Computer System Engineering Department ENCS413 Network Lab Access List
Computer System Engineering Department ENCS413 Network Lab Access List
Department
ENCS413
Network Lab
Access List
Page | 2
filtering. Address based access lists distinguish routes on a network
you want to control by using
network address number (IP). Address-based access lists consist of
a list of addresses or address
ranges and a statement as to whether access to or from that address
is permitted or denied.
Standard IP lists (1-99) only check source addresses of all IP
packets.
Configuration Syntax
access-list access-list-number {permit deny} source {source-mask}
Page | 3
Configuration Syntax
access-list access-list-number {permit|deny} protocol source{source-
mask}destination{destination-mask}[eq destination-port]
Procedure :
At the beginning of lab lecture we build this first topology:
Page | 4
Then we configured a routers and make routing using RIP:
ON R0:
Router >en
Router# conf t
Router0(config-if)#ip access-group 10 in
EX:
Page | 6
Task 3. Using the Slandered ACLs, prevent network 192.168.10.0 from
accessing network 192.168.20.0 only (use the wild-card, not ‘any’
option).
Task 4. Using Extended ACLs Prevent PC0 from accessing PC2. (all
other traffic is allowed).
First of all, we must remove the past access list by : no access-list 10
then, then we create an access list to deny PC0, as following: (Extended
ACL takes ID’s of 100 to 199)
The command access-list 101 permit ip any any used because by default after assigning an access list, by
default there is an implicit deny all clause at the end of every ACL. Anything that is not explicitly
permitted is denied.
Page | 7
Then we have to give the ACL to an interface, in our case give it to fa1/0, using this command:
Router0(config-if)#no ip access-group 10 in
Task 5. Using Extended ACLs allow PC0 to access PC2. (all other
traffic is not allowed)
Task 6. Using Extended ACLs deny PC0 to make HTTP request to PC2.
(all other traffic is allowed).
Page | 8
Task 7. We update the topology to by as that:
Task 9. Make RIP routing on both routers and make sure that you can
ping all the PCs.
ON R1:
Router>en
Router# conf t
Router >en
Router# conf t
Task 9. Using Extended ACLs Prevent PC0 from accessing PC4. (all
other traffic is allowed). We put the rule.in router 1
Page | 10
Task 10. Using Standard ACLs Prevent PC0 from accessing PC4. (all
other traffic is allowed). we put the rule.
11. [Homework]: Enable telnet on Router1 then, deny all the host from
make telnet with interface se2/0 of Router1 expect PC0, it can make
telnet with any interface. [try to minimize the traffic on the serial line as
much as possible]. All other traffic should be allowed.
Page | 11
Conclusion
In access list, we have noticed that we can prevent a specific host or
whole network to accessing to a specific host or network by ping request
or telnet remote, which help us to control the network and make it
efficient.
Page | 12
References
1) Computer Networking: A Top down Approach, 5th edition, 2010 by Jim Kurose
and Keith Ross.
3) http://blog.pluralsight.com/access-control-list-concepts, 26-11-2018.
4) http://orbit-computer-solutions.com/Access-Control-Lists--ACL-.php, 26-11-
2018
Page | 13