Packet Tracer - Configuring Standard Acls: Topology
Packet Tracer - Configuring Standard Acls: Topology
Packet Tracer - Configuring Standard Acls: Topology
Topology
Addressing Table
Práctica 9.2.1.10 Grupo 35 Presentado por: Álvaro Camacho
Objectives
Part 1: Plan an ACL Implementation
Part 2: Configure, Apply, and Verify a Standard ACL
Background / Scenario
Standard access control lists (ACLs) are router configuration scripts that control whether a router permits or
denies packets based on the source address. This activity focuses on defining filtering criteria, configuring
standard ACLs, applying ACLs to router interfaces, and verifying and testing the ACL implementation. The
routers are already configured, including IP addresses and Enhanced Interior Gateway Routing Protocol
(EIGRP) routing.
Part 1: Plan an ACL Implementation
Step 1: Investigate the current network configuration.
Before applying any ACLs to a network, it is important to confirm that you have full connectivity. Verify that
the network has full connectivity by choosing a PC and pinging other devices on the network. You should be
able to successfully ping every device.
Práctica 9.2.1.10 Grupo 35 Presentado por: Álvaro Camacho
Step 2: Evaluate two network policies and plan ACL implementations.
a. The following network policies are implemented on R2:
The 192.168.11.0/24 network is not allowed access to the WebServer on the 192.168.20.0/24 network.
All other access is permitted.
To restrict access from the 192.168.11.0/24 network to the WebServer at 192.168.20.254 without interfering
with other traffic, an ACL must be created on R2. The access list must be placed on the outbound interface
to the WebServer. A second rule must be created on R2 to permit all other traffic.
b. The following network policies are implemented on R3:
The 192.168.10.0/24 network is not allowed to communicate to the 192.168.30.0/24 network.
All other access is permitted.
To restrict access from the 192.168.10.0/24 network to the 192.168.30/24 network without interfering with
other traffic, an access list will need to be created on R3. The ACL must placed on the outbound interface to
PC3. A second rule must be created on R3 to permit all other traffic.
b. By default, an access list denies all traffic that does not match a rule. To permit all other traffic, configure
the following statement:
a. Create an ACL using the number 1 on R3 with a statement that denies access to the 192.168.30.0/24
network from the PC1 (192.168.10.0/24) network.
R3(config)# access-list 1 deny 192.168.10.0 0.0.0.255
b. By default, an ACL denies all traffic that does not match a rule. To permit all other traffic, create a second
rule for ACL 1.
a. On R2 and R3, enter the show access-list command to verify the ACL configurations. Enter the show
run or show ip interface gigabitethernet 0/0 command to verify the ACL placements.
Práctica 9.2.1.10 Grupo 35 Presentado por: Álvaro Camacho
b. With the two ACLs in place, network traffic is restricted according to the policies detailed in Part 1.
Use the following tests to verify the ACL implementations:
Práctica 9.2.1.10 Grupo 35 Presentado por: Álvaro Camacho
A ping from 192.168.10.10 to 192.168.30.10 fails.