Activity 4.2.2.
8 - Evaluating Extended ACEs
Scenario 1 - Refer to the topology above. This scenario provides the extended ACL 103 and the source
and destination combinations. Based on this information, determine whether packets will be permitted
or denied. Identify whether to Permit or Deny each source and destination for each field.
1. Source: 192.168.1.66 Destination: 192.168.3.51
a. Permit
b. Deny
2. Source: 192.168.1.66 Destination: 192.168.3.75
a. Permit
b. Deny
3. Source: 192.168.1.88 Destination: 192.168.3.51
a. Permit
b. Deny
4. Source: 192.168.1.88 Destination: 192.168.3.75
a. Permit
b. Deny
5. Source: 192.168.1.77 Destination: 192.168.3.75
a. Permit
b. Deny
6. Source: 192.168.1.33 Destination: 192.168.2.34
a. Permit
b. Deny
Scenario 2 - Refer to the topology above. This scenario provides the extended ACL 104 and the source
and destination combinations. Based on this information, determine whether packets will be permitted
or denied. Identify whether to Permit or Deny each source and destination for each field.
1. Source: 192.168.1.66 Destination: 192.168.3.20 Protocol: http
a. Permit
b. Deny
2. Source: 192.168.1.66 Destination: 192.168.4.75 Protocol: ssh
a. Permit
b. Deny
3. Source: 192.168.1.77 Destination: 192.168.3.75 Protocol: http
a. Permit
b. Deny
4. Source: 192.168.1.88 Destination: 192.168.2.75 Protocol: http
a. Permit
b. Deny
5. Source: 192.168.1.77 Destination: 192.168.3.75 Protocol: ssh
a. Permit
b. Deny
6. Source: 192.168.1.66 Destination: 192.168.3.200 Protocol: http
a. Permit
b. Deny
Scenario 3 - Refer to the topology above. This scenario provides the extended ACL 105 and the source
and destination combinations. Based on this information, determine whether packets will be permitted
or denied. Identify whether to Permit or Deny each source and destination for each field.
1. Source: 192.168.1.67 Destination: 192.168.2.88 Protocol: http
a. Permit
b. Deny
2. Source: 192.168.1.66 Destination: 192.168.4.12 Protocol: ssh
a. Permit
b. Deny
3. Source: 192.168.1.77 Destination: 192.168.3.75 Protocol: http
a. Permit
b. Deny
4. Source: 192.168.1.66 Destination: 192.168.2.75 Protocol: Telnet
a. Permit
b. Deny
5. Source: 192.168.1.77 Destination: 192.168.2.75 Protocol: Telnet
a. Permit
b. Deny
6. Source: 192.168.1.66 Destination: 192.168.3.200 Protocol: Telnet
a. Permit
b. Deny