0% found this document useful (0 votes)
29 views3 pages

CCNA 4 - Access Control Lists - Activity 4.2.2.8

The document outlines three scenarios involving extended ACLs (Access Control Lists) 103, 104, and 105, where users must determine whether specific source and destination IP address combinations are permitted or denied. Each scenario includes multiple source-destination pairs along with protocols, requiring an evaluation of packet permissions. The task emphasizes understanding ACL configurations and their impact on network traffic control.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views3 pages

CCNA 4 - Access Control Lists - Activity 4.2.2.8

The document outlines three scenarios involving extended ACLs (Access Control Lists) 103, 104, and 105, where users must determine whether specific source and destination IP address combinations are permitted or denied. Each scenario includes multiple source-destination pairs along with protocols, requiring an evaluation of packet permissions. The task emphasizes understanding ACL configurations and their impact on network traffic control.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 3

Activity 4.2.2.

8 - Evaluating Extended ACEs

Scenario 1 - Refer to the topology above. This scenario provides the extended ACL 103 and the source
and destination combinations. Based on this information, determine whether packets will be permitted
or denied. Identify whether to Permit or Deny each source and destination for each field.

1. Source: 192.168.1.66 Destination: 192.168.3.51

a. Permit

b. Deny

2. Source: 192.168.1.66 Destination: 192.168.3.75

a. Permit

b. Deny

3. Source: 192.168.1.88 Destination: 192.168.3.51

a. Permit

b. Deny

4. Source: 192.168.1.88 Destination: 192.168.3.75

a. Permit

b. Deny

5. Source: 192.168.1.77 Destination: 192.168.3.75

a. Permit

b. Deny
6. Source: 192.168.1.33 Destination: 192.168.2.34

a. Permit

b. Deny

Scenario 2 - Refer to the topology above. This scenario provides the extended ACL 104 and the source
and destination combinations. Based on this information, determine whether packets will be permitted
or denied. Identify whether to Permit or Deny each source and destination for each field.

1. Source: 192.168.1.66 Destination: 192.168.3.20 Protocol: http

a. Permit

b. Deny

2. Source: 192.168.1.66 Destination: 192.168.4.75 Protocol: ssh

a. Permit

b. Deny

3. Source: 192.168.1.77 Destination: 192.168.3.75 Protocol: http

a. Permit

b. Deny

4. Source: 192.168.1.88 Destination: 192.168.2.75 Protocol: http

a. Permit

b. Deny

5. Source: 192.168.1.77 Destination: 192.168.3.75 Protocol: ssh

a. Permit

b. Deny

6. Source: 192.168.1.66 Destination: 192.168.3.200 Protocol: http

a. Permit

b. Deny

Scenario 3 - Refer to the topology above. This scenario provides the extended ACL 105 and the source
and destination combinations. Based on this information, determine whether packets will be permitted
or denied. Identify whether to Permit or Deny each source and destination for each field.
1. Source: 192.168.1.67 Destination: 192.168.2.88 Protocol: http

a. Permit

b. Deny

2. Source: 192.168.1.66 Destination: 192.168.4.12 Protocol: ssh

a. Permit

b. Deny

3. Source: 192.168.1.77 Destination: 192.168.3.75 Protocol: http

a. Permit

b. Deny

4. Source: 192.168.1.66 Destination: 192.168.2.75 Protocol: Telnet

a. Permit

b. Deny

5. Source: 192.168.1.77 Destination: 192.168.2.75 Protocol: Telnet

a. Permit

b. Deny

6. Source: 192.168.1.66 Destination: 192.168.3.200 Protocol: Telnet

a. Permit

b. Deny

You might also like