CCNAv2 Chapter 02
CCNAv2 Chapter 02
Chapter 2
Basic IPv4 Access Control Lists
Objectives
• Configure and verify access control lists
IPv4 Access Control List Basics
• IPv4 access control lists give network engineers
a way to identify different types of packets.
• ACL configurations list values that the router can
see in the IP, ICMP, TCP, and UDP (and other)
headers.
• IPv4 ACLs perform many functions in Cisco
routers, including packet filtering and QoS.
Locations to Filter Packets from Hosts A and
B Going Toward Server S1
Pseudocode to Demonstrate ACL Command-
Matching Logic
Comparisons of IP ACL Types
Backdrop for Discussion of List Process with
IP ACLs
ACL Items Compared for Packets from Hosts
A, B, and C on Previous Slide
Logic for WC Masks 0.0.0.255, 0.0.255.255,
and 0.255.255.255
Syntactically Correct ACL Replaces
Pseudocode
Binary Wildcard Mask Example
• For subnet 172.16.8.0 255.255.252.0, use the subnet
number as the address parameter and do the following
math to find the wildcard mask:
Matching Any/All Addresses
• In some cases, one ACL command can be used to
match any and all packets that reach that point
in the ACL using the any keyword.
• Example: access-list 1 permit any.
• All Cisco IP ACLs end with an implicit deny any.
Implementing Standard IP ACLs
• Step 1: Plan the location and direction on that
interface
• Step 2: Configuration one or more access-list
global configuration commands to create the
ACL
• Step 3: Enable the ACL on the chosen router
interface, in the correct direction, using the ip
access-group number {in | out} interface
subcommand.
Standard Numbered ACL Example 1
Configuration
ACL show Commands on R2
Standard Numbered ACL Example 2
Creating Log Messages for ACL Statistics
Example of Checking the Interface and
Direction for an ACL
Building One-Line Standard ACLs: Practice
Problem Criteria
1 Packets from 172.16.5.4
2 Packets from hosts with 192.168.6 as the first three octets
3 Packets from hosts with 192.168 as the first two octets
4 Packets from any host
5 Packets from subnet 10.1.200.0/21
6 Packets from subnet 10.1.200.0/27
7 Packets from subnet 172.20.112.0/23
8 Packets from subnet 172.20.112.0/26
9 Packets from subnet 192.168.9.64/28
10 Packets from subnet 192.168.9.64/30
Reverse Engineering from ACL to Address
Range
• With the command access-list 1 permit
172.16.200.0 0.0.7.255, the low end of the range is
172.16.200.0.
• To find the high end of the range, add this number to
the WC mask, as shown here:
Finding IP Addresses/Ranges Matching by
Existing ACLs
Problem Criteria