Configuring Numbered Standard IPv4 ACLs
Configuring Numbered Standard IPv4 ACLs
Configuring Numbered Standard IPv4 ACLs
Topology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 4
Packet Tracer - Configuring Standard ACLs
Addressing Table
Objectives
Part 1: Plan an ACL Implementation
Part 2: Configure, Apply, and Verify a Standard ACL
Background / Scenario
Standard access control lists (ACLs) are router configuration scripts that control whether a router permits or
denies packets based on the source address. This activity focuses on defining filtering criteria, configuring
standard ACLs, applying ACLs to router interfaces, and verifying and testing the ACL implementation. The routers
are already configured, including IP addresses and Enhanced Interior Gateway Routing Protocol (EIGRP) routing.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
Packet Tracer - Configuring Standard ACLs
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 4
Packet Tracer - Configuring Standard ACLs
To restrict access from the 192.168.11.0/24 network to the WebServer at 192.168.20.254 without
interfering with other traffic, an ACL must be created on R2. The access list must be placed on the
outbound interface to the WebServer. A second rule must be created on R2 to permit all other traffic.
b. The following network policies are implemented on R3:
The 192.168.10.0/24 network is not allowed to communicate with the 192.168.30.0/24 network.
All other access is permitted.
To restrict access from the 192.168.10.0/24 network to the 192.168.30/24 network without interfering with
other traffic, an access list will need to be created on R3. The ACL must be placed on the outbound
interface to PC3. A second rule must be created on R3 to permit all other traffic.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 4
Packet Tracer - Configuring Standard ACLs
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 4
Packet Tracer - Configuring Standard ACLs
b. With the two ACLs in place, network traffic is restricted according to the policies detailed in Part 1. Use
the following tests to verify the ACL implementations:
A ping from 192.168.10.10 to 192.168.11.10 succeeds.
A ping from 192.168.10.10 to 192.168.20.254 succeeds.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 4
Packet Tracer - Configuring Standard ACLs
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 4
Packet Tracer - Configuring Standard ACLs
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 4