SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Packet Tracer - Configuring Extended ACLs - Scenario 1
Topology
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
R1
G0/0 172.22.34.65 255.255.255.224 N/A
G0/1 172.22.34.97 255.255.255.240 N/A
G0/2 172.22.34.1 255.255.255.192 N/A
Server NIC 172.22.34.62 255.255.255.192 172.22.34.1
PC1 NIC 172.22.34.66 255.255.255.224 172.22.34.65
PC2 NIC 172.22.34.98 255.255.255.240 172.22.34.97
Objectives
Part 1: Configure, Apply and Verify an Extended Numbered ACL
Part 2: Configure, Apply and Verify an Extended Named ACL
Background / Scenario
Two employees need access to services provided by the server. PC1 needs only FTP access while PC2
needs only web access. Both computers are able to ping the server, but not each other.
Part 1: Configure, Apply and Verify an Extended Numbered ACL
Step 1: Configure an ACL to permit FTP and ICMP.
a. From global configuration mode on R1, enter the following command to determine the first valid number
for an extended access list.
R1(config)# access-list ?
<1-99> IP standard access list
Packet Tracer - Configuring Extended ACLs - Scenario 1
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
<100-199> IP extended access list
b. Add 100 to the command, followed by a question mark.
R1(config)# access-list 100 ?
deny Specify packets to reject
permit Specify packets to forward
remark Access list entry comment
c. To permit FTP traffic, enter permit, followed by a question mark.
R1(config)# access-list 100 permit ?
ahp Authentication Header Protocol
eigrp Cisco's EIGRP routing protocol
esp Encapsulation Security Payload
gre Cisco's GRE tunneling
icmp Internet Control Message Protocol
ip Any Internet Protocol
ospf OSPF routing protocol
tcp Transmission Control Protocol
udp User Datagram Protocol
d. This ACL permits FTP and ICMP. ICMP is listed above, but FTP is not, because FTP uses TCP.
Therefore,enter tcp to further refine the ACL help.
R1(config)# access-list 100 permit tcp ?
A.B.C.D Source address
any Any source host
host A single source host
e. Notice that we could filter just for PC1 by using the host keyword or we could allow any host. In this case,
any device is allowed that has an address belonging to the 172.22.34.64/27 network. Enter the network
address, followed by a question mark.
R1(config)# access-list 100 permit tcp 172.22.34.64 ?
A.B.C.D Source wildcard bits
f. Calculate the wildcard mask determining the binary opposite of a subnet mask.
11111111.11111111.11111111.11100000 = 255.255.255.224
00000000.00000000.00000000.00011111 = 0.0.0.31
g. Enter the wildcard mask, followed by a question mark.
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 ?
A.B.C.D Destination address
any Any destination host
eq Match only packets on a given port number
gt Match only packets with a greater port number
host A single destination host
lt Match only packets with a lower port number
neq Match only packets not on a given port number
range Match only packets in the range of port numbers
h. Configure the destination address. In this scenario, we are filtering traffic for a single destination, which is
the server. Enter the host keyword followed by the server’s IP address.
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host
172.22.34.62 ?
Packet Tracer - Configuring Extended ACLs - Scenario 1
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
dscp Match packets with given dscp value
eq Match only packets on a given port number
established established
gt Match only packets with a greater port number
lt Match only packets with a lower port number
neq Match only packets not on a given port number
precedence Match packets with given precedence value
range Match only packets in the range of port numbers
<cr>
i. Notice that one of the options is <cr> (carriage return). In other words, you can press Enter and the
statement would permit all TCP traffic. However, we are only permitting FTP traffic; therefore, enter the
eq keyword, followed by a question mark to display the available options. Then, enter ftp and press
Enter.
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host
172.22.34.62 eq ?
<0-65535> Port number
ftp File Transfer Protocol (21)
pop3 Post Office Protocol v3 (110)
smtp Simple Mail Transport Protocol (25)
telnet Telnet (23)
www World Wide Web (HTTP, 80)
R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host
172.22.34.62 eq ftp
j. Create a second access list statement to permit ICMP (ping, etc.) traffic from PC1 to Server. Note that
the access list number remains the same and no particular type of ICMP traffic needs to be specified.
R1(config)# access-list 100 permit icmp 172.22.34.64 0.0.0.31 host
172.22.34.62
k. All other traffic is denied, by default.
Step 2: Apply the ACL on the correct interface to filter traffic.
From R1’s perspective, the traffic that ACL 100 applies to is inbound from the network connected to Gigabit
Ethernet 0/0 interface. Enter interface configuration mode and apply the ACL.
R1(config)# interface gigabitEthernet 0/0
R1(config-if)# ip access-group 100 in
Step 3: Verify the ACL implementation.
a. Ping from PC1 to Server. If the pings are unsuccessful, verify the IP addresses before continuing.
b. FTP from PC1 to Server. The username and password are both cisco.
PC> ftp 172.22.34.62
c. Exit the FTP service of the Server.
ftp> quit
d. Ping from PC1 to PC2. The destination host should be unreachable, because the traffic was not explicitly
permitted.
Packet Tracer - Configuring Extended ACLs - Scenario 1
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Part 2: Configure, Apply and Verify an Extended Named ACL
Step 1: Configure an ACL to permit HTTP access and ICMP.
a. Named ACLs start with the ip keyword. From global configuration mode of R1, enter the following
command, followed by a question mark.
R1(config)# ip access-list ?
extended Extended Access List
standard Standard Access List
b. You can configure named standard and extended ACLs. This access list filters both source and
destination IP addresses; therefore, it must be extended. Enter HTTP_ONLY as the name. (For Packet
Tracer scoring, the name is case-sensitive.)
R1(config)# ip access-list extended HTTP_ONLY
c. The prompt changes. You are now in extended named ACL configuration mode. All devices on the PC2
LAN need TCP access. Enter the network address, followed by a question mark.
R1(config-ext-nacl)# permit tcp 172.22.34.96 ?
A.B.C.D Source wildcard bits
d. An alternative way to calculate a wildcard is to subtract the subnet mask from 255.255.255.255.
255.255.255.255
- 255.255.255.240
-----------------
= 0. 0. 0. 15
R1(config-ext-nacl)# permit tcp 172.22.34.96 0.0.0.15 ?
e. Finish the statement by specifying the server address as you did in Part 1 and filtering www traffic.
R1(config-ext-nacl)# permit tcp 172.22.34.96 0.0.0.15 host 172.22.34.62 eq
www
f. Create a second access list statement to permit ICMP (ping, etc.) traffic from PC2 to Server. Note: The
prompt remains the same and a specific type of ICMP traffic does not need to be specified.
R1(config-ext-nacl)# permit icmp 172.22.34.96 0.0.0.15 host 172.22.34.62
g. All other traffic is denied, by default. Exit out of extended named ACL configuration mode.
Step 2: Apply the ACL on the correct interface to filter traffic.
From R1’s perspective, the traffic that access list HTTP_ONLY applies to is inbound from the network
connected to Gigabit Ethernet 0/1 interface. Enter the interface configuration mode and apply the ACL.
R1(config)# interface gigabitEthernet 0/1
R1(config-if)# ip access-group HTTP_ONLY in
Step 3: Verify the ACL implementation.
a. Ping from PC2 to Server. The ping should be successful, if the ping is unsuccessful, verify the IP
addresses before continuing.
b. FTP from PC2 to Server. The connection should fail.
c. Open the web browser on PC2 and enter the IP address of Server as the URL. The connection should be
successful.

Mais conteúdo relacionado

Mais procurados

CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
 
IOS Zone based Firewall
IOS Zone based FirewallIOS Zone based Firewall
IOS Zone based FirewallNetwax Lab
 
Access control list 2
Access control list 2Access control list 2
Access control list 2Kishore Kumar
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basicsMahmmoud Mahdi
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideIT Tech
 
Basic ip traffic management with access control lists
Basic ip traffic management with access control listsBasic ip traffic management with access control lists
Basic ip traffic management with access control listsSourabh Badve
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorialIT Tech
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnettingShashank Asthana
 
Optical Fiber Cables :- An Introduction
Optical Fiber Cables :- An Introduction Optical Fiber Cables :- An Introduction
Optical Fiber Cables :- An Introduction Pradeep Singh
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1AIRTEL
 
Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN RoutingNetwax Lab
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport LayerSachii Dosti
 

Mais procurados (20)

CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
IOS Zone based Firewall
IOS Zone based FirewallIOS Zone based Firewall
IOS Zone based Firewall
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
Access control list 2
Access control list 2Access control list 2
Access control list 2
 
Lesson 2: Subnetting basics
Lesson 2: Subnetting basicsLesson 2: Subnetting basics
Lesson 2: Subnetting basics
 
Subnet Mask
Subnet MaskSubnet Mask
Subnet Mask
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Chapter 10 - DHCP
Chapter 10 - DHCPChapter 10 - DHCP
Chapter 10 - DHCP
 
IP Address
IP AddressIP Address
IP Address
 
How to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guideHow to configure vlan, stp, dtp step by step guide
How to configure vlan, stp, dtp step by step guide
 
Basic ip traffic management with access control lists
Basic ip traffic management with access control listsBasic ip traffic management with access control lists
Basic ip traffic management with access control lists
 
Cisco router configuration tutorial
Cisco router configuration tutorialCisco router configuration tutorial
Cisco router configuration tutorial
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
IPv4 addressing and subnetting
IPv4 addressing and subnettingIPv4 addressing and subnetting
IPv4 addressing and subnetting
 
Optical Fiber Cables :- An Introduction
Optical Fiber Cables :- An Introduction Optical Fiber Cables :- An Introduction
Optical Fiber Cables :- An Introduction
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 
Inter VLAN Routing
Inter VLAN RoutingInter VLAN Routing
Inter VLAN Routing
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centre
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
 

Semelhante a 4.1.1.10 packet tracer configuring extended ac ls scenario 1

26.2.1 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - ITExamAnsw...
26.2.1 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - ITExamAnsw...26.2.1 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - ITExamAnsw...
26.2.1 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - ITExamAnsw...rediani
 
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructorSalem Trabelsi
 
cisco-ewan-nat-acl-pt-practice-sba-with-solution-110516171316-phpapp02.pdf
cisco-ewan-nat-acl-pt-practice-sba-with-solution-110516171316-phpapp02.pdfcisco-ewan-nat-acl-pt-practice-sba-with-solution-110516171316-phpapp02.pdf
cisco-ewan-nat-acl-pt-practice-sba-with-solution-110516171316-phpapp02.pdfAsgarAlam6
 
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docxCCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docxketurahhazelhurst
 
managing your network environment
managing your network environmentmanaging your network environment
managing your network environmentscooby_doo
 
05 module managing your network enviornment
05  module managing your network enviornment05  module managing your network enviornment
05 module managing your network enviornmentAsif
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
Practice exam #2
Practice exam #2Practice exam #2
Practice exam #2Kris Mofu
 
Ccna 2 Final V4 1
Ccna 2 Final V4 1Ccna 2 Final V4 1
Ccna 2 Final V4 1stigerj
 
Networking Tutorial Goes to Basic PPP Configuration
Networking Tutorial Goes to Basic PPP ConfigurationNetworking Tutorial Goes to Basic PPP Configuration
Networking Tutorial Goes to Basic PPP Configuration3Anetwork com
 
Cisco discovery drs ent module 8 - v.4 in english.
Cisco discovery   drs ent module 8 - v.4 in english.Cisco discovery   drs ent module 8 - v.4 in english.
Cisco discovery drs ent module 8 - v.4 in english.igede tirtanata
 
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
Lab8  Controlling traffic using Extended ACL Objectives Per.pdfLab8  Controlling traffic using Extended ACL Objectives Per.pdf
Lab8 Controlling traffic using Extended ACL Objectives Per.pdfadityacommunication1
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examĐồng Quốc Vương
 

Semelhante a 4.1.1.10 packet tracer configuring extended ac ls scenario 1 (20)

26.2.1 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - ITExamAnsw...
26.2.1 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - ITExamAnsw...26.2.1 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - ITExamAnsw...
26.2.1 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 1 - ITExamAnsw...
 
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor4.4.1.2 packet tracer   configure ip ac ls to mitigate attacks-instructor
4.4.1.2 packet tracer configure ip ac ls to mitigate attacks-instructor
 
BACIK CISCO SKILLS
BACIK CISCO SKILLSBACIK CISCO SKILLS
BACIK CISCO SKILLS
 
cisco-ewan-nat-acl-pt-practice-sba-with-solution-110516171316-phpapp02.pdf
cisco-ewan-nat-acl-pt-practice-sba-with-solution-110516171316-phpapp02.pdfcisco-ewan-nat-acl-pt-practice-sba-with-solution-110516171316-phpapp02.pdf
cisco-ewan-nat-acl-pt-practice-sba-with-solution-110516171316-phpapp02.pdf
 
IPAddressing .pptx
IPAddressing .pptxIPAddressing .pptx
IPAddressing .pptx
 
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docxCCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
CCNA Connecting NetworksSA ExamLab 13 CCNA Connecting Netwo.docx
 
managing your network environment
managing your network environmentmanaging your network environment
managing your network environment
 
Ccna 4 chapter 2 2011 v4
Ccna 4 chapter 2 2011 v4Ccna 4 chapter 2 2011 v4
Ccna 4 chapter 2 2011 v4
 
ENSA_Module_10.pptx
ENSA_Module_10.pptxENSA_Module_10.pptx
ENSA_Module_10.pptx
 
05 module managing your network enviornment
05  module managing your network enviornment05  module managing your network enviornment
05 module managing your network enviornment
 
200-301-demo.pdf
200-301-demo.pdf200-301-demo.pdf
200-301-demo.pdf
 
Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
Cisco 200-301 Exam Dumps
Cisco 200-301 Exam DumpsCisco 200-301 Exam Dumps
Cisco 200-301 Exam Dumps
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Practice exam #2
Practice exam #2Practice exam #2
Practice exam #2
 
Ccna 2 Final V4 1
Ccna 2 Final V4 1Ccna 2 Final V4 1
Ccna 2 Final V4 1
 
Networking Tutorial Goes to Basic PPP Configuration
Networking Tutorial Goes to Basic PPP ConfigurationNetworking Tutorial Goes to Basic PPP Configuration
Networking Tutorial Goes to Basic PPP Configuration
 
Cisco discovery drs ent module 8 - v.4 in english.
Cisco discovery   drs ent module 8 - v.4 in english.Cisco discovery   drs ent module 8 - v.4 in english.
Cisco discovery drs ent module 8 - v.4 in english.
 
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
Lab8  Controlling traffic using Extended ACL Objectives Per.pdfLab8  Controlling traffic using Extended ACL Objectives Per.pdf
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
 
Ccnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_examCcnav5.org ccna 4-v50_practice_final_exam
Ccnav5.org ccna 4-v50_practice_final_exam
 

Último

Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...
Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...
Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...MOHANI PANDEY
 
WhatsApp Chat: 📞 8617697112 Call Girl Reasi is experienced
WhatsApp Chat: 📞 8617697112 Call Girl Reasi is experiencedWhatsApp Chat: 📞 8617697112 Call Girl Reasi is experienced
WhatsApp Chat: 📞 8617697112 Call Girl Reasi is experiencedNitya salvi
 
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabicontact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabihyt3577
 
VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Balanced Diet, Modified Diet, RDA and Menu Planning.pptx
Balanced Diet, Modified Diet, RDA and Menu Planning.pptxBalanced Diet, Modified Diet, RDA and Menu Planning.pptx
Balanced Diet, Modified Diet, RDA and Menu Planning.pptxDr. Trisha Manna
 
VIP Model Call Girls Ranjangaon ( Pune ) Call ON 8005736733 Starting From 5K ...
VIP Model Call Girls Ranjangaon ( Pune ) Call ON 8005736733 Starting From 5K ...VIP Model Call Girls Ranjangaon ( Pune ) Call ON 8005736733 Starting From 5K ...
VIP Model Call Girls Ranjangaon ( Pune ) Call ON 8005736733 Starting From 5K ...SUHANI PANDEY
 
VIP Model Call Girls Mundhwa ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Mundhwa ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Mundhwa ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Mundhwa ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...
best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...
best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...SUHANI PANDEY
 
VIP Model Call Girls Wakad ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Wakad ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Wakad ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Wakad ( Pune ) Call ON 8005736733 Starting From 5K to 25...SUHANI PANDEY
 
VVIP Pune Call Girls Sinhagad Road WhatSapp Number 8005736733 With Elite Staf...
VVIP Pune Call Girls Sinhagad Road WhatSapp Number 8005736733 With Elite Staf...VVIP Pune Call Girls Sinhagad Road WhatSapp Number 8005736733 With Elite Staf...
VVIP Pune Call Girls Sinhagad Road WhatSapp Number 8005736733 With Elite Staf...SUHANI PANDEY
 
JM road ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
JM road ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...JM road ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
JM road ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Budhwar Peth { Russian Call Girls Pune (Adult Only) 8005736733 Escort Servic...
Budhwar Peth { Russian Call Girls Pune  (Adult Only) 8005736733 Escort Servic...Budhwar Peth { Russian Call Girls Pune  (Adult Only) 8005736733 Escort Servic...
Budhwar Peth { Russian Call Girls Pune (Adult Only) 8005736733 Escort Servic...SUHANI PANDEY
 
Independent Call Girls Pune | ₹,9500 Pay Cash 8005736733 Free Home Delivery E...
Independent Call Girls Pune | ₹,9500 Pay Cash 8005736733 Free Home Delivery E...Independent Call Girls Pune | ₹,9500 Pay Cash 8005736733 Free Home Delivery E...
Independent Call Girls Pune | ₹,9500 Pay Cash 8005736733 Free Home Delivery E...SUHANI PANDEY
 
Top Call Girls Madhapur (7877925207) High Class sexy models available 24*7
Top Call Girls Madhapur (7877925207) High Class sexy models available 24*7Top Call Girls Madhapur (7877925207) High Class sexy models available 24*7
Top Call Girls Madhapur (7877925207) High Class sexy models available 24*7TANUJA PANDEY
 
VIP Model Call Girls Balaji Nagar ( Pune ) Call ON 8005736733 Starting From 5...
VIP Model Call Girls Balaji Nagar ( Pune ) Call ON 8005736733 Starting From 5...VIP Model Call Girls Balaji Nagar ( Pune ) Call ON 8005736733 Starting From 5...
VIP Model Call Girls Balaji Nagar ( Pune ) Call ON 8005736733 Starting From 5...SUHANI PANDEY
 
VIP Model Call Girls Alandi ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Alandi ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Alandi ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Alandi ( Pune ) Call ON 8005736733 Starting From 5K to 2...SUHANI PANDEY
 
VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...SUHANI PANDEY
 
VVIP Pune Call Girls Alandi Road WhatSapp Number 8005736733 With Elite Staff ...
VVIP Pune Call Girls Alandi Road WhatSapp Number 8005736733 With Elite Staff ...VVIP Pune Call Girls Alandi Road WhatSapp Number 8005736733 With Elite Staff ...
VVIP Pune Call Girls Alandi Road WhatSapp Number 8005736733 With Elite Staff ...SUHANI PANDEY
 

Último (20)

Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...
Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...
Get Premium Austin Town Call Girls (8005736733) 24x7 Rate 15999 with A/c Room...
 
WhatsApp Chat: 📞 8617697112 Call Girl Reasi is experienced
WhatsApp Chat: 📞 8617697112 Call Girl Reasi is experiencedWhatsApp Chat: 📞 8617697112 Call Girl Reasi is experienced
WhatsApp Chat: 📞 8617697112 Call Girl Reasi is experienced
 
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabicontact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
contact "+971)558539980" to buy abortion pills in Dubai, Abu Dhabi
 
VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Shivane ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Balanced Diet, Modified Diet, RDA and Menu Planning.pptx
Balanced Diet, Modified Diet, RDA and Menu Planning.pptxBalanced Diet, Modified Diet, RDA and Menu Planning.pptx
Balanced Diet, Modified Diet, RDA and Menu Planning.pptx
 
VIP Model Call Girls Ranjangaon ( Pune ) Call ON 8005736733 Starting From 5K ...
VIP Model Call Girls Ranjangaon ( Pune ) Call ON 8005736733 Starting From 5K ...VIP Model Call Girls Ranjangaon ( Pune ) Call ON 8005736733 Starting From 5K ...
VIP Model Call Girls Ranjangaon ( Pune ) Call ON 8005736733 Starting From 5K ...
 
VIP Model Call Girls Mundhwa ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Mundhwa ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Mundhwa ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Mundhwa ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...
best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...
best call girls in Pune | Whatsapp No 8005736733 VIP Escorts Service Availabl...
 
VIP Model Call Girls Wakad ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Wakad ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Wakad ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Wakad ( Pune ) Call ON 8005736733 Starting From 5K to 25...
 
VVIP Pune Call Girls Sinhagad Road WhatSapp Number 8005736733 With Elite Staf...
VVIP Pune Call Girls Sinhagad Road WhatSapp Number 8005736733 With Elite Staf...VVIP Pune Call Girls Sinhagad Road WhatSapp Number 8005736733 With Elite Staf...
VVIP Pune Call Girls Sinhagad Road WhatSapp Number 8005736733 With Elite Staf...
 
(ISHITA) Call Girls Service Navi Mumbai Call Now 8250077686 Navi Mumbai Escor...
(ISHITA) Call Girls Service Navi Mumbai Call Now 8250077686 Navi Mumbai Escor...(ISHITA) Call Girls Service Navi Mumbai Call Now 8250077686 Navi Mumbai Escor...
(ISHITA) Call Girls Service Navi Mumbai Call Now 8250077686 Navi Mumbai Escor...
 
JM road ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
JM road ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...JM road ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
JM road ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Budhwar Peth { Russian Call Girls Pune (Adult Only) 8005736733 Escort Servic...
Budhwar Peth { Russian Call Girls Pune  (Adult Only) 8005736733 Escort Servic...Budhwar Peth { Russian Call Girls Pune  (Adult Only) 8005736733 Escort Servic...
Budhwar Peth { Russian Call Girls Pune (Adult Only) 8005736733 Escort Servic...
 
Independent Call Girls Pune | ₹,9500 Pay Cash 8005736733 Free Home Delivery E...
Independent Call Girls Pune | ₹,9500 Pay Cash 8005736733 Free Home Delivery E...Independent Call Girls Pune | ₹,9500 Pay Cash 8005736733 Free Home Delivery E...
Independent Call Girls Pune | ₹,9500 Pay Cash 8005736733 Free Home Delivery E...
 
Top Call Girls Madhapur (7877925207) High Class sexy models available 24*7
Top Call Girls Madhapur (7877925207) High Class sexy models available 24*7Top Call Girls Madhapur (7877925207) High Class sexy models available 24*7
Top Call Girls Madhapur (7877925207) High Class sexy models available 24*7
 
VIP Model Call Girls Balaji Nagar ( Pune ) Call ON 8005736733 Starting From 5...
VIP Model Call Girls Balaji Nagar ( Pune ) Call ON 8005736733 Starting From 5...VIP Model Call Girls Balaji Nagar ( Pune ) Call ON 8005736733 Starting From 5...
VIP Model Call Girls Balaji Nagar ( Pune ) Call ON 8005736733 Starting From 5...
 
VIP Model Call Girls Alandi ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Alandi ( Pune ) Call ON 8005736733 Starting From 5K to 2...VIP Model Call Girls Alandi ( Pune ) Call ON 8005736733 Starting From 5K to 2...
VIP Model Call Girls Alandi ( Pune ) Call ON 8005736733 Starting From 5K to 2...
 
All Types👩Of Sex Call Girls In Mohali 9053900678 Romance Service Mohali Call ...
All Types👩Of Sex Call Girls In Mohali 9053900678 Romance Service Mohali Call ...All Types👩Of Sex Call Girls In Mohali 9053900678 Romance Service Mohali Call ...
All Types👩Of Sex Call Girls In Mohali 9053900678 Romance Service Mohali Call ...
 
VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Swargate ( Pune ) Call ON 8005736733 Starting From 5K to...
 
VVIP Pune Call Girls Alandi Road WhatSapp Number 8005736733 With Elite Staff ...
VVIP Pune Call Girls Alandi Road WhatSapp Number 8005736733 With Elite Staff ...VVIP Pune Call Girls Alandi Road WhatSapp Number 8005736733 With Elite Staff ...
VVIP Pune Call Girls Alandi Road WhatSapp Number 8005736733 With Elite Staff ...
 

4.1.1.10 packet tracer configuring extended ac ls scenario 1

  • 1. © 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4 Packet Tracer - Configuring Extended ACLs - Scenario 1 Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0 172.22.34.65 255.255.255.224 N/A G0/1 172.22.34.97 255.255.255.240 N/A G0/2 172.22.34.1 255.255.255.192 N/A Server NIC 172.22.34.62 255.255.255.192 172.22.34.1 PC1 NIC 172.22.34.66 255.255.255.224 172.22.34.65 PC2 NIC 172.22.34.98 255.255.255.240 172.22.34.97 Objectives Part 1: Configure, Apply and Verify an Extended Numbered ACL Part 2: Configure, Apply and Verify an Extended Named ACL Background / Scenario Two employees need access to services provided by the server. PC1 needs only FTP access while PC2 needs only web access. Both computers are able to ping the server, but not each other. Part 1: Configure, Apply and Verify an Extended Numbered ACL Step 1: Configure an ACL to permit FTP and ICMP. a. From global configuration mode on R1, enter the following command to determine the first valid number for an extended access list. R1(config)# access-list ? <1-99> IP standard access list
  • 2. Packet Tracer - Configuring Extended ACLs - Scenario 1 © 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4 <100-199> IP extended access list b. Add 100 to the command, followed by a question mark. R1(config)# access-list 100 ? deny Specify packets to reject permit Specify packets to forward remark Access list entry comment c. To permit FTP traffic, enter permit, followed by a question mark. R1(config)# access-list 100 permit ? ahp Authentication Header Protocol eigrp Cisco's EIGRP routing protocol esp Encapsulation Security Payload gre Cisco's GRE tunneling icmp Internet Control Message Protocol ip Any Internet Protocol ospf OSPF routing protocol tcp Transmission Control Protocol udp User Datagram Protocol d. This ACL permits FTP and ICMP. ICMP is listed above, but FTP is not, because FTP uses TCP. Therefore,enter tcp to further refine the ACL help. R1(config)# access-list 100 permit tcp ? A.B.C.D Source address any Any source host host A single source host e. Notice that we could filter just for PC1 by using the host keyword or we could allow any host. In this case, any device is allowed that has an address belonging to the 172.22.34.64/27 network. Enter the network address, followed by a question mark. R1(config)# access-list 100 permit tcp 172.22.34.64 ? A.B.C.D Source wildcard bits f. Calculate the wildcard mask determining the binary opposite of a subnet mask. 11111111.11111111.11111111.11100000 = 255.255.255.224 00000000.00000000.00000000.00011111 = 0.0.0.31 g. Enter the wildcard mask, followed by a question mark. R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 ? A.B.C.D Destination address any Any destination host eq Match only packets on a given port number gt Match only packets with a greater port number host A single destination host lt Match only packets with a lower port number neq Match only packets not on a given port number range Match only packets in the range of port numbers h. Configure the destination address. In this scenario, we are filtering traffic for a single destination, which is the server. Enter the host keyword followed by the server’s IP address. R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62 ?
  • 3. Packet Tracer - Configuring Extended ACLs - Scenario 1 © 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4 dscp Match packets with given dscp value eq Match only packets on a given port number established established gt Match only packets with a greater port number lt Match only packets with a lower port number neq Match only packets not on a given port number precedence Match packets with given precedence value range Match only packets in the range of port numbers <cr> i. Notice that one of the options is <cr> (carriage return). In other words, you can press Enter and the statement would permit all TCP traffic. However, we are only permitting FTP traffic; therefore, enter the eq keyword, followed by a question mark to display the available options. Then, enter ftp and press Enter. R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62 eq ? <0-65535> Port number ftp File Transfer Protocol (21) pop3 Post Office Protocol v3 (110) smtp Simple Mail Transport Protocol (25) telnet Telnet (23) www World Wide Web (HTTP, 80) R1(config)# access-list 100 permit tcp 172.22.34.64 0.0.0.31 host 172.22.34.62 eq ftp j. Create a second access list statement to permit ICMP (ping, etc.) traffic from PC1 to Server. Note that the access list number remains the same and no particular type of ICMP traffic needs to be specified. R1(config)# access-list 100 permit icmp 172.22.34.64 0.0.0.31 host 172.22.34.62 k. All other traffic is denied, by default. Step 2: Apply the ACL on the correct interface to filter traffic. From R1’s perspective, the traffic that ACL 100 applies to is inbound from the network connected to Gigabit Ethernet 0/0 interface. Enter interface configuration mode and apply the ACL. R1(config)# interface gigabitEthernet 0/0 R1(config-if)# ip access-group 100 in Step 3: Verify the ACL implementation. a. Ping from PC1 to Server. If the pings are unsuccessful, verify the IP addresses before continuing. b. FTP from PC1 to Server. The username and password are both cisco. PC> ftp 172.22.34.62 c. Exit the FTP service of the Server. ftp> quit d. Ping from PC1 to PC2. The destination host should be unreachable, because the traffic was not explicitly permitted.
  • 4. Packet Tracer - Configuring Extended ACLs - Scenario 1 © 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4 Part 2: Configure, Apply and Verify an Extended Named ACL Step 1: Configure an ACL to permit HTTP access and ICMP. a. Named ACLs start with the ip keyword. From global configuration mode of R1, enter the following command, followed by a question mark. R1(config)# ip access-list ? extended Extended Access List standard Standard Access List b. You can configure named standard and extended ACLs. This access list filters both source and destination IP addresses; therefore, it must be extended. Enter HTTP_ONLY as the name. (For Packet Tracer scoring, the name is case-sensitive.) R1(config)# ip access-list extended HTTP_ONLY c. The prompt changes. You are now in extended named ACL configuration mode. All devices on the PC2 LAN need TCP access. Enter the network address, followed by a question mark. R1(config-ext-nacl)# permit tcp 172.22.34.96 ? A.B.C.D Source wildcard bits d. An alternative way to calculate a wildcard is to subtract the subnet mask from 255.255.255.255. 255.255.255.255 - 255.255.255.240 ----------------- = 0. 0. 0. 15 R1(config-ext-nacl)# permit tcp 172.22.34.96 0.0.0.15 ? e. Finish the statement by specifying the server address as you did in Part 1 and filtering www traffic. R1(config-ext-nacl)# permit tcp 172.22.34.96 0.0.0.15 host 172.22.34.62 eq www f. Create a second access list statement to permit ICMP (ping, etc.) traffic from PC2 to Server. Note: The prompt remains the same and a specific type of ICMP traffic does not need to be specified. R1(config-ext-nacl)# permit icmp 172.22.34.96 0.0.0.15 host 172.22.34.62 g. All other traffic is denied, by default. Exit out of extended named ACL configuration mode. Step 2: Apply the ACL on the correct interface to filter traffic. From R1’s perspective, the traffic that access list HTTP_ONLY applies to is inbound from the network connected to Gigabit Ethernet 0/1 interface. Enter the interface configuration mode and apply the ACL. R1(config)# interface gigabitEthernet 0/1 R1(config-if)# ip access-group HTTP_ONLY in Step 3: Verify the ACL implementation. a. Ping from PC2 to Server. The ping should be successful, if the ping is unsuccessful, verify the IP addresses before continuing. b. FTP from PC2 to Server. The connection should fail. c. Open the web browser on PC2 and enter the IP address of Server as the URL. The connection should be successful.