P2 - Acl
P2 - Acl
PRACTICAL 2
ACL Overview
Packet filtering can help limit network traffic and restrict network use by certain users or devices. ACLs filter
traffic as it passes through a device and permit or deny packets crossing specified interfaces. An ACL is a
sequential collection of permit and deny conditions that apply to packets. When a packet is received on an
interface, the switch compares the fields in the packet against any applied ACLs to verify that the packet has the
required permissions to be forwarded, based on the criteria specified in the access lists. One by one, it tests
packets against the conditions in an access list. The first match decides whether the switch accepts or rejects the
packets. Because the switch stops testing after the first match, the order of conditions in the list is critical. If no
conditions match, the switch rejects the packet. If there are no restrictions, the switch forwards the packet;
otherwise, the switch drops the packet. The switch can use ACLs on all packets it forwards. You configure
access lists on a device to provide basic security for your network
Topology
Page | 1
CS23016| Seemeen Patel
Addressing Table
Objectives
Page | 2
CS23016| Seemeen Patel
Background / Scenario
Network security is an important issue when designing and managing IP networks. The ability to configure
proper rules to filter packets, based on established security policies, is a valuable skill. In this lab, you will set
up filtering rules for two offices represented by R1 and R3. Management has established some access policies
between the LANs located at R1 and R3, which you must implement. The ISP router sitting between R1 and R3
will not have any ACLs placed on it. You would not be allowed any administrative access to an ISP router
because you can only control and manage your own equipment.
Required Resources
3 Routers (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable)
2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable)
2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet and serial cables as shown in the topology
In Part 1, you set up the network topology and clear any configurations, if necessary.
In Part 2, you configure basic settings on the routers, switches, and PCs. Refer to the Topology and Addressing
Table for device names and address information.
Page | 3
CS23016| Seemeen Patel
Page | 4
CS23016| Seemeen Patel
Page | 5
CS23016| Seemeen Patel
b. Copy the following basic configuration and paste it to the running-configuration on the router. And
switches
no ip domain-lookup
hostname R3
service password-encryption
enable secret class
banner motd #
Unauthorized access is strictly prohibited. #
Line con 0
password cisco
login
logging synchronous
line vty 0 4
password cisco
login
Page | 6
CS23016| Seemeen Patel
Page | 7
CS23016| Seemeen Patel
b. Copy the following basic configuration and paste it to the running-configuration on the switch.
no ip domain-lookup
service password-encryption
enable secret class
banner motd #
Unauthorized access is strictly prohibited. #
Line con 0
password cisco
login
logging synchronous
line vty 0 15
password cisco
login
exit
Page | 8
CS23016| Seemeen Patel
Page | 9
CS23016| Seemeen Patel
Page | 10
CS23016| Seemeen Patel
d. Configure the management interface IP address as shown in the Topology and Addressing Table.
a. Configure RIP version 2 and advertise all networks on R1, ISP, and R3. The OSPF configuration for
R1 and ISP is included for reference.
R1(config-router)# version 2
ISP(config-router)# version 2
Page | 11
CS23016| Seemeen Patel
R1(config-router)# version 2
b. After configuring Rip on R1, ISP, and R3, verify that all routers have complete routing tables, listing
all networks. Troubleshoot if this is not the case.
Page | 12
CS23016| Seemeen Patel
b. From R1, ping PC-C and the loopback interface on R3. Were your pings successful? _______ Yes
Page | 13
CS23016| Seemeen Patel
c. From PC-C, ping PC-A and the loopback interface on R1. Were your pings successful? _______ Yes
d. From R3, ping PC-A and the loopback interface on R1. Were your pings successful? _______ Yes
Page | 14
CS23016| Seemeen Patel
4. Test the ACL to see if it allows traffic from the 192.168.20.0/24 network access to the 192.168.30.0/24
Page | 15
CS23016| Seemeen Patel
Page | 16
CS23016| Seemeen Patel
3) Test the ACL. From the command prompt on PC-C, ping PC-A’s IP address.
4) Test the ACL to ensure that only the PC-C host is allowed access to the 192.168.10.0/24 network. You
must do an extended ping and use the G0/1 address on R3 as your source. Ping PC-A’s IPaddress.
Page | 17
CS23016| Seemeen Patel
5) Test the ACL to see if it allows traffic from the 192.168.40.0/24 network access to the 192.168.10.0/24
network. You must perform an extended ping and use the loopback 0 address on R3 as your source. Ping
PC-A’s IP address.
b. Add two additional lines at the end of the ACL. From global config mode, modify the ACL, BRANCH-
OFFICE-POLICY.
Page | 18
CS23016| Seemeen Patel
2) From the ISP command prompt, issue an extended ping. Test the ACL to see if it allows traffic from the
209.165.200.224/27 network access to the 192.168.10.0/24 network. You must do an extended ping and use
the loopback 0 address on ISP as your source. Ping PC-A’s IP address.
Page | 19