Top Banner
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
15

CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)

Jan 01, 2016

Download

Documents

hu-stevens

CCNA 2 v3.1 Module 11 Access Control Lists (ACLs). Objectives. What are ACLs?. ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny. How ACLs Work. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

1© 2004 Cisco Systems, Inc. All rights reserved.

CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)

Page 2: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

222© 2004, Cisco Systems, Inc. All rights reserved.

Objectives

Page 3: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

333© 2004, Cisco Systems, Inc. All rights reserved.

What are ACLs?

• ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny.

Page 4: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

444© 2004, Cisco Systems, Inc. All rights reserved.

How ACLs Work

Page 5: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

555© 2004, Cisco Systems, Inc. All rights reserved.

Protocols with ACLs Specified by Numbers

Page 6: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

666© 2004, Cisco Systems, Inc. All rights reserved.

Define an ACL & Apply it

Wildcard Mask

Deny all packetsfrom 172.16.1.1

access-listnumber

Apply ACL #2to interface e0

Apply to allIncoming packets

Page 7: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

777© 2004, Cisco Systems, Inc. All rights reserved.

The Function of a Wildcard Mask

Page 8: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

888© 2004, Cisco Systems, Inc. All rights reserved.

Verifying ACLs

• There are many show commands that will verify the content and placement of ACLs on the router.

show ip interface

show access-lists

Show running-config

Page 9: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

999© 2004, Cisco Systems, Inc. All rights reserved.

Standard ACLs

Page 10: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

101010© 2004, Cisco Systems, Inc. All rights reserved.

Extended ACLsSource IP addrplus wildcard

DestinationIP addr.

Page 11: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

111111© 2004, Cisco Systems, Inc. All rights reserved.

Named ACLs

單一主機

Page 12: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

121212© 2004, Cisco Systems, Inc. All rights reserved.

Placing ACLs

• Standard ACLs should be placed close to the destination.

• Extended ACLs should be placed close to the source.

Page 13: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

131313© 2004, Cisco Systems, Inc. All rights reserved.

Firewalls

A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders.

Page 14: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

141414© 2004, Cisco Systems, Inc. All rights reserved.

Restricting Virtual Terminal Access

Page 15: CCNA 2 v3.1 Module 11  Access Control Lists (ACLs)

151515© 2004, Cisco Systems, Inc. All rights reserved.

Summary