You are on page 1of 2

BMIT3094 ADVANCED COMPUTER NETWORKS

Tutorial 4

1. Standard ACL - Refer to IPv4-Access-Lists-Workbook-Student-Version-v2.0:


a) Page 5
b) Page 17
c) Page 18
d) Page 28-34 (problem 3-9)

2. Extended ACL - Refer to IPv4-Access-Lists-Workbook-Student-Version-v2.0:


a) Page 9
b) Page 21
c) Page 38-39(problem 1, 2)
d) Page 44-45 (problem 5-6)
e) Page 50-53 (problem 9-12)
f) Page 60-61 (problem 15-16)
g) Page 64-65 (problem 19-20).

3. Figure 2-1 shows a network topology where the Access Control List (ACLs) are to be applied to
the router’s interface to secure the network.

Figure 2-1: A network topology

Analyze Figure 2-1 and answer the following questions.

(i) Write an access list numbered 30 to allow PC3 to telnet into RouterA. Deny all other telnet traffic
to RouterA which must be explicitly written in your Access Control List (ACL). Use suitable
keyword(s) in the ACL. Indicate the router, interface and direction to apply the ACL. (5 marks)

access-list 30 permit host 172.16.12.10

access-list 30 deny any

RouterA

Line vty 0 4

Access-class 30 in
(ii) Write an extended access list named HALF_NET to block Laptop0 from receiving information
from second half of usable addresses from 192.168.44.0/24 network. Permit all other traffics.
Use suitable keyword(s) in your ACL. Indicate the router, interface and direction to apply the
ACL. (7 marks)

ip access-list extended HALF_NET

deny ip 192.168.44.128 0.0.0.127 host 172.16.33.10

permit ip any any

RouterB

========

int g0/1

ip access-group HALF_NET in

202201 1

You might also like