Topic:- ACL (Access Control List)
- Protecting your network is extremely important for any organization. If this is not done, unwanted traffic and unauthorized access can worsen the state of your network.
- For example, anyone can access the network resources of your organization by accessing unauthorized and damage them. Apart from this, there may be so much unwanted traffic flow in your network that it can also affect the working efficiency of your network.
- Therefore it is necessary that you try to keep the network of your organization secure. You can do this by controlling the flow of traffic in your network. It is also called filtering traffic.
- Access lists are a list of commands. Any command either allows or denies traffic. If traffic matches with any command of the access list, then traffic is allowed or denied and if traffic does not match then it gets discarded.
- Access lists filters traffic based on protocol, interface and direction. You can use only one access list for every protocol,interface and direction.
- It is very important to keep in mind that the access lists only control the traffic passed through the router. That is,access lists can only be implemented on router interfaces.
- Deny
- Permit
- Go to any nearest interface of Cisco Router.
- Apply access-group rule.
- Standard Access Control Lists
- Extended Access Control Lists
- Source IP Address
- Source Protocol
- Source Port
- Destination IP Address
- Destination Protocol
- Destination Port
- Show access-list
- Show access-list <number ([1-99],[100-199])>
- Show ip access-list
- Show ip interface
- Show running-config
R-1#show access-lists (Show the status of ACL)
Extended IP access list 100
10 deny ip host 192.168.11.2 host 192.168.13.2
20 permit ip any any
30 deny ip host 192.168.10.3 host 192.168.12.3
R-1(config)#no access-list 100 (Remove access-list)
Task-1A) Block Host to Host (Name)
R-1(config)#ip access-list extended abhishek
R-1(config-ext-nacl)#deny ip host 192.168.11.3 192.168.13.2 0.0.0.0
R-1(config-ext-nacl)#permit ip any any
R-1(config-ext-nacl)#exit
R-1(config)#interface fastEthernet 0/1
R-1(config-if)#ip access-group abhishek in
R-1#show access-lists (Show the status of ACL)
Extended IP access list abhishek
10 deny ip host 192.168.11.3 host 192.168.13.2
20 permit ip any any
R-1(config)#no ip access-list extended abhishek (Remove ACL)
R-1(config)#do show access-list (Show the status of ACL)
=============================================================
Task-2) Block Host to Network (Number)
R-1#show access-lists (Show the status of ACL)
Extended IP access list 101
10 deny ip host 192.168.11.3 192.168.13.0 0.0.0.255 (3 match(es))
20 permit ip any any
R-1(config)#no access-list 101 (Remove access-list)
Task-2A) Block Host to Network (Name)
R-1(config)#ip access-list extended abhi
R-1(config-ext-nacl)#deny ip host 192.168.11.3 192.168.13.0 0.0.0.255
R-1(config-ext-nacl)#permit ip any any
R-1(config-ext-nacl)#exit
R-1(config)#interface fastEthernet 0/1
R-1(config-if)#ip access-group abhi in
R-1#show access-lists (Show the status of ACL)
Extended IP access list abhi
10 deny ip host 192.168.11.3 192.168.13.0 0.0.0.255
20 permit ip any any
R-1(config)#no ip access-list extended abhi (Remove ACL)
R-1(config)#do show access-list (Show the status of ACL)
=============================================================
Task-3) Block Network to Network (Number)
R-1#show access-lists (Show the status of ACL)
Extended IP access list 150
10 deny ip 192.168.10.3 0.0.0.255 192.168.12.0 0.0.0.255
20 permit ip any any
R-1(config)#no access-list 150 (Remove access-list)
Task-3A) Block Network to Network (Name)
R-1(config)#ip access-list extended Pathak
R-1(config-ext-nacl)#deny ip host 192.168.10.0 0.0.0.255 192.168.12.0 0.0.0.255
R-1(config-ext-nacl)#permit ip any any
R-1(config-ext-nacl)#exit
R-1(config)#interface fastEthernet 0/0
R-1(config-if)#ip access-group Pathak in
R-1#show access-lists (Show the status of ACL)
Extended IP access list Pathak
10 deny ip host 192.168.10.3 0.0.0.255 192.168.12.0 0.0.0.255
20 permit ip any any
R-1(config)#no ip access-list extended Pathak (Remove ACL)
R-1(config)#do show access-list (Show the status of ACL)
=============================================================
Task-4) Block Network to Host (Number)
R-1#show access-lists (Show the status of ACL)
Extended IP access list 155
10 deny ip 192.168.10.0 0.0.0.255 host 192.168.12.3
20 permit ip any any
R-1(config)#no access-list 155 (Remove access-list)
Task-4A) Block Network to Host (Name)
R-1(config)#ip access-list extended RHEL
R-1(config-ext-nacl)#deny ip 192.168.10.0 0.0.0.255 192.168.12.3 0.0.0.0
R-1(config-ext-nacl)#permit ip any any
R-1(config-ext-nacl)#exit
R-1(config)#interface fastEthernet 0/0
R-1(config-if)#ip access-group RHEL in
R-1#show access-lists (Show the status of ACL)
Extended IP access list RHEL
10 deny ip 192.168.10.0 0.0.0.255 192.168.12.3
20 permit ip any any
R-1(config)#no ip access-list extended RHEL (Remove ACL)
R-1(config)#do show access-list (Show the status of ACL)
=============================================================
Standard ACL always works on Source network only. So, we are going to block the computer machine of Account Department (192.168.11.2/24) from all department.
Standard ACL (Use by Number)
R-1(config)#access-list 1 deny host 192.168.11.2
R-1(config)#access-list 1 permit any
R-1(config)#interface f 0/1
R-1(config-if)#ip access-group 1 in
R-1#show access-lists (Show the status of ACL)
Standard IP access list 1
10 deny host 192.168.11.2
20 permit any
R-1(config)#no access-list 1 (Remove ACL)
Standard ACL (Use by Name)
R-1(config)#ip access-list standard abhishek
R-1(config-std-nacl)#deny host 192.168.11.2
R-1(config-std-nacl)#permit any
R-1(config-std-nacl)#exit
R-1(config)#interface fastEthernet 0/1
R-1(config-if)#ip access-group abhishek in
R-1#show access-lists (Show the status of ACL)
Standard IP access list abhishek
10 deny host 192.168.11.2
20 permit any
R-1(config)#no ip access-list standard abhishek (Remove ACL)
=============================================================
Now,we are going to block the computer Network of Account Department (192.168.11.0/24) from all department.
Standard ACL (Use by Number)
R-1(config)#access-list 1 deny 192.168.11.0 0.0.0.255
R-1(config)#access-list 1 permit any
R-1(config)#interface f 0/1
R-1(config-if)#ip access-group 1 in
R-1#show access-lists (Show the status of ACL)
Standard IP access list 1
10 deny 192.168.11.2 0.0.0.255
20 permit any
R-1(config)#no access-list 1 (Remove ACL)
Standard ACL (Use by Name)
R-1(config)#ip access-list standard abhishek
R-1(config-std-nacl)#deny 192.168.11.0 0.0.0.255
R-1(config-std-nacl)#permit any
R-1(config-std-nacl)#exit
R-1(config)#interface fastEthernet 0/1
R-1(config-if)#ip access-group abhishek in
R-1#show access-lists (Show the status of ACL)
Standard IP access list abhishek
10 deny 192.168.11.0 0.0.0.255
20 permit any
R-1(config)#no ip access-list standard abhishek (Remove ACL)
=============================================================
Now, in this scenario first of all you must connect 3rd computer machine in account department and assign the ip address of 192.168.11.4/24. The task is that you block the two computer machine of account department from all network and 3rd computer machine of account department must be ping to every network. The ip address of block computer machine of account department is 192.168.11.2/24 & 192.168.11.3/24. The ip address of computer machine that must be ping to every computer is 192.168.11.4/24.
R-1(config)#access-list 1 deny host 192.168.11.2
R-1(config)#access-list 1 deny host 192.168.11.3
R-1(config)#access-list 1 permit host 192.168.11.4
R-1(config)#interface fastEthernet 0/1
R-1(config-if)#ip access-group 1 in
R-1#show access-lists (Show the status of ACL)
Standard IP access list 1
10 deny host 192.168.11.3 (2 match(es))
20 permit host 192.168.11.4 (4 match(es))
No comments:
Post a Comment