09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NOTE<br />

In situations where you are filtering "internal" host access as an alternative <strong>to</strong> using<br />

an ACL, it is possible <strong>to</strong> route undesirable packets <strong>to</strong> <strong>the</strong> null 0 interface. The null 0<br />

interface is a pseudo-interface available on all Cisco routers. To route traffic <strong>to</strong> null,<br />

use <strong>the</strong> command and replace <strong>the</strong> gateway address with null 0. Here<br />

is a example that routes <strong>to</strong> null 0 any packet with a destination address using any of<br />

<strong>the</strong> unregistered IP address spaces:<br />

hobo(config)#ip route 10.0.0.0 255.0.0.0 null0<br />

hobo(config)#ip route 172.16.0.0 255.266.0.0 null0<br />

hobo(config)#ip route 192.168.0.0 255.255.0.0 null0<br />

The in directional statement is not necessary, because all access control lists are<br />

implicitly applied as inbound filters. Adding <strong>the</strong> in statement does not hurt, however,<br />

and explicitly applying <strong>the</strong> filter direction is a good habit <strong>to</strong> get in<strong>to</strong> when installing<br />

access-groups on interfaces.<br />

The activation of a dial-on-demand routing (DDR) interface is determined by certain<br />

kinds of traffic <strong>the</strong> router sees as interesting. Different types of interesting traffic<br />

(for each pro<strong>to</strong>col, if needed) are defined with ACLs and applied <strong>to</strong> <strong>the</strong> DDR interface<br />

with <strong>the</strong> interface configuration subcommand .<br />

The dialer group number corresponds <strong>to</strong> <strong>the</strong> dialer-list. The dialer-list is created in<br />

global configuration EXEC mode using <strong>the</strong> command.<br />

IP access-lists are also used for traffic redirection through policy routing, and for<br />

queuing lists through <strong>the</strong> route-map configuration subcommand .<br />

Creating Access-Lists<br />

Now let's get our hands dirty and create some standard access-lists. We will start<br />

creating a standard IP access-list. Standard ACLs are built line by line, using <strong>the</strong><br />

global configuration command :

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!