You are on page 1of 5

Institut Supérieur d'Informatique et des Technologies de Communication de

Hammam Sousse

Compte rendu du TP5: Packet Tracer - Configuring


Extended ACLs – Scenario1

Réalisé par : Kaouther Messaoudi 3


DNI 2

2023-2024
TOPOLOGIE :

Part 1: Configure, Apply and Verify an Extended Numbered ACL


Step 1 : Configure an ACL to permit FTP and ICMP.
a/

b/

c/

d/

e/
g/

h/

i/

j/

k/

Step2 : Apply the ACL on the correct interface to filter traffic

Step 3 : Verify the ACL implementation.

Part 2: Configure, Apply and Verify an Extended Named ACL


Step 1 : Configure an ACL to permit HTTP access and ICMP
A/

b/

c/

D/

E/

f/

Step2 : Apply the ACL on the correct interface to filter traffic

Step 3 : Verify the ACL implementation

a/
b/

c/

You might also like