Professional Documents
Culture Documents
Mubarik Ali
Access Control Lists (ACLs)?
Learning Objective:
• Made decisions by
matching a condition
statement in an access
list and then performing
the accept or reject
action defined in the
statement.
• ACL statements operate
in sequential, logical
order
Entering Frame to a Router
• After indicate if the frame have a matched layer 2
address or it’s a broadcast form, the router will
check if there ACLs command present
• If the packet is accepted or no ACL : the packet is
encapsulated in the new Layer 2 protocol and
forwarded out the interface to the next device.
• ACL exists: the packet is tested against the
statements in the list. If the packet matches a
statement, it is either accepted or rejected.
Example of ACL
Types of Access control List
• Router(config)#int fa 0/1
• Router(config-if)#ip addr 192.168.10.1 255.255.255.0
• Router(config-if)#no shutdown
• Router(config)#int s 0/0/0
• Router(config-if)#ip addr 10.15.20.2 255.255.255.0
• Router(config-if)#no shutdown
• Router>enable
• Router#configure
• Router(config)#int s 0/0/0
• Router(config-if)#ip addr 10.15.20.1 255.255.255.0
• Router(config-if)#no shutdown
•Router#show ip access-lists 70