1 / 15

CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)

CCNA 2 v3.1 Module 11 Access Control Lists (ACLs). Objectives. What are ACLs?. ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny. How ACLs Work.

hu-stevens
Download Presentation

CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)

  2. Objectives

  3. What are ACLs? • ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny.

  4. How ACLs Work

  5. Protocols with ACLs Specified by Numbers

  6. access-list number Wildcard Mask Apply to all Incoming packets Apply ACL #2 to interface e0 Define an ACL & Apply it Deny all packets from 172.16.1.1

  7. The Function of a Wildcard Mask

  8. Verifying ACLs • There are many show commands that will verify the content and placement of ACLs on the router. • show ip interface • show access-lists • Show running-config

  9. Standard ACLs

  10. Destination IP addr. Source IP addr plus wildcard Extended ACLs

  11. 單一主機 Named ACLs

  12. Placing ACLs • Standard ACLs should be placed close to the destination. • Extended ACLs should be placed close to the source.

  13. Firewalls A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders.

  14. Restricting Virtual Terminal Access

  15. Summary

More Related