Name of the Experiment: Access control list
Objective
• Create network and configure basic device settings.
• Configuration access control list routing on the router.
Required Resources
1. 2911 Router (4)
2. 2960-24TT Switch (6)
3. PC end devices (8)
4. Server PT (1)
Sample Diagram
Here, we design a network for access control list.
Figure No-1: Network tropology
Page 2 of 4
Methodology
Step-1: IP configuration of Server0
Figure No-2: IP config of Server0
Step-2: Router configuration of R1
Router>enable
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#access-list 1 deny 192.168.10.0 0.0.0.15
Router(config)#interface gigabitEthernet 0/0 Router(config-
if)#ip access-group 1 in Router(config-if)#exit
Router(config)#access-list 1 deny 192.168.10.16 0.0.0.15
Router(config)#interface gigabitEthernet 0/1
Router(config-if)#ip access-group 1 in Router(config-
if)#exit
Router(config)#access-list 1 deny 192.168.10.46 0.0.0.0
Router(config)#interface gigabitEthernet 0/2
Router(config-if)#ip access-group 1 in Router(config-
if)#exit
Router(config)#access-list 101 deny tcp 192.168.10.32 0.0.0.15 any eq www
Router(config)#interface serial 0/3/0
Router(config-if)#ip access-group 101 in
Router(config-if)#exit
Router(config)#
Page 3 of 4
Figure No-3: Router1 configuration using access control list
Figure No-4: web browser from PC2
Discussion
We studied Access Control Lists (ACLs) in this lab. ACLs are rules sets that control network
traffic and limit user access to data and systems. It specifies which people, groups, or devices
are allowed to access certain resources. ACLs are frequently utilized on routers and firewalls
for network security purposes. On the basis of factors such IP address, protocol, and port
number, they determine if a packet can pass. By restricting access to sensitive data or services
to only authorized people or devices, ACLs enhance security. Standard ACLs filter traffic
based on the source IP address; extended ACLs praovide more precise control by utilizing
protocols, ports, and destination IP addresses. ACLs are necessary to safeguard data security
and network infrastructure.
Page 4 of 4