

Solution of Example No 1
Step1 Configuration of Standard Access List

We have to Permit Data of Network 172.16.0.0 to flow out from E0 and E1 Ethernet Interfaces of the router and enter into the both sides Network 172.16.4.0 and 172.16.3.0.

router> router>enable router# router#config terminal router(config)# router(config)#[access-list] [Number] [permit/deny] [source IP] [Wildcard Mask]

router(config)#access-list 1 permit 172.6.0.0 0.0.255.255 router(config)# router(config)#[access-list] [Number] [ permit] [ 0.0.0.0 255.255.255.255] or any

router(config)# router(config)#access-list 1 permit 0.0.0.0 255.255.255.255 router(config)# What is Implicit Deny All?

At the end of every Access List there is an Option of Implicit Deny which mean there is Condition of Deny for any Traffic coming from any Source. This is by default Feature of Cisco IOS.
So we have to permit this Option Manually for all Sources so that Remaining Traffic would not deny.

Step2 Apply the Standard Access List
We Know that Access List is Applied on the desired Interface of the router so we have of go Interface Config Mode of the Router Interface at which Access List is to be Applied.
As we have to permit the traffic to move out from the router so we apply Access List at Interface Ethernet 0 in the OUT direction and also at Ethernet 1 in OUT direction.
Apply on Ethernet Interface 0 in OUT direction

router(config)# router(config)#interface Ethernet 0 router(config-if)# router(config-if)#[IP access-group] [Number] [out/in]

router(config-if)#

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2640 Lab Outline

    • 672 Words
    • 4 Pages

    7. Basic Router Configuration and Command Line Interface Page 55 8. Switch and Router Security a. Setting Routing Passwords - Source documents located in Student CD > ICND-1-SB-Part1-SettingRouterPassword.pdf b. Setting Switch Passwords - Source documents located in Student CD > ICND-1-SB-Part1-SettingSwitchPassword.pdf c. Switch Security I - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityI.pdf d. Switch Security II - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityII.pdf e. Switch Security III - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityIII.pdf f. Switch Security IV - Source documents located in Student CD > ICND-1-SB-Part2-SwitchSecurityIV.pdf 9.…

    • 672 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    lab week 1

    • 419 Words
    • 3 Pages

    Copy and Paste the following screenshots from your Configuring Static and Default Routes lab below.…

    • 419 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    This network access control determines which IP packets are allowed entry to a network and which are dropped.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    NT1230 Chapter 7 Questions

    • 1164 Words
    • 5 Pages

    D. Routers discard old data-link headers and insert new data-link headers as part of their logic, which treats each interfaces lower-layer detailds as independent from each other…

    • 1164 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Comp230 Week 1 Lab Report

    • 941 Words
    • 4 Pages

    Subnet Mask . . . . . . . . . . . : 255.255.0.0…

    • 941 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Comp230 wk 1 ilab

    • 760 Words
    • 4 Pages

    Subnet Mask . . . . . . . . . . . : 255.255.0.0…

    • 760 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    5. What command would tell the system at which runlevels to start analyzed? Pg 430…

    • 1032 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Sec 572 Week 4 Ilab

    • 944 Words
    • 4 Pages

    * Run a Flow Analysis to update the topology. Open the Visual CLI on the ISP router and ping all of the Servers and Host PCs including the Attack PC Use the IP addresses indicated on the network topology page. Select the commands you entered in the Virtual CLI using the mouse and click on the Copy button. Use <Ctrl>V to paste the commands and output results into your Lab Document.…

    • 944 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    IT-241 Appendix G

    • 369 Words
    • 2 Pages

    Only allows access to a device if its MAC address matches that of a pre-approved list on the router.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The NETSTAT utility is a command available on most platforms that enables a user to list the sockets in use on a system. The information returned by the command is only for the local host, and there is no provision for monitoring remote hosts using this utility.…

    • 670 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    If a yellow bar drops down in your browser, click on it and select "Allow Blocked Content"…

    • 1190 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 3253 Words
    • 14 Pages

    By applying ipaddress, broadcast, subnet mask and default gateway. So when all settings applied then we get…

    • 3253 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    NETW410 Week 3 Lab Report

    • 532 Words
    • 2 Pages

    Yes, this network does require an access layer for the users to connect to the network. Devices in this layer are the lower end switches and wireless access points. The access points and low end switches within the access layer are highlighted in red in the network diagram below.…

    • 532 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Open flow

    • 1178 Words
    • 5 Pages

    Open flow is a new kind of protocol designed to run on Switches and routers. It’s built on a separated base between the forwarding plane and control plane joined through a secure channel. The controller, within the control plane, handles the management of the tables and traffic flow through updating, deleting and adding of flows while the forwarding plane handles traffic forwarding.…

    • 1178 Words
    • 5 Pages
    Better Essays

Related Topics