19.07.2013 Views

Access Lists Workbook - The Cisco Learning Network

Access Lists Workbook - The Cisco Learning Network

Access Lists Workbook - The Cisco Learning Network

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6<br />

Extended <strong>Access</strong> <strong>Lists</strong><br />

Extended <strong>Access</strong> <strong>Lists</strong>...<br />

...are numbered from 100 to 199.<br />

...filter (permit or deny) based on the: source address<br />

destination address<br />

protocol<br />

port number<br />

... are placed close to the source.<br />

...work at both layer 3 and 4 of the OSI model.<br />

Why extended ACLs are placed close to the source.<br />

If you want to deny traffic from Juan’s computer from reaching<br />

Janet’s computer with an extended access list you would place<br />

the ACL close to the source on Router A, interface E0. Since it<br />

can permit or deny based on the destination address it can reduce<br />

backbone overhead and not effect traffic to Routers B, or C.<br />

Router A<br />

E0<br />

S0<br />

Juan’s<br />

Computer<br />

Router B<br />

S1 S0<br />

FA0<br />

Matt’s<br />

Computer<br />

S1<br />

Jimmy’s<br />

Computer<br />

Router C<br />

E0<br />

Router D<br />

Janet’s<br />

Computer<br />

If you place the ACL on Router E to block traffic from Router<br />

A, it will work. However, Routers B, and C will have to route<br />

the packet before it is finally blocked at Router E. This<br />

increases the volume of useless network traffic.<br />

S0<br />

S1<br />

E0

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!