28.06.2014 Views

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2. Test ping from each workstation to each other and to the loopback interface.<br />

3. Write an extended ACL to deny icmp from 192.168.1.2 to everywhere. Step 1: create<br />

the ACL:<br />

gates(config)#access-list 138 deny icmp host 192.168.1.2 any<br />

gates(config)#access-list 138 permit ip any any<br />

Isn’t that weird how with extended ACL’s you have to use “ip any any” and with<br />

standard ACL’s you only needed “ip any?”<br />

4. Step 2: apply the ACL to an interface. Since this is an extended ACL it should be<br />

placed nearest the source as possible using “in.”<br />

gates(config)#int e0/0<br />

gates(config-if)#ip access-group 138 in<br />

5. From 192.168.1.2 try to ping 192.168.3.3. It should not work and be unreachable:<br />

C:\WINDOWS\Desktop>ping 192.168.3.3<br />

Pinging 192.168.3.3 with 32 <strong>by</strong>tes of data:<br />

Reply from 192.168.1.1: Destination net unreachable.<br />

Reply from 192.168.1.1: Destination net unreachable.<br />

Reply from 192.168.1.1: Destination net unreachable.<br />

Reply from 192.168.1.1: Destination net unreachable.<br />

Ping statistics for 192.168.3.3:<br />

Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),<br />

Approximate round trip times in milli-seconds:<br />

Minimum = 0ms, Maximum = 0ms, Average = 0ms<br />

C:\WINDOWS\Desktop><br />

6. Try to ping from 192.168.1.2 to 192.168.3.2 and 172.16.1.1…both will not work.<br />

7. Let’s assume this person will need to be able to ping to 172.16.1.1 but not to<br />

192.168.3.0. So let’s modify our ACL a bit:<br />

gates(config)#no access-list 138<br />

**(you can see where a text editor would be helpful right?)<br />

gates(config)#access-list 138 deny icmp host 192.168.1.2 192.168.3.0<br />

0.0.0.255<br />

gates(config)#access-list 138 permit icmp any any<br />

Let’s look at our statement. We set up ACL 138 to deny ICMP from (source) host<br />

192.168.1.2 to (dest) 192.168.3.0 (network) with a wildcard mask to match the<br />

network 0.0.0.255.<br />

348

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!