SlideShare a Scribd company logo
ACL (Access Control List) 
 ACLS’s are used for network security 
 Conditions for controlling traffics through router is called ACL. 
 Two conditions are:- 
1. Permit 
2. Deny 
 Two types are:- 
1. Standard (1-99) 
2. Extended (100-199)
Standard ACL 
 Range 1-99 
 Standard ACL is configured under destination Router 
 Source IP is given for Standard ACL 
 Entire TCP/IP protocol stack is blocked when Deny condition is applied
Configuring Standard ACL 
 Router(config)#access-list ‘no:’ deny host ‘destination address’ 
 Router(config)#access-list ‘no:’ permit any
Filter Design 
 Filter is designed at the interface which is nearest to destination in 
standard ACL 
 ACL will only be accessible if filter is designed. 
 Syntax:- 
Router(config-if)# ip access group ‘access list no:’ ‘in or out ‘
Verifying ACL’s 
Router #show access-list 
To remove:- 
Router(config)#no access-list ‘no:’ 
Router(config-if)#no ip access group ‘access list no:’ ‘in or out’
Extended ACL 
 Range- 100-199 
 Extended ACL is configured under the source router. 
 Source IP and Destination IP is given for Extended ACL 
 Each or any protocols could be blocked when Deny condition is 
applied
Configuring Extended ACL 
Router(config)#access-list ‘no:’ deny ‘service’ host ‘address’ host 
‘address’ 
Router(config)#access-list ‘no:’ permit ‘service’ host ‘address’ network 
‘address’ ‘mask’ 
For blocking a network- Router(config)#access-list ‘no:’ deny ‘service’ 
host ‘address’ network ‘address’ ‘mask’ 
For blocking TCP Router(config)#access-list ‘no:’ deny tcp host ‘address’ 
network ‘address’ ‘mask’ eq ‘port no:’
Named ACL 
 ACL’s with name are called Named ACLs. 
 Syntax:- For Standard 
Router(config)#ip access-list standard ‘access list name’ 
Router(config-std-nacl)#deny host ‘address’ 
Router(config-std-nacl)#permit any 
For Extended 
Router(config)#ip access-list extended ‘access list name’ 
Router(config-std-nacl)#deny ‘service’ host ‘address’ host ‘address’ 
Router(config-std-nacl)#permit any any
Filter Design 
Router(config-if)#ip access group ‘access list name:’ ‘in or out’ 
 To verify:- 
Router#show ip access-list
NAT (Network Address Translation) 
 This service converts Private IP address to Public IP address 
 To avoid IP wastage 
 Implements Network Security. 
 Types of NAT:- 
1. Static 
2. Dynamic 
3. NAT Overloading or PAT (Port Address Translation)
Static NAT 
 One to one mapping 
 Each private range IP is provided with each public range IP
Dynamic NAT 
 One to many mapping 
 A pool is created inside the NAT service. 
 In that it holds the information about public IP and its corresponding 
Private IP 
 Each private IP selects its own Public IP for communication with the 
help of Router
NAT overloading or PAT (Port Address 
Translation) 
 Each Private IP is Translated on one single Public IP. 
 Each one is Provided with Port Numbers in order to avoid conflict.
Static NAT Configuration 
 Router(config)#Int fast Ethernet 0/0 
 Router(config-if)# IP NAT inside 
 Router(config)#Int s 1/0 
 Router(config-if)# IP NAT outside 
 Router(config-if)# Exit 
 Router(config)# ip NAT inside source static 10.0.0.1 200.0.0.1 
 To see the table 
 Router(config)#show ip nat translations 
 Router(config)#show ip nat statistics
Dynamic NAT Configuration 
 Access list creation- for grouping the private IP’s in our network 
 Pool creation- Creating pool in which the translations are to be 
included. 
 Nat Activation 
Create an Access List 
Router(config)# Access-list 1 permit 10.0.0.0 0.255.255.255 
Configure NAT dynamic Pool 
Router(config)# IP NAT pool pool1 200.0.0.1 200.0.0.254 netmask 255.255.255.0 
Link Access List to Pool 
Router(config)# IP NAT inside source list 1 pool pool1
PAT Configuration 
Router#config t 
Router(config)# int e 0 
Router(config-if)# ip nat inside 
Router(config)# int s 0 
Router(config-if)# ip nat outside 
Router(config)#access-list 1 permit 10.0.0.0 0.255.255.255 
Router(config)#ip nat inside source list 1 interface s 0 overload 
To see host to host ping configure static or dynamic routing 
To check translation 
#show ip nat translations

More Related Content

PPTX
CCNA ppt Day 8
PPTX
CCNA ppt Day 9
PPTX
CCNA ppt Day 4
PPTX
CCNA pptCCNA ppt Day 6
PPTX
CCNA ppt Day 5
PPTX
Ccna PPT2
PPT
Access control list 2
PPT
CCNA Routing and Switching Lessons 11-12 - WAN Configuration - Eric Vanderburg
CCNA ppt Day 8
CCNA ppt Day 9
CCNA ppt Day 4
CCNA pptCCNA ppt Day 6
CCNA ppt Day 5
Ccna PPT2
Access control list 2
CCNA Routing and Switching Lessons 11-12 - WAN Configuration - Eric Vanderburg

What's hot (20)

PPTX
Лекц 15
PPTX
VIRTUAL LANS
PPTX
Router configuration in packet tracer
DOCX
Cisco router configuration tutorial
PDF
Router commands
PPTX
Cisco router basic
PDF
Ccna Commands In 10 Minutes
PPTX
Manage CISCO IOS
PPT
Dynamic routing OSPF 1
PPTX
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
PPTX
INTRODUCTION TO IOS AND CISCO ROUTERS
PDF
CCNA - Routing & Switching Commands
PPSX
Packet Tracer Tutorial # 2
PPTX
Router configuration in packet tracer
DOC
Cisco switch commands cheat sheet
PPT
Day 5.3 configuration of router
PPTX
Лекц 8
PPT
Switch configuration
PDF
Cisco commands List for Beginners (CCNA, CCNP)
PPT
Cisco ACL
Лекц 15
VIRTUAL LANS
Router configuration in packet tracer
Cisco router configuration tutorial
Router commands
Cisco router basic
Ccna Commands In 10 Minutes
Manage CISCO IOS
Dynamic routing OSPF 1
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
INTRODUCTION TO IOS AND CISCO ROUTERS
CCNA - Routing & Switching Commands
Packet Tracer Tutorial # 2
Router configuration in packet tracer
Cisco switch commands cheat sheet
Day 5.3 configuration of router
Лекц 8
Switch configuration
Cisco commands List for Beginners (CCNA, CCNP)
Cisco ACL
Ad

Viewers also liked (19)

DOCX
How to configure vlan, stp, dtp step by step guide
PPT
CCNA 2
DOC
Ccna 3 chapter 1 v4.0 answers 2011
PPTX
ppt on 6 weeks summer training
PDF
NAT Ccna
PPTX
CCNA ppt Day 3
PPT
Chapter10ccna
PDF
ccna project
PPTX
Ccna PPT
PPTX
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
PPT
CCNA Security 010-configuring cisco asa
PPT
CCNA Security 07-Securing the local area network
PPT
CCNA Security 05- securing the management plane
PPT
Network Security - Layer 2
PDF
CCNAv5 - S2: Chapter 9 Access Control Lists
PPT
CCNA Security 06- AAA
PPT
CCNA Security 03- network foundation protection
PPTX
Network address translation
How to configure vlan, stp, dtp step by step guide
CCNA 2
Ccna 3 chapter 1 v4.0 answers 2011
ppt on 6 weeks summer training
NAT Ccna
CCNA ppt Day 3
Chapter10ccna
ccna project
Ccna PPT
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
CCNA Security 010-configuring cisco asa
CCNA Security 07-Securing the local area network
CCNA Security 05- securing the management plane
Network Security - Layer 2
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNA Security 06- AAA
CCNA Security 03- network foundation protection
Network address translation
Ad

Similar to CCNA ppt Day 7 (20)

PPT
Chapter10ccna
PDF
Uccn1003 -may09_-_lect09_-_access_control_list_acl_
PDF
Uccn1003 -may09_-_lect09_-_access_control_list_acl_
PPT
Chapter10ccna
PPT
Ciso ospf
DOC
Cisco router command configuration overview
PPT
Ciso 4 ospf
DOCX
1 SEC450 ACL Tutorial This document highlights.docx
PPTX
Network Design on cisco packet tracer 6.0
PDF
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
PPT
In depth understanding network security
DOCX
Router Commands Overview
DOCX
Ccnacommand 140205001152-phpapp01
PDF
Basic cisco commands_by_marcus_nielson_2
PDF
Ciso commands
PDF
Ciso commands
PPTX
Lan Network with Redundancy.ppt
PPTX
Lan Network with Redundancy
DOCX
Student Name _________________________________ Date _____________SE.docx
PPTX
Cisco CCNA-Standard Access List
Chapter10ccna
Uccn1003 -may09_-_lect09_-_access_control_list_acl_
Uccn1003 -may09_-_lect09_-_access_control_list_acl_
Chapter10ccna
Ciso ospf
Cisco router command configuration overview
Ciso 4 ospf
1 SEC450 ACL Tutorial This document highlights.docx
Network Design on cisco packet tracer 6.0
Lab8 Controlling traffic using Extended ACL Objectives Per.pdf
In depth understanding network security
Router Commands Overview
Ccnacommand 140205001152-phpapp01
Basic cisco commands_by_marcus_nielson_2
Ciso commands
Ciso commands
Lan Network with Redundancy.ppt
Lan Network with Redundancy
Student Name _________________________________ Date _____________SE.docx
Cisco CCNA-Standard Access List

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
KodekX | Application Modernization Development
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Programs and apps: productivity, graphics, security and other tools
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Weekly Chronicles - August'25 Week I
KodekX | Application Modernization Development
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

CCNA ppt Day 7

  • 1. ACL (Access Control List)  ACLS’s are used for network security  Conditions for controlling traffics through router is called ACL.  Two conditions are:- 1. Permit 2. Deny  Two types are:- 1. Standard (1-99) 2. Extended (100-199)
  • 2. Standard ACL  Range 1-99  Standard ACL is configured under destination Router  Source IP is given for Standard ACL  Entire TCP/IP protocol stack is blocked when Deny condition is applied
  • 3. Configuring Standard ACL  Router(config)#access-list ‘no:’ deny host ‘destination address’  Router(config)#access-list ‘no:’ permit any
  • 4. Filter Design  Filter is designed at the interface which is nearest to destination in standard ACL  ACL will only be accessible if filter is designed.  Syntax:- Router(config-if)# ip access group ‘access list no:’ ‘in or out ‘
  • 5. Verifying ACL’s Router #show access-list To remove:- Router(config)#no access-list ‘no:’ Router(config-if)#no ip access group ‘access list no:’ ‘in or out’
  • 6. Extended ACL  Range- 100-199  Extended ACL is configured under the source router.  Source IP and Destination IP is given for Extended ACL  Each or any protocols could be blocked when Deny condition is applied
  • 7. Configuring Extended ACL Router(config)#access-list ‘no:’ deny ‘service’ host ‘address’ host ‘address’ Router(config)#access-list ‘no:’ permit ‘service’ host ‘address’ network ‘address’ ‘mask’ For blocking a network- Router(config)#access-list ‘no:’ deny ‘service’ host ‘address’ network ‘address’ ‘mask’ For blocking TCP Router(config)#access-list ‘no:’ deny tcp host ‘address’ network ‘address’ ‘mask’ eq ‘port no:’
  • 8. Named ACL  ACL’s with name are called Named ACLs.  Syntax:- For Standard Router(config)#ip access-list standard ‘access list name’ Router(config-std-nacl)#deny host ‘address’ Router(config-std-nacl)#permit any For Extended Router(config)#ip access-list extended ‘access list name’ Router(config-std-nacl)#deny ‘service’ host ‘address’ host ‘address’ Router(config-std-nacl)#permit any any
  • 9. Filter Design Router(config-if)#ip access group ‘access list name:’ ‘in or out’  To verify:- Router#show ip access-list
  • 10. NAT (Network Address Translation)  This service converts Private IP address to Public IP address  To avoid IP wastage  Implements Network Security.  Types of NAT:- 1. Static 2. Dynamic 3. NAT Overloading or PAT (Port Address Translation)
  • 11. Static NAT  One to one mapping  Each private range IP is provided with each public range IP
  • 12. Dynamic NAT  One to many mapping  A pool is created inside the NAT service.  In that it holds the information about public IP and its corresponding Private IP  Each private IP selects its own Public IP for communication with the help of Router
  • 13. NAT overloading or PAT (Port Address Translation)  Each Private IP is Translated on one single Public IP.  Each one is Provided with Port Numbers in order to avoid conflict.
  • 14. Static NAT Configuration  Router(config)#Int fast Ethernet 0/0  Router(config-if)# IP NAT inside  Router(config)#Int s 1/0  Router(config-if)# IP NAT outside  Router(config-if)# Exit  Router(config)# ip NAT inside source static 10.0.0.1 200.0.0.1  To see the table  Router(config)#show ip nat translations  Router(config)#show ip nat statistics
  • 15. Dynamic NAT Configuration  Access list creation- for grouping the private IP’s in our network  Pool creation- Creating pool in which the translations are to be included.  Nat Activation Create an Access List Router(config)# Access-list 1 permit 10.0.0.0 0.255.255.255 Configure NAT dynamic Pool Router(config)# IP NAT pool pool1 200.0.0.1 200.0.0.254 netmask 255.255.255.0 Link Access List to Pool Router(config)# IP NAT inside source list 1 pool pool1
  • 16. PAT Configuration Router#config t Router(config)# int e 0 Router(config-if)# ip nat inside Router(config)# int s 0 Router(config-if)# ip nat outside Router(config)#access-list 1 permit 10.0.0.0 0.255.255.255 Router(config)#ip nat inside source list 1 interface s 0 overload To see host to host ping configure static or dynamic routing To check translation #show ip nat translations