Access Lists Workbook - Student Ed
Access Lists Workbook - Student Ed
Access Lists Workbook - Student Ed
ACL
Any
Access
0.0.0.0
Lists
Workbook
Version 1.5
permit
deny
access-list
Standard
access-group
Wildcard Mask
Student Name:
Access-List Numbers
IP Standard
IP Extended
Ethernet Type Code
Ethernet Address
DECnet and Extended DECnet
XNS
Extended XNS
Appletalk
48-bit MAC Addresses
IPX Standard
IPX Extended
IPX SAP (service advertisement protocol)
IPX SAP SPX
Extended 48-bit MAC Addresses
IPX NLSP
IP Standard, expanded range
IP Extended, expanded range
SS7 (voice)
Standard Vines
Extended Vines
Simple Vines
Transparent bridging (protocol type)
Transparent bridging (vendor type)
Extended Transparent bridging
Source-route bridging (protocol type)
Source-route bridging (vendor type)
1
100
200
700
300
400
500
600
700
800
900
1000
1000
1100
1200
1300
2000
2700
1
101
201
200
700
1100
200
700
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
to
99
199
299
799
399
499
599
699
799
899
999
1099
1099
1199
1299
1999
2699
2999
100
200
300
299
799
1199
299
799
Inside Cover
Router A
Router B
S0
S1
E0
S0
Router C
S1
E0
S0
E0
Janets
Computer
Matts
Computer
Juans
Computer
Jimmys
Computer
Router D
S1
E0
FA1
Router A
Jans
Computer
Juans
Computer
E0
S0
Router A
Lisas
Computer
E1
S1
Router B
Pauls
Computer
Rickys
Computer
FA1
S1
Router C
Jennys
Computer
Amandas
Computer
Carrols
Computer
Georges
Computer
Kathys
Computer
S1
Router D
E0
Jeffs
Computer
S0
Jims
Computer
S1
E0
S0
Router E
Lindas
Computer
Sarahs
Computer
FA1
S1
Router F
Jackies
Computer
Melvins
Computer
Router D
Router Name_________________
Interface ____________________
E0
Router A
Router Name_________________
Interface ____________________
E0
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
5
source address
destination address
protocol
application / port number
Router A
E0
FA0
S0
Router C
S1
S0
E0
Janets
Computer
Matts
Computer
Juans
Computer
Router D
S1
E0
Jimmys
Computer
E1
Router A
Jans
Computer
Juans
Computer
FA0
S0
Router A
Lisas
Computer
FA1
S1
Router B
Pauls
Computer
S0
S1
Rickys
Computer
E1
S1
Router C
Jennys
Computer
Amandas
Computer
Carrols
Computer
Georges
Computer
Kathys
Computer
S1
Router D
FA0
Jeffs
Computer
S0
Jims
Computer
S1
FA0
S0
Router E
Lindas
Computer
Sarahs
Computer
FA1
S1
Router F
Jackies
Computer
Melvins
Computer
Router D
Router Name_________________
Interface ____________________
FA0
Router F
Router Name_________________
Interface ____________________
FA1
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
Router Name_________________
Interface ____________________
9
wildcard
mask
source
address
permit or deny
source
address
10
indicates a
specific host
address
(Optional)
generates a log
entry on the
router for each
packet that
matches this
statement
autonomous
number
100 to 199
protocol
icp,
icmp,
tcp, udp,
ip,
etc.
source
wildcard
mask
destination
wildcard
mask
autonomous
number
100 to 199
protocol
icp,
icmp,
tcp, udp,
ip,
etc.
source
address
destination
address
port
number
(23 = telnet)
indicates a
specific
host
destination
address
source
address
indicates a
specific
host
operator
eq for =
gt for >
lt for <
neg for =
(Optional)
generates a log
entry on the
router for each
packet that
matches this
statement
11
12
13
Write a named extended access list called Gracie on Router A, Interface E0 called Gracie to deny HTTP traffic intended for web
server 192.168.207.27, but will permit all other HTTP traffic to reach the only the 192.168.207.0 network. Deny all other IP traffic.
Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
Example 2
Address Range: 192.168.16.0 to 192.168.16.127
Wildcard:
Wildcard:
15
204.100.100.0 255.255.255.0
204.100.100.0 0.0.0.255
All zeros (or 0.0.0.0) means the address must match exactly.
Example #2:
10.10.150.95 0.0.0.0
192.170.25.30 255.255.255.224
192.170.25.30 0.0.0.31
(Subtract the subnet mask from
255.255.255.255 to create the wildcard)
(This is the inverse of the subnet mask.)
172.24.128.0 255.255.128.0
172.24.128.0 0.0.127.255
16
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
192.168.150.50
Answer: __________________________________________________________________
2. access-list 5 permit any
Any address
Answer: __________________________________________________________________
3. access-list 125 deny tcp 195.223.50.0 0.0.0.63 host 172.168.10.1 fragments
195.223.50.0 to 195.223.50.63
Answer: __________________________________________________________________
4. access-list 11 deny 210.10.10.0 0.0.0.255
Answer: __________________________________________________________________
5. access-list 108 deny ip 192.220.10.0 0.0.0.15 172.32.4.0 0.0.0.255
Answer: __________________________________________________________________
6. access-list 171 deny any host 175.18.24.10 fragments
Answer: __________________________________________________________________
7. access-list 105 permit 192.168.15.0 0.0.0.255 any
Answer: __________________________________________________________________
8. access-list 109 permit tcp 172.16.10.0 0.0.0.255 host 192.168.10.1 eq 80
Answer: __________________________________________________________________
9. access-list 111 permit ip any any
Answer: __________________________________________________________________
10. access-list 195 permit udp 172.30.12.0 0.0.0.127 172.50.10.0 0.0.0.255
Answer: __________________________________________________________________
18
172.168.10.1
Answer: __________________________________________________________________
2. access-list 115 permit any any
Any address
Answer: __________________________________________________________________
3. access-list 150 permit ip 192.168.30.10 0.0.0.0 192.168.15.0 0.0.0.63
192.168.15.0 to 192.168.15.63
Answer: __________________________________________________________________
4. access-list 120 deny tcp 172.32.4.0 0.0.0.255 192.220.10.0 0.0.0.15
Answer: __________________________________________________________________
5. access-list 108 deny ip 192.220.10.0 0.0.0.15 172.32.4.0 0.0.0.255
Answer: __________________________________________________________________
6. access-list 101 deny ip 140.130.110.100 0.0.0.0 0.0.0.0 255.255.255.255
Answer: __________________________________________________________________
7. access-list 105 permit any 192.168.15.0 0.0.0.255
Answer: __________________________________________________________________
8. access-list 120 permit ip 192.168.15.10 0.0.0.0 192.168.30.0 0.0.0.7
Answer: __________________________________________________________________
9. access-list 160 deny udp 172.16.0.0 0.0.1.255 172.18.10.18 0.0.0.0 eq 21
Answer: __________________________________________________________________
10. access-list 150 permit ip 192.168.15.10 0.0.0.0 192.168.30.0 0.0.0.63
Answer: __________________________________________________________________
20
Writing
Standard Access Lists...
Router A
192.168.90.2
172.16.70.1
E1
E0
S0
210.30.28.0
Jims
Network
Computer
192.168.90.36
172.16.70.32
Franks
Computer
Melvins
Computer
Kathys
Computer
192.168.90.38
172.16.70.35
22
23
FA0
S0
223.190.32.1
Router A
S1
Router B
FA1 192.16.32.94
FA0
172.16.0.0
Network
Michaels
Computer
223.190.32.16
Debbies
Computer
192.16.32.95
25
Router A
204.90.30.124 E0
S0
10.250.30.35
Carols
Computer
Rodneys
Computer
Router B
S1
10.250.30.36
Jims
Computer
FA1
192.168.88.4
192.168.88.5
204.90.30.130
204.90.30.126
Router B
S0
S1
Router A
172.30.225.1 E0
S0
S1
E1 212.180.10.5
S1
Router C
212.180.10.6
172.30.225.2
172.30.225.3
212.180.10.2
Router C
Router A
S0
S1
FA0
S1
198.32.10.25
Router B
S0
192.168.15.172
210.140.15.1
FA0
FA1
192.168.15.3
210.140.15.8
198.32.10.25
Writing
Extended Access Lists...
34
172.16.70.32
192.168.90.38
Celestes
Computer
192.168.90.36
Mikes
Computer
or
access-list 110 deny ip host 172.16.70.35 host 192.168.90.36
Router(config)# access-list 110 permit ip any any
or
access-list 110 permit ip 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255
Router(config)# interface fa0
Router(config-if)# ip access-group 110 in [Viewing information about existing ACLs]
Router(config-if)# exit
Router# show configuration
(This will show which access groups
are associated with particular interfaces)
Router(config)# exit
Write an extended access list to prevent Johns computer from sending information to Mikes computer; but will allow all other
traffic. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
172.16.70.35
Johns
Computer
Gails
Computer
Router A
192.168.90.2
172.16.70.1
FA1
FA0
35
[Removing an ACL]
Router# configure terminal
Router(config)# interface e1
Router(config-if)# no ip access-group 135 out
Router(config-if)# exit
Router(config)# no access-list 135
Router(config)# exit
[Disabling ACLs]
Write an extended access list to block the 172.16.70.0 network from receiving information from Mikes computer at 192.168.90.36.
Block the lower half of the ip addresses from 192.168.90.0 network from reaching Gails computer at 172.16.70.32. Permit all other
traffic. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
172.20.70.89
172.20.70.80
Bobs
Computer
Cindys
Computer
172.20.70.15
Router A
S0
FA0
192.168.122.129
Jackies
Computer
192.168.122.128
Jays
Computer
Router B
FA1
S1
192.168.122.52
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write an extended access list to prevent Jays computer from receiving information from Cindys computer. Permit all other traffic.
Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
36
37
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Write an extended access list to block the 172.20.70.0 255.255.255.0 network from receiving information from Jackies computer at
192.168.122.129. Block the lower half of the ip addresses from 192.168.122.0 network from reaching Cindys computer at
172.20.70.89. Permit all other traffic. Keep in mind that there may be multiple ways many of the individual statements in an ACL can
be written.
38
Router B
S0
FA1
172.59.2.1
172.59.2.15
Rebeccas
Computer
172.59.2.18
Rachaels
Computer
S1
__________________________________________________________________________
__________________________________________________________________________
___________________________________________________________________________
Router(config-ext-nacl)
Router(config)#_____________________________________________________________________________________
Write a named extended access list called Lab_166 to permit Jans computer at 218.35.50.10 to receive packets from Rachaels
computer at 172.59.2.18; but not Rebeccas computer at 172.59.2.15. Deny all other packets. Keep in mind that there may be
multiple ways many of the individual statements in an ACL can be written.
218.35.50.10
Jans
Computer
218.35.50.12
Juans
Computer
E0
218.35.50.1
Router A
39
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Write an extended access list to allow Juans computer at 218.35.50.12 to send information to Rebeccas computer at 172.59.2.15;
but not Rachaels computer at 172.59.2.18. Permit all other traffic. Keep in mind that there may be multiple ways many of the
individual statements in an ACL can be written.
40
192.16.20.7
192.16.20.0
Network
E0
192.18.50.11
Bobs
Computer
192.17.40.0
Network
E1
Router B
S1
192.18.50.12
Barbras
Computer
Write an extended access list to permit the 192.16.20.0 network to receive packets from the 192.18.50.0 network. Deny all other
traffic. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
192.16.20.6
Cindys
Computer
Ralphs
Computer
Router A
S0
41
The remark command allows you to place text within the ACL so it
can be viewed after it is inserted on the router. It can be viewed
using the show run or any command that lists the ACL.
[Remark Command]
[Removing an ACL]
Router# configure terminal
Router(config)# interface e0
Router(config-if)# no ip access-group 188 out
Router(config-if)# exit
Router(config)# no access-list 188
Router(config)# exit
[Disabling ACLs]
Write an extended access list to block the 192.18.50.0 network from receiving information from the 192.16.20.0 network. Permit all
other traffic. Add a remark to each statement. Keep in mind that there may be multiple ways many of the individual statements in an
ACL can be written.
42
204.95.150.12
S1
FA1
172.59.2.1
S0
210.250.10.0
Network
172.59.2.15
Rebeccas
Computer
172.59.2.18
Davids
Computer
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write an extended access list to permit network 204.95.150.0 to send packets to network 172.59.0.0, but not to the 210.250.10.0
network. Permit all other traffic. Include a remark with each statement of your ACL. For help with the remark command review
page 41. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
Router B
204.95.150.10
Rachels
Computer
Todds
Computer
204.95.150.11
Router A
S0
FA0
43
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Write an extended access list to allow Rachels computer at 204.95.150.10 to receive information from the 172.59.2.0 network.
Deny all other hosts on the 204.95.150.0 network access from the 172.59.2.0 network. Permit all other traffic. Keep in mind that
there may be multiple ways many of the individual statements in an ACL can be written.
44
172.120.170.46
210.168.70.0
Network
E1
192.168.50.3
Tims
Computer
10.250.1.0
Network
S1
E1
192.168.50.2
S0
Router B
192.168.50.4
Denises
Computer
_____________________________________________________________________________
_____________________________________________________________________________
Router(config-ext-nacl)#_____________________________________________________________________________
Router(config)# _____________________________________________________________________________________
Write a named extended access list called Godzilla to prevent the 172.120.0.0 network from sending information to the
210.168.70.0 , and 10.250.1.0 255.255.255.0 networks; but will permit traffic to the 192.168.50.0 network. Permit all other traffic.
Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
172.120.170.45
Phylliss
Computer
Tommys
Computer
172.120.170.47
Router A
S0
E0
45
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Assuming default subnet masks write an extended access list to permit Tim at 192.168.50.3 to receive data from the 172.120.0.0
network. Allow the 192.168.50.0 network to receive information from Phylliss computer at 172.120.170.45. Deny all other traffic.
Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
46
192.168.15.43
E1
172.21.50.95
Router B
172.21.50.96
Carols
Computer
172.21.50.97
Franks
Computer
S1
Write an extended access list to deny the first 15 usable addresses of the 192.168.15.0 network from reaching the 172.21.0.0
network. Permit all other traffic. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be
written.
192.168.15.44
Rodneys
Computer
Jims
Computer
Router A
S0
FA0
192.168.15.20
47
[Removing an ACL]
Router# configure terminal
Router(config)# interface fa0
Router(config-if)# no ip access-group 121 in
Router(config-if)# exit
Router(config)# no access-list 121
Router(config)# exit
[Disabling ACLs]
Write an extended access list which will allow the lower half of 192.168.15.0 network access to the 172.21.50.0 network. Deny all
other traffic. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
192.168.195.145
S0
Mikes
Computer
192.168.125.108
Celestes
Computer
192.168.125.17
192.168.125.254
E1
172.31.195.0
Network
192.168.195.88
Johns
Computer
Gails
Computer
192.168.195.90
E0
Router A
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write an extended access list to prevent the first 31 usable addresses in the 192.168.125.0 network from reaching the
192.168.195.0 network. Permit all other traffic. Keep in mind that there may be multiple ways many of the individual statements in an
ACL can be written.
48
49
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
Router(config-ext-nacl)#_____________________________________________________________________________
Write a named extended access list called Media_Center to permit the range of addresses from 172.31.195.1 through
172.31.195.7 to send data to the 192.168.125.0 network. Deny all other traffic. Include a remark with each statement of your ACL.
For help with the remark command review page 41. Keep in mind that there may be multiple ways many of the individual statements
in an ACL can be written.
50
192.16.20.7
S1
S0
S0
E1
172.22.75.8
Router B
Router A
Barbras
Computer
172.18.50.12
172.22.75.10
Brads
Computer
FA1
172.18.50.10
Bobs
172.22.75.9
Computer
172.18.50.11
Jills
Computer
S1
Router C
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write an extended access list to permit the first 3 usable addresses in the 192.16.20.0 network to reach the 172.22.75.0 network.
Deny the addresses from 192.16.20.4 through 192.16.20.31 from reaching the 172.22.75.0 network. Permit all other traffic. Keep in
mind that there are multiple ways this ACL can be written.
192.16.20.6
Cindys
Computer
Ralphs
Computer
192.16.20.5
FA0
51
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Write an extended access list to deny the addresses from 172.22.75.8 through 172.22.75.127 from sending data to the 172.18.50.0
network. Deny the first half of the addresses from the 172.22.75.0 network from reaching the 192.16.20.0 network. Permit all other
traffic. Keep in mind that there are multiple ways this ACL can be written.
52
172.16.70.155
10.250.1.0
Network
FA1
Peggys
Computer
Denises
Computer
192.168.88.204
10.250.4.0 192.168.88.200
Network
Router B
FA1
S1
192.168.88.1
FA0
______________________________________________________________________________________
______________________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write an extended access list to permit the first 63 usable addresses in the 192.168.88.0 network to reach the lower half of the
addresses in the 172.16.70.0 network; but not the upper half. Deny all other traffic. Include a remark with each statement of your
ACL. For help with the remark command review page 41. Keep in mind that there may be multiple ways many of the individual
statements in an ACL can be written.
172.16.70.145
Celestes
Computer
Bobs
Computer
172.16.70.1
Router A
S0
FA0
53
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Write an extended access list to deny the addresses from 10.250.1.0 through 10.250.1.63 from sending data to Denises computer.
Permit all other traffic. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
54
210.128.50.12
210.128.50.11
Web Server
Router B
S1
E1
210.128.50.10
Write an extended access list to deny HTTP traffic intended for web server 192.168.207.27 from all other networks, but will permit all
other HTTP traffic to reach the 192.168.207.0 network. Deny all other IP traffic. Keep in mind that there may be multiple ways many
of the individual statements in an ACL can be written.
192.168.207.26
Router A
S0
E0
192.168.207.25
Web Server
192.168.207.27
[Removing an ACL]
Router# configure terminal
Router(config)# interface e0
Router(config-if)# no ip access-group 134 out
Router(config-if)# exit
Router(config)# no access-list 134
Router(config)# exit
[Disabling ACLs]
Write an extended access list to deny pings from hosts on the 210.128.50.0 network from reaching the 192.168.207.0 network.
Permit all other traffic. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
55
56
192.30.76.155
Router A
E1
S0
Peggys
Computer
Denises
Computer
192.168.33.214
172.16.16.0 192.168.33.210
Network
Router B
E1
S1
192.168.33.1
E0
Write an Extended access list to permit Denises computer to use TFTP with Bobs computer. Deny all other traffic from the 192.168.33.0
network to the 192.30.76.0 network. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be
written.
192.30.76.145
Celestes
Computer
Bobs
Computer
172.20.70.1
E0
10.250.4.0
Network
57
[Removing an ACL]
Router# configure terminal
Router(config)# interface e0
Router(config-if)# no ip access-group 155 out
Router(config-if)# exit
Router(config)# no access-list 155
Router(config)# exit
[Disabling ACLs]
Write an extended access list to deny FTP traffic from ip addresses 192.30.76.0 through 192.30.76.13.
Permit all other traffic. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
E0
172.16.70.1
192.128.45.33
Bills
Computer
10.250.8.0
Network
Router B
FA1
S1
192.128.45.8
FA0
S0
Router A
172.16.125.1
Jackies
Computer
E1
10.250.2.0
Network
192.128.45.35
Jennifers
Computer
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write an extended access list to permit ICMP traffic from the 192.128.45.0 network to reach the 172.16.125.0 255.255.255.0 and
10.250.2.0 255.255.255.0 networks. Deny all other traffic. Keep in mind that there may be multiple ways many of the individual
statements in an ACL can be written.
58
59
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
Router(config-std-nacl)# ____________________________________________________________________________
Router(config-std-nacl)# ____________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write a named extended access list called Peggys_Lab to deny telnet from 10.250.8.0 through 10.250.8.127 from reaching the
192.128.45.0 network. Permit all other traffic. Keep in mind that there may be multiple ways many of the individual statements in an
ACL can be written.
60
203.194.100.102
S1
Router B
Jimmys
Computer
Jos
Computer
172.60.18.142
172.60.18.140
FA1
172.60.18.1
S0
204.250.10.0
Network
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write an access list to deny Jimmys computer from sending ftp packets to Web Server 1, but permit ftp to Web Server #2. Permit all
other traffic. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
203.194.100.101
Web Server #2
Web Server #1
203.194.100.1
Router A
S0
FA0
61
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Write an extended access list to deny all HTTP traffic intended for the web server at 203.194.100.102 from the 172.66.0.0 network.
Permit all other HTTP traffic from the 204.250.10.0 and 172.60.0.0 networks to any other web servers. Deny all other IP traffic to the
203.194.100.0 network. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
62
192.168.15.82
192.172.10.0
Network
Router B
E1
Web Server #2
172.23.50.195 172.23.50.196
S1
172.23.50.197
Gails
Computer
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write an extended access list to permit TFTP traffic from all hosts on the 192.168.15.0 network. Deny all other traffic. Include a
remark with each statement of your ACL. For help with the remark command review page 41.Keep in mind that there may be
multiple ways many of the individual statements in an ACL can be written.
192.168.15.125
Web Server #1
Bobbies
Computer
Router A
S0
E0
E1
192.168.15.25
63
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Write an extended access list that permits web traffic from web server #2 at 172.23.50.196 to reach everyone on the 192.168.15.0
network. Deny all other IP traffic going to the 192.172.10.0, and 192.168.15.0 networks from the 172.25.50.0 network. Keep in
mind that there may be multiple ways many of the individual statements in an ACL can be written.
65
192.30.76.155
10.250.4.0
Network
E1
Peggys
Computer
Deny/Permit Telnet
172.16.16.0
192.168.33.210
Network
Router B
E1
S1
192.168.33.1
E0
192.168.33.214
Denises
Computer
Write a standard access list to permit Denises and Bobs computers to telnet into Router B. Deny all other telnet traffic Keep in
mind that there may be multiple ways many of the individual statements in an ACL can be written.
192.30.76.145
Celestes
Computer
Bobs
Computer
172.20.70.1
Router A
S0
E0
66
203.194.100.102
Deny/Permit Telnet
204.250.10.0
Network
S0
172.60.18.140
Beckys
Computer
FA1
172.60.18.1
Router B
S1
172.60.18.142
Marys
Computer
Router(config)# ___________________
Router(config-line)# access-class _________ in or out (circle one)
Router(config-line)# exit
Router(config)# exit
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write a standard access list to permit Becky and Marys computer to telnet into Router B. Deny all other telnet traffic from the
172.60.18.0 network. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
203.194.100.101
Web Server #2
Web Server #1
203.194.100.1
Router A
S0
FA0
67
Deny/Permit Telnet
Router(config)# ___________________
Router(config-line)# access-class _________ in or out (circle one)
Router(config-line)# exit
Router(config)# exit
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write a standard access list to permit which will permit Web Server #1 to telnet into Router A. Log the telnet attempts. Deny all other
telnet access. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
68
FA1
FA0
192.60.18.61
Brents
Computer
192.60.18.62
Bobs
Computer
Router(config)# ___________________
Router(config-line)# access-class _________ in or out (circle one)
Router(config-line)# exit
Router(config)# exit
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
Router(config)#______________________________________________________________________________________
Write a standard access list to deny Brent and Bobs computer telnet access to into Router A. Permit all other telnet traffic from the
192.60.18.0 network. Keep in mind that there may be multiple ways many of the individual statements in an ACL can be written.
Deny/Permit Telnet
172.32.0.0
Network
204.250.10.0
Network
S0/0
Router A
69
Port Numbers
Port numbers are now assigned by the ICANN (Internet Corporation for
Assigned Names and Numbers). Commonly used TCP and UDP
applications are assigned a port number; such as: HTTP - 80, POP3 - 110,
FTP - 20. When an application communicates with another application on
another node on the internet, it specifies that application in each data
transmission by using its port number. You can also type the name (ie. Telnet)
instead of the port number (ie. 23). Port numbers range from 0 to 65536 and
are divided into three ranges:
Well Known Ports
Registered Ports
Dynamic and/or Private Ports
0 to 1,023
1,024 to 49,151
49,152 to 65,535
Below is a short list of some commonly used ports. For a complete list of
port numbers go to http://www.iana.org/assignments/port-numbers.
Reserved
TCPMUX
RJE
ECHO
DISCARD
SYSTAT
DAYTIME
QUOTE
MSP
CHARGEN
FTP-DATA
FTP
SSH
Telnet
SMTP
MSG ICP
TIME
RLP
NAMESERV
(Active users)
(Quote of the day)
(Message Send Protocol)
(Character generator)
(File Transfer Protocol - Data)
(File Transfer Protocol - Control)
(Remote Login Protocol)
(Terminal Connection)
(Simple Mail Transfer Protocol)
43
49
53
67
68
69
70
75
79
80
95
101
108
109
110
113
115
117
118
119
123
137
139
143
150
156
161
179
190
194
197
389
396
443
444
445
458
546
547
563
569
NICNAME
LOGIN
DNS
BOOTP
BOOTPS
TFTP
GOPHER
(Who Is)
(Login Host Protocol)
(Domain Name Server)
(Bootstrap Protocol Server)
(Bootstrap Protocol Client)
(Trivial File Transfer Protocol)
(Gopher Services )
(Any Privite Dial-out Service)
FINGER
HTTP
(Hypertext Transfer Protocol)
SUPDUP
(SUPDUP Protocol)
HOSTNAME
(NIC Host Name Server)
SNAGAS
(SNA Gateway Access Server)
POP2
(Post Office Protocol - Version 2)
POP3
(Post Office Protocol - Version 3)
AUTH
(Authentication Service)
SFTP
(Simple File Transfer Protocol)
UUCP-PATH
(UUCP Path Service)
SQLSERV
(SQL Services)
NNTP
(Newsgroup)
NTP
(Network Tim Protocol)
NetBIOS-NS
(NetBIOS Name Service)
NetBIOS-SSN (NetBIOS Session Service )
IMAP
(Interim Mail Access Protocol)
SQL-NET
(NetBIOS Session Service)
SQLSRV
(SQL Service)
SNMP
(Simple Network Management Protocol)
BGP
(Border Gateway Protocol)
GACP
(Gateway Access Control Protocol)
IRC
(Internet Relay Chat)
DLS
(Directory Location Service)
LDAP
(Lightweight Directory Access Protocol)
NETWARE-IP (Novell Netware over IP )
HTTPS
(HTTP MCom)
SNPP
(Simple Network Paging Protocol)
Microsoft-DS
Apple QuickTime
DHCP Client
DHCP Server
SNEWS
MSN
Inside Cover