28.06.2014 Views

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

Learning by Doing: CISCO Certified Network ... - SCN Research

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8. Now let’s try the show access lists again:<br />

gates#sh access-list<br />

Extended IP access list 138<br />

deny icmp host 192.168.1.2 192.168.3.0 0.0.0.255 (14 matches)<br />

permit icmp any any (4 matches)<br />

gates#<br />

Aha! With extended ACL’s we can see the number of matches (or attempts) to get<br />

through our little router “mini-firewall.” We can even see from who it comes and<br />

how many times an attempt was made. Hmmm…almost like a protocol inspector.<br />

The debug ip packet details will show similar results.<br />

9. Let’s add another ACL to stop 192.168.3.2 from telnetting to 172.16.1.1. But first<br />

let’s try to telnet to be certain it works. If it works you should see:<br />

10. Now let’s create the extended ACL:<br />

gates(config)#access-list 150 deny tcp host 192.168.3.2 any eq 23<br />

gates(config)#access-list 150 permit tcp any any<br />

11. And apply it to the interface:<br />

gates(config)#int e0/1<br />

gates(config-if)#ip access-group 150 in<br />

12. Now telnet should work on 192.168.3.3 but not on 192.168.3.2. You will see this<br />

type of message if telnet is not working:<br />

349

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!