For the ACL to actually filter traffic, it must be applied to some router operation.Before applying an access list to an interface to filter traffic, it is a best practice to review the contents of the access list, in order to verify that it will filter traffic as expected.To permit all other traffic, configure the following statement: By default, an access list denies all traffic that does not match any rules.Create an ACL using the number 1 on R2 with a statement that denies access to the 192.168.20.0/24 network from the 192.168.11.0/24 network.Part 2: Configure, Apply, and Verify a Standard ACL Step 1: Configure and apply a numbered standard ACL on R2. A second rule must be created on R3 to permit all other traffic. The ACL must be placed on the outbound interface to PC3. To restrict access from the 192.168.10.0/24 network to the 192.168.30/24 network without interfering with other traffic, an access list will need to be created on R3. The following network policies are implemented on R3:.A second rule must be created on R2 to permit all other traffic. The access list must be placed on the outbound interface to the WebServer. To restrict access from the 192.168.11.0/24 network to the WebS erver at 192.168.20.254 without interfering with other traffic, an ACL must be created on R2. The following network policies are implemented on R2:.Step 2: Evaluate two network policies and plan ACL implementation s. You should be able to successfully ping every device.
PACKET TRACER ACTIVITY EXERCISE FILES CCNA 1 FULL
Verify that the network has full connectivity by choosing a PC and pinging other devices on the network. Instructions Part 1: Plan an ACL Implementation Step 1: Investigate the current network configuration.īefore applying any ACLs to a network, it is important to confirm that you have full connectivity. The routers are already configured, including IP addresses and Enhanced Interior Gateway Routing Protocol ( EIGRP ) routing. This activity focuses on defining filtering criteria, configuring standard ACLs, applying ACLs to router interfaces, and verifying and testing the ACL implementation. Standard access control lists ( ACLs ) are router configuration scripts that control whether a router permits or denies packets based on the source address. Part 2: Configure, Apply, and Verify a Standard ACL Background / Scenario Addressing Tableīlank Line – no additional information Objectives Packet Tracer – Configure Numbered Standard IPv4 ACLs (Answers Version)Īnswers Note : Red font color or g ray highlights indicate text that appears in the instructor copy only. Network Security Student Lab Source Files Answers Use the IPv4 addressing from Step 1 and the IPv6 addressing values provided in the addressing table to configure all host PCs with the correct addressing.Network Security Packet Tracer Activity Files AnswersĨ.1.5 Packet Tracer – ACL Demonstration AnswersĨ.5.5 Packet Tracer – Configure Named Standard IPv4 ACLs AnswersĨ.5.6 Packet Tracer – Configure Numbered Standard IPv4 ACLs AnswersĨ.5.12 Packet Tracer – Configure Extended ACLs – Scenario 1 AnswersĨ.5.13 Packet Tracer – Configure Extended ACLs – Scenario 2 AnswersĨ.6.5 Packet Tracer – Configure IP ACLs to Mitigate Attacks AnswersĨ.7.4 Packet Tracer – Configure IPv6 ACLs Answersĩ.2.4 Packet Tracer – Identify Packet Flow Answersġ0.3.11 Packet Tracer – Configure a ZPF Answers Step 4: Configure and Verify Host Addressing. Configure Administration Switch for remote management. Step 3: Configure the Administration Switch. Configure the two Gigabit Ethernet interfaces using the IPv4 addressing values you calculated and the IPv6 values provided in the addressing table. Use the value for encryption key strength. Configure addresses on the hosts using any of the remaining addresses in their respective subnets. Assign the second to the last address the second highest in this subnet to the VLAN 1 interface of the Administration Switch. Assign the second of these new host subnets to the Administration LAN. Subnet the Starting with the fifth subnet, subnet the network again so that the new subnets will provide 14 host addresses per subnet while wasting the fewest addresses. Use the table above to help you organize your work. Routing and Switching Essentials Practice Final - Packet Tracer 6 | Danscourses