0% found this document useful (0 votes)
27 views3 pages

Access Control List Configuration Guide

Uploaded by

mdhassan49.muh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views3 pages

Access Control List Configuration Guide

Uploaded by

mdhassan49.muh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Name of the Experiment: Access control list

Objective
• Create network and configure basic device settings.
• Configuration access control list routing on the router.

Required Resources
1. 2911 Router (4)
2. 2960-24TT Switch (6)
3. PC end devices (8)
4. Server PT (1)
Sample Diagram
Here, we design a network for access control list.

Figure No-1: Network tropology

Page 2 of 4
Methodology
Step-1: IP configuration of Server0

Figure No-2: IP config of Server0


Step-2: Router configuration of R1

Router>enable
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#access-list 1 deny 192.168.10.0 0.0.0.15
Router(config)#interface gigabitEthernet 0/0 Router(config-
if)#ip access-group 1 in Router(config-if)#exit

Router(config)#access-list 1 deny 192.168.10.16 0.0.0.15


Router(config)#interface gigabitEthernet 0/1
Router(config-if)#ip access-group 1 in Router(config-
if)#exit
Router(config)#access-list 1 deny 192.168.10.46 0.0.0.0
Router(config)#interface gigabitEthernet 0/2
Router(config-if)#ip access-group 1 in Router(config-
if)#exit
Router(config)#access-list 101 deny tcp 192.168.10.32 0.0.0.15 any eq www
Router(config)#interface serial 0/3/0
Router(config-if)#ip access-group 101 in
Router(config-if)#exit
Router(config)#

Page 3 of 4
Figure No-3: Router1 configuration using access control list

Figure No-4: web browser from PC2

Discussion
We studied Access Control Lists (ACLs) in this lab. ACLs are rules sets that control network
traffic and limit user access to data and systems. It specifies which people, groups, or devices
are allowed to access certain resources. ACLs are frequently utilized on routers and firewalls
for network security purposes. On the basis of factors such IP address, protocol, and port
number, they determine if a packet can pass. By restricting access to sensitive data or services
to only authorized people or devices, ACLs enhance security. Standard ACLs filter traffic
based on the source IP address; extended ACLs praovide more precise control by utilizing
protocols, ports, and destination IP addresses. ACLs are necessary to safeguard data security
and network infrastructure.

Page 4 of 4

You might also like