You are on page 1of 1

CCNA Exploration: Accessing WAN

ACL Activity 1 – Creating ACLs

Objectives

This activity provides students an opportunity to practice their knowledge of ACLs by creating ACL lists for
a hypothetical university campus network.

The network diagram shown in Figure 1 belongs to a university campus network. The routers shown in the
diagram will be configured with ACLs. In this activity you will play the role of a network administrator. Your
task is to a) consider the given network policy statements for each subnet and b) configure the ACL lists on
the routers. The subnet IP numbers for each unit in the campus is shown in the Figure.

Figure 1. Campus Network Design

Below are the network policy statements for each unit that you need to consider:

• The computers located in the stacks section of the library should not have any FTP (TCP:21), MSN
messenger (TCP: 1863), ICQ (UDP: 4000) and SSH (TCP:22) traffic. These computers are only used
for library inquiries.
• Some people in the computer engineering department have been playing the game World of
Warcraft© online. The bandwidth utilization has been affected negatively because of this practice.
Block the TCP port for the game server (TCP:3724)
• No one on campus is allowed to use Napster. Block the traffic for this software (TCP: 8875)
• Several people on the campus have been reported to download illegal MP3s from an FTP server with
the IP address: 196.34.32.3 . Block the incoming traffic from this server for the whole campus.
• A server located in the computer engineering department, with the IP address 165.123.4.130, has been
reported to receive brute force attacks from multiple hackers. Block SSH (TCP: 22) access to this
server.
• A computer in the instructional design and technology department should not have access to the
Internet. This computer is used to record equipment check-in and check-out. It only needs to have
access to the campus network. The IP address of the computer is: 165.123.2.198

Fill in the ACLs for each router as needed. Not all the routers may need ACLs and not all the sections of the
Table may need to be filled to satisfy the network policy requirements. Submit the student handout to your
instructor when you are finished. Don’t forget to write your name.

You might also like