Sei sulla pagina 1di 10

Network Security

Access Control Lists (Extended)

Why use Access Control Lists?

Manage IP traffic as network access grows.


Filter Packets as they pass through the router.
Zuhair H. Abaza @ GCCST-2015

Access List Command Overview

Step 1: Set parameters for this access list test


statement (with can be one of several
statements).

Step 2: Enable an interface to use specified access list.

IP access lists are numbered 1 99 or 100 - 199


Zuhair H. Abaza @ GCCST-2015

Standard IP List Example

Position : Interface of the Router.


Condition : Permit or Deny.
Direction : In or Out.

Zuhair H. Abaza @ GCCST-2015

Network Diagram

Design & Implement the Following Networks

Zuhair H. Abaza @ GCCST-2015

Create Extended ACL

Create Extended Access List on Router


Labeled R2:

Source Network
Protocol

Destination Network

Port Number

Zuhair H. Abaza @ GCCST-2015

Ports

Zuhair H. Abaza @ GCCST-2015

Apply the ACL

Apply the ACL on the correct interface to filter


traffic.

Zuhair H. Abaza @ GCCST-2015

Test connectivity

Zuhair H. Abaza @ GCCST-2015

Add the other networks on the ACL

Zuhair H. Abaza @ GCCST-2015

Potrebbero piacerti anche