0% found this document useful (0 votes)
13 views1 page

Access Control Lists For Traffic Control IpCisco

Uploaded by

Yousra dechir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views1 page

Access Control Lists For Traffic Control IpCisco

Uploaded by

Yousra dechir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Courses Specials Blog Membership Shop About Login SignUp

Type to search...

ACCESS CONTROL LISTS FOR TRAFFIC CONTROL

 June 19, 2011  Posted by gokhankosem  Routing, Switching, Security, CCNA, CCNP  security, access-list,  1 Contact
ACL, RACL, PACL, VACL

[email protected]

Chat with us
Subscribe to NewsLetter

email address

SUBSCRIBE

IPCisco is the Winner!


“Best Certi cation Study
Journey of 2019!”

There are various ways for network traffic control. One of the common ways for this job is using Access Contorol Lists.
There are three types of access lists. These are;

• Router Access Control Lists( RACLs)


• Port Access Control Lists (PACLs)
• VLAN Access Control Lists (VACLs)

RACL is the most known Access Control List. Generally when ACL abbreviation is used it means RACL. RACL is used to Search IpCisco SEARCH
control traffic for layer 3. Port Access Control is used to control the traffic for inbound layer 2. It is only used inbound
direction because there is an hardware limitation for outbound direction.The last one, VLAN Access Control List is used to
control the traffic within the VLAN.  Python File Create
Here to explain all these ACL types the below topology will help us. Part of: Python Programming Course
 Python File Delete
Part of: Python Programming Course
 Python File Write
Part of: Python Programming Course
 Python PIP
Part of: Python Programming Course
 Python File Open Function
Part of: Python Programming Course
 Network Commands in Linux
Part of: Kali Linux Course
 Python RegEx
Part of: Python Programming Course
 Linux File System
Part of: Kali Linux Course
Table of Contents 
 Python Lambda
1. RACLs (Router Access Control Lists)
Part of: Python Programming Course
2. RACLs Configuration
 Python Try and Except
3. PACLs (Port Access Control Lists)
3.1. Related posts:
Part of: Python Programming Course
 MORE LESSONS

RACLs (Router Access Control Lists)


As mentined before, RACLs are used for controlling layer 3 traffic. These ACLs can be issued for both inbound and outbound
direction. Below, the links that RACLs can be implemented is highlighted.

RACL for both direction

RACLs Con guration


Assume that we have a gigabitethernet 1/0/1 port on our router and we will add a RACL to this interface for both inbound
and outbound direction. Firstly we must define the RACL and then we will apply the RACL to the interface.

Here is the configuration commands…

RouterA# configure terminal


RouterA(config)# ip access-list extended my_out
RouterA(config-ext-nacl)# permit ip 192.168.10.0 0.0.0.255 any
RouterA(config-ext-nacl)# permit ip 192.168.20.0 0.0.0.255 any
RouterA(config-ext-nacl)# exit
RouterA(config)# interface gig 1/0/1
RouterA(config-if)# ip access-group my_out out
RouterA(config-if)# exit
RouterA(config)# ip access-list extended my_in
RouterA(config-ext-nacl)# deny tcp any 192.168.10.0 0.0.0.255 eq ftp
RouterA(config-ext-nacl)# deny ip host 192.168.2.3
RouterA(config-ext-nacl)# permit ip any any
RouterA(config-ext-nacl)# exit
RouterA(config)# interface gig 1/0/1
RouterA(config-if)# ip access-group my_in in
RouterA(config-if)# exit

To control the configuration and the RACL assignation to the port, use the following show commands:

show ip interface gigabitethernet 1/0/1


show running-config interface gigabitethernet 1/0/1

PACLs (Port Access Control Lists)


In layer layer 2 interfaces PACLs are used instead of RACLs. PACLs are implemented only inbound direction because of the
switches’s hardware limitations. Below, the ports that PACLs can be implemented are highlighted.

 GO ON BOARD

Related Posts:

PVST+ and OSPFv3 EIGRP BGP Path LACP


Rapid Configuration Configuration Attributes – Configuration

PREVIOUS NEXT

WHAT IS MPLS? ROUTER DHCP CONFIGURATION WITH PACKET


TRACER

   

One Response to “Access Control Lists for Tra c Control”

vikas / January 11, 2017 / Reply

thanks boss its really help full for learning.

Leave a Reply

Your email address will not be published. Required fields are marked *

Name * Email * Website

Comment

POST COMMENT

WHAT YOU WILL FIND? COURSES SPECIALS MENU

250.000+ Students All Over The CISCO Courses All Quizes About
World
NOKIA Courses Cheat Sheets Contact
8.000+ Questions & Answers
HUAWEI Courses Configuration Files References
100+ Lab Files & Cheat Sheets
JUNIPER Courses Interview Questions Login
30+ IT/Network Courses
KEY Courses IPCisco On Social Media Membership
A Real Desire To Help You
VIDEO Courses
Daily Social Media Shares ADDRESS EMAIL
UDEMY Courses
%100 Satisfaction Pärnu mnt. 139c – 14, 11317, [email protected]
ONLINE Courses Tallinn,Estonia

Copyright © 2018-2021 IPCISCO Disclaimer Privacy Policy Distance Selling Contract         

You might also like