Practical Imp
Practical Imp
!View ACL
Router# show access-lists
If ipv6 address:
ipv6 unicast-routing
interface gigabitEthernet0/0
ipv6 address 2002::1/64
ipv6 rip a enable
no shutdown
exit
Syslog:
Router(config)# logging host 192.168.1.200
Router(config)# logging trap informational
Router(config)# logging on
SSH:
On Router:
crypto key generate rsa
line vty 0 4
transport input ssh
login local
exit
username sophia privilege 15 password sophia24
On Command Prompt:
ssh -l sophia 192.168.1.1
AAA
Router(config)# aaa new-model
Router(config)# username sophia privilege 15 secret sophia24
Router(config)# aaa authentication login CONSOLE_AUTH local
Router(config)# line console 0
Router(config)# login authentication CONSOLE_AUTH
Router(config)# exit
Router(config)# line vty 0 4
Router(config-line)# login authentication CONSOLE_AUTH
Router(config-line)# exit
en
conf t
interface range fastEthernet 0/1-2
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation shutdown
exit
IPsec VPN
IOS IPS
PRACTICAL VIVA
Q1: What is an Access Control List (ACL)?
An ACL is a set of rules used to filter network traffic based on IP addresses, protocols, and
ports. It helps in controlling access to network resources by allowing or denying packets.
Q3: Where should you place a standard and extended ACL in a network?
Standard ACL: Close to the destination to avoid blocking unintended traffic.
Extended ACL: Close to the source to filter unwanted traffic early.
Q15: What happens when a MAC address table is full (CAM overflow attack)?
The switch floods all frames, behaving like a hub, allowing attackers to sniff network traffic.