Professional Documents
Culture Documents
Tutorial 4
3. Figure 2-1 shows a network topology where the Access Control List (ACLs) are to be applied to
the router’s interface to secure the network.
(i) Write an access list numbered 30 to allow PC3 to telnet into RouterA. Deny all other telnet traffic
to RouterA which must be explicitly written in your Access Control List (ACL). Use suitable
keyword(s) in the ACL. Indicate the router, interface and direction to apply the ACL. (5 marks)
RouterA
Line vty 0 4
Access-class 30 in
(ii) Write an extended access list named HALF_NET to block Laptop0 from receiving information
from second half of usable addresses from 192.168.44.0/24 network. Permit all other traffics.
Use suitable keyword(s) in your ACL. Indicate the router, interface and direction to apply the
ACL. (7 marks)
RouterB
========
int g0/1
ip access-group HALF_NET in
202201 1