19.07.2013 Views

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

CCNA Complete Guide 2nd Edition.pdf - Cisco Learning Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

- Standard IP Access Lists configuration on RT3:<br />

RT3(config)#access-list 10 remark *** Deny PC2 – ServerA ***<br />

RT3(config)#access-list 10 deny 172.16.2.2<br />

RT3(config)#access-list 10 permit any<br />

RT3(config)#int fa1/0<br />

RT3(config-if)#ip access-group 10 out<br />

RT3(config-if)#^Z<br />

RT3#<br />

- The following 2 standard access list statements are identical:<br />

access-list 10 permit any<br />

access-list 10 permit 0.0.0.0 255.255.255.255<br />

- The log parameter can be specified at the end of an access list to sends a message to the console<br />

(and logging facilities) every time the access list is matched.<br />

- Note: Whenever there is a deny statement in an ACL, remember to create an explicit permit<br />

statement to allow valid traffic to pass through (all ACLs have an implicit deny statement).<br />

Extended IP Access Lists Configuration<br />

- An extended access list statement can be used to examine multiple portions of a packet header,<br />

and all parameters must be matched in order to match a particular packet to the ACL statement.<br />

This feature makes extended ACLs much more complex and powerful than standard ACLs.<br />

- Extended ACLs are created with the access-list number 100-199 or 2000-2699 (expanded<br />

range), inclusively.<br />

- TO-DO: Implement extended ACLs to achieve the following security policies:<br />

i) Deny PC2 access to ServerA’s web server.<br />

ii) Deny PC1 access to hosts on RT2 Ethernet.<br />

iii) Allow PC3, a NMS, access to ServerA’s SNMP service.<br />

iv) All other combinations are allowed.<br />

- Extended IP Access Lists configuration on RT2:<br />

RT2(config)#access-list 110 deny tcp host 172.16.2.2 host 172.16.3.2 eq www<br />

RT2(config)#access-list 110 deny ip 172.16.2.0 0.0.0.255 host 172.16.1.2<br />

RT2(config)#access-list 110 permit udp host 172.16.2.3 host 172.16.3.2 eq snmp<br />

RT2(config)#access-list 110 permit ip any any<br />

RT2(config)#int fa1/0<br />

RT2(config-if)#ip access-group 110 in<br />

- Extended ACLs should be placed as close to the source as possible to ensure that the matched<br />

packets are discarded as soon as possible to preserve network bandwidth.<br />

- The second line of configuration which denying packets flow from RT2 Ethernet subnet to PC1<br />

effectively stops the communication between them, which is how the <strong>2nd</strong> requirement is met.<br />

Else the extended ACL will be placed at RT1 Fa1/0 (as close to the source as possible).<br />

140<br />

Copyright © 2008 Yap Chin Hoong<br />

yapchinhoong@hotmail.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!