![]() ![]() ![]() Now, we have created the access list however it will not work until we apply this to the router’s interface. While creating an access list, we have to make sure to use permit any command to allow other traffic that we don’t want to block because there is an invincible deny at the end of every access list so if this command is missed then the access-list will block all traffic. The standard access list can be given a number from 1-to 99 so we will give the number 1 to our access-list. We are using the following commands to create an access list. In this Standard Access list configuration, we will block PC0 traffic from reaching router 2. Requires more processor cycles due to the complexity of the defined rules.Ĭonfiguring Standard Access list in Cisco packet tracer It’s not easy to configure as compared to the standard access list however it provides many filters that we can use to control traffic efficiently.Ģ. It is very light on the processor so it does not overload the hardware.Įxtended access list – Extended access lists can filter out traffic based on source IP, destination IP, protocols like TCP, UDP, ICMP, etc, and port numbers.ġ. A standard access list is very easy to configure.Ģ. This access list does not have any other way to filter traffic so this provides basic functionality.ġ. Standard access-list – Standard access list only filters out traffic based on the source IP. The router will read the second rule later but till then the traffic from that network is denied already so we have to be careful when setting up the rules for the access list. As access-list rules are read in the series, the router will drop every packet from this network because it matches the deny rule. In the above access list rules, we have denied the complete 192.168.1.0 network and in the second rule, we are permitting the host from the same network. Access list filters out traffic based on the configuration.Ĭisco router IOS has enough command through which we can control traffic effectively however special hardware like pix firewall or ASA firewalls have many extra security features.Īccess list rules or conditions are read series wise so If any network that is denied earlier will not be permitted even after adding the permit statement e.g. We can set up an access list according to our requirements. ![]() ![]() In this lab, we will configure ACL in the Cisco packet tracer and we will see how the access list blocks the traffic based on different conditionsĪccess list provides the ability to control the traffic in the network. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |