CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
description
Transcript of CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
1© 2004 Cisco Systems, Inc. All rights reserved.
CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
222© 2004, Cisco Systems, Inc. All rights reserved.
Purpose of This PowerPoint
• This PowerPoint primarily consists of the Target Indicators (TIs) of this module in CCNA version 3.1.
• It was created to give instructors a PowerPoint to take and modify as their own.
• This PowerPoint is:NOT a study guide for the module final assessment.NOT a study guide for the CCNA certification exam.
• Please report any mistakes you find in this PowerPoint by using the Academy Connection Help link.
333© 2004, Cisco Systems, Inc. All rights reserved.
To Locate Instructional Resource Materials on Academy Connection:
• Go to the Community FTP Center to locate materials created by the instructor community
• Go to the Tools section• Go to the Alpha Preview section• Go to the Community link under Resources• See the resources available on the Class home page for
classes you are offering• Search http://www.cisco.com • Contact your parent academy!
444© 2004, Cisco Systems, Inc. All rights reserved.
Objectives
555© 2004, Cisco Systems, Inc. All rights reserved.
What are ACLs?
• ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny.
666© 2004, Cisco Systems, Inc. All rights reserved.
How ACLs Work
777© 2004, Cisco Systems, Inc. All rights reserved.
Protocols with ACLs Specified by Numbers
888© 2004, Cisco Systems, Inc. All rights reserved.
Creating ACLs
999© 2004, Cisco Systems, Inc. All rights reserved.
The Function of a Wildcard Mask
101010© 2004, Cisco Systems, Inc. All rights reserved.
Verifying ACLs
• There are many show commands that will verify the content and placement of ACLs on the router.
show ip interface
show access-lists
Show running-config
111111© 2004, Cisco Systems, Inc. All rights reserved.
Standard ACLs
121212© 2004, Cisco Systems, Inc. All rights reserved.
Extended ACLs
131313© 2004, Cisco Systems, Inc. All rights reserved.
Named ACLs
141414© 2004, Cisco Systems, Inc. All rights reserved.
Placing ACLs
• Standard ACLs should be placed close to the destination.
• Extended ACLs should be placed close to the source.
151515© 2004, Cisco Systems, Inc. All rights reserved.
Firewalls
A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders.
161616© 2004, Cisco Systems, Inc. All rights reserved.
Restricting Virtual Terminal Access
171717© 2004, Cisco Systems, Inc. All rights reserved.
Summary