Sei sulla pagina 1di 9

Network Security

Access Control Lists

Why use Access Control Lists?

Manage IP traffic as network access grows.


Filter Packets as they pass through the router.
Zuhair H. Abaza @ GCCST-2015

What are Access Control?

Standard

Check Source Address.


Generally permit or denies entre protocol suite.

Extended

Check Source and destination Address.


Generally permit or denies specific protocol.
Zuhair H. Abaza @ GCCST-2015

Access List Command Overview

Step 1: Set parameters for this access list test


statement (with can be one of several
statements).

Step 2: Enable an interface to use specified access list.

IP access lists are numbered 1 99 or 100 - 199


Zuhair H. Abaza @ GCCST-2015

Standard IP List Example

Position : Interface of the Router.


Condition : Permit or Deny.
Direction : In or Out.

Zuhair H. Abaza @ GCCST-2015

Standard IP List Example

Permit my network only


Zuhair H. Abaza @ GCCST-2015

Network Diagram

Design the following Network

Check the connectivity of the networks


Zuhair H. Abaza @ GCCST-2015

ACL

Check the connectivity of the networks


Zuhair H. Abaza @ GCCST-2015

ACL

Check the connectivity of the networks


Zuhair H. Abaza @ GCCST-2015

Potrebbero piacerti anche