SlideShare ist ein Scribd-Unternehmen logo
1 von 54
CHAPTER ONE Access Lists
Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Access Lists: Usage and Rules ,[object Object],[object Object],[object Object]
Access List Usage ,[object Object],[object Object],Figure 10-1: Sample network
Problems with Access Lists ,[object Object],[object Object],[object Object]
Access List Rules Figure 10-2: No access-list command
Access List Rules ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Access List Rules Figure 10-3: The man in the router
Access List Rules ,[object Object],[object Object],[object Object]
Access List Rules ,[object Object],[object Object],[object Object],[object Object]
Standard IP Access Lists ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Standard IP Access Lists Table 10-1: Wildcard mask examples
Standard IP Access Lists Figure 10-4: Wildcard masking example matching a single host
Standard IP Access Lists Figure 10-5: Wildcard masking example matching a complete subnet
Standard IP Access Lists ,[object Object],[object Object],Figure 10-6: Wildcard masking example using partial masking
Standard IP Access Lists Figure 10-7: Wildcard masking example without match
Standard IP Access List Examples Figure 10-8: Sample IP network
Standard IP Access List Examples Figure 10-9: Creating a standard IP access list
Standard IP Access List Examples Figure 10-10: Sample IP network with two Ethernet interfaces on RouterB
Standard IP Access List Examples Figure 10-11: Show access-lists and show ip access-lists commands
Standard IP Access List Examples Figure 10-12: Show ip interface command
Standard IP Access List Examples Figure 10-13: Removing an ip access list from an interface
Standard IP Access List Examples Figure 10-14: Show ip interface after removal of access list 1 from e0
Standard IP Access List Examples Figure 10-15: Creation and application of standard IP access list
Standard IP Access List Examples Figure 10-16: Show access-list and show ip interface commands
Standard IP Access List Examples Figure 10-17: Access list that blocks multiple subnets
Monitoring Standard IP Access Lists ,[object Object],[object Object],[object Object],[object Object],[object Object]
Extended IP Access Lists ,[object Object],[object Object],[object Object],[object Object],[object Object]
Extended IP Access List Examples Figure 10-18: Sample IP network with a Web server
Extended IP Access List Examples ,[object Object],[object Object],[object Object],[object Object]
Extended IP Access List Examples Figure 10-19: Extended IP access list example
Extended IP Access List Examples Figure 10-19 (cont.): Extended IP access list example
Extended IP Access List Examples Figure 10-20: Extended IP access list example continued
Extended IP Access List Examples Figure 10-20 (cont.): Extended IP access list example continued
Extended IP Access List Examples Figure 10-21: Applying an extended ip access list to an interface
Extended IP Access List Examples Figure 10-22: Removing an extended ip access list from an interface
The “Established” Parameter ,[object Object],[object Object],[object Object]
Monitoring Extended IP Access Lists Figure 10-23: Show ip access-lists command
Monitoring Extended IP Access Lists Figure 10-24: Clear access-list counters command
Standard IPX Access Lists ,[object Object],[object Object],[object Object],[object Object],[object Object]
Standard IPX Access List Examples Figure 10-25: Sample IPX network
Standard IPX Access List Examples Figure 10-26: Standard IPX access-list configuration
Monitoring Standard IPX Lists Figure 10-27: Show access-list command
Extended IPX Access Lists ,[object Object],Figure 10-28: Configuring extended IPX access-lists
Extended IPX Access Lists Figure 10-28 (cont.): Configuring extended IPX access-lists
Monitoring Extended IPX Access Lists Figure 10-29: show access-lists command
IXP SAP Filters ,[object Object],[object Object],[object Object],[object Object]
IXP SAP Filter Example Figure 10-30: IPX SAP filter example
IXP SAP Filter Example Figure 10-31: Applying an IPX SAP filter to an interface
Monitoring IXP SAP Filters ,[object Object],[object Object],[object Object],[object Object]
Using Named Lists ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter Summary ,[object Object],Table 10-2: Access list number ranges

Weitere ähnliche Inhalte

Was ist angesagt?

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
Lab manual cn-2012-13
Lab manual cn-2012-13Lab manual cn-2012-13
Lab manual cn-2012-13
Sasi Kala
 
Programming TCP/IP with Sockets
Programming TCP/IP with SocketsProgramming TCP/IP with Sockets
Programming TCP/IP with Sockets
elliando dias
 
Uccn1003 -may2010_-_mid_term_01_-_part1of2
Uccn1003  -may2010_-_mid_term_01_-_part1of2Uccn1003  -may2010_-_mid_term_01_-_part1of2
Uccn1003 -may2010_-_mid_term_01_-_part1of2
Shu Shin
 
Neighbor discoverydhcp
Neighbor discoverydhcpNeighbor discoverydhcp
Neighbor discoverydhcp
Fred Bovy
 

Was ist angesagt? (20)

CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
CCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick NotesCCNA 200-120 Exam Quick Notes
CCNA 200-120 Exam Quick Notes
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
Inter quiz
Inter quizInter quiz
Inter quiz
 
Networking lab
Networking labNetworking lab
Networking lab
 
Ip seminar
Ip seminarIp seminar
Ip seminar
 
Lab manual cn-2012-13
Lab manual cn-2012-13Lab manual cn-2012-13
Lab manual cn-2012-13
 
Programming TCP/IP with Sockets
Programming TCP/IP with SocketsProgramming TCP/IP with Sockets
Programming TCP/IP with Sockets
 
Sockets
SocketsSockets
Sockets
 
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
Information Theft: Wireless Router Shareport for Phun and profit - Hero Suhar...
 
Ccna 1 5
Ccna 1  5Ccna 1  5
Ccna 1 5
 
Socket Programming
Socket ProgrammingSocket Programming
Socket Programming
 
Np unit2
Np unit2Np unit2
Np unit2
 
CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
 
Uccn1003 -may2010_-_mid_term_01_-_part1of2
Uccn1003  -may2010_-_mid_term_01_-_part1of2Uccn1003  -may2010_-_mid_term_01_-_part1of2
Uccn1003 -may2010_-_mid_term_01_-_part1of2
 
Sockets
SocketsSockets
Sockets
 
Neighbor discoverydhcp
Neighbor discoverydhcpNeighbor discoverydhcp
Neighbor discoverydhcp
 
Basics of sockets
Basics of socketsBasics of sockets
Basics of sockets
 

Ähnlich wie Chapter 10

Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
robertoxe
 
1 SEC450 ACL Tutorial This document highlights.docx
1 SEC450 ACL Tutorial This document highlights.docx1 SEC450 ACL Tutorial This document highlights.docx
1 SEC450 ACL Tutorial This document highlights.docx
dorishigh
 
Student Name _________________________________ Date _____________SE.docx
Student Name _________________________________  Date _____________SE.docxStudent Name _________________________________  Date _____________SE.docx
Student Name _________________________________ Date _____________SE.docx
emelyvalg9
 
Chapter 08 - Acl
Chapter 08 - AclChapter 08 - Acl
Chapter 08 - Acl
phanleson
 
11 module configuring novell ipx
11  module configuring novell ipx11  module configuring novell ipx
11 module configuring novell ipx
Asif
 
10 module
10  module10  module
10 module
Asif
 

Ähnlich wie Chapter 10 (20)

CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
 
Access Control List & its Types
Access Control List & its TypesAccess Control List & its Types
Access Control List & its Types
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
Anilnet
AnilnetAnilnet
Anilnet
 
Easy steps-cisco-extended-access-list-231
Easy steps-cisco-extended-access-list-231Easy steps-cisco-extended-access-list-231
Easy steps-cisco-extended-access-list-231
 
1 SEC450 ACL Tutorial This document highlights.docx
1 SEC450 ACL Tutorial This document highlights.docx1 SEC450 ACL Tutorial This document highlights.docx
1 SEC450 ACL Tutorial This document highlights.docx
 
Student Name _________________________________ Date _____________SE.docx
Student Name _________________________________  Date _____________SE.docxStudent Name _________________________________  Date _____________SE.docx
Student Name _________________________________ Date _____________SE.docx
 
Chapter 08 - Acl
Chapter 08 - AclChapter 08 - Acl
Chapter 08 - Acl
 
Configuring extended ACLs
Configuring extended ACLsConfiguring extended ACLs
Configuring extended ACLs
 
11 module configuring novell ipx
11  module configuring novell ipx11  module configuring novell ipx
11 module configuring novell ipx
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
 
Cisco ACL
Cisco ACLCisco ACL
Cisco ACL
 
Acl
AclAcl
Acl
 
10 module
10  module10  module
10 module
 
20 access lists[1]
20 access lists[1]20 access lists[1]
20 access lists[1]
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Basic ip traffic management with access control lists
Basic ip traffic management with access control listsBasic ip traffic management with access control lists
Basic ip traffic management with access control lists
 

Mehr von guest35417d

Mehr von guest35417d (6)

Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Chapter 10