CCNA ACLs Standard Lab - 11!2!1b
CCNA ACLs Standard Lab - 11!2!1b
1b Standard ACLs
Objective
Plan, configure, and apply a standard ACL to permit or deny specific traffic and test the ACL to
determine if the desired results were achieved.
Scenario
The company home office in Gadsden (GAD) provides services to branch offices such as the
Birmingham (BHM) office. These offices have some minor security and performance concerns.
Standard ACL need to be implemented as a simple and effective tool to control traffic
1-4 CCNA 2: Routers and Routing Basics v 3.0 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.
Infrastructure
Host #3 represents the kiosk station that needs to have its access limited to the local network.
Host #4 represents another host in the Birmingham office Loopback 0 on the GAD router represents
the Internet.
b. To simulate the Internet, add the following configuration to the GAD router.
GAD(config)#interface loopback0
GAD(config-if)#address 172.16.1.1 255.255.255.0
GAD(config-if)#exit
GAD(config)#router rip
GAD(config-router)#network 172.16.0.0
GAD(config-if)#^z
2-4 CCNA 2: Routers and Routing Basics v 3.0 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.
c. From this logic the actual ACL will be written. Using the tables below, document the information
for each statement.
stop traffic from host 3
List # permit or deny Source address Wildcard mask
d. What would be the result of not including a statement at to permit all other source addresses?
_________________________________________________________________________________________
e. What would be the result of reversing the order of the 2 statements in the list?
_________________________________________________________________________________________
f. Why are both statements using the same ACL number?
_________________________________________________________________________________________
g. The final step in the planning process is to determine the best location for the access list and the
direction the list should be applied. Examine the internetwork diagram and choose the
appropriate interface and direction. Document this in the table below:
b. Add to this text file the configuration statements to apply the list.
The configuration statements take the form of:
3-4 CCNA 2: Routers and Routing Basics v 3.0 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.
c. Now the text file configuration needs to be applied to the router. Enter the configuration mode on
the appropriate router and copy and paste the configuration. Observe the CLI display to ensure
no errors were encountered.
a. First step is to check the list to see if it was configured properly in the router. To check the ACL
logic use the show access-list command. Record the output
_________________________________________________________________________________________
_________________________________________________________________________________________
_________________________________________________________________________________________
b. Next, verify that the access list was applied to the proper interface and in the correct direction.
To do this examine the interface with the show ip interface command. Look at the output
from each interface and record the lists applied to the interface.
Interface ________________________________________________________________
Outgoing access list is ____________________________________________________
Inbound access list is ____________________________________________________
c. Finally, test the functionality of the ACL by trying to send packets from the source host and verify
that is to be permitted or denied as appropriate. In this case, ping will be used to test this.
4-4 CCNA 2: Routers and Routing Basics v 3.0 - Lab 11.2.1b Copyright 2003, Cisco Systems, Inc.