SlideShare a Scribd company logo
IP Standard Access Configuration Sets parameters for this list entry IP standard access lists use 1 to 99 [access-list]  [ access-list-number ]   {  permit  |  deny  }   [source]   [ source-mask ] Router(config)#
Activates the list on an interface   IP Standard Access Configuration Sets parameters for this list entry IP standard access lists use 1 to 99 [access-list]  [access-list-number]   {  permit  |  deny  }   [source]   [source-mask] Router(config)# Router(config-if)# [ip access-group]   [access-list-number]   {  in  |  out  }
Allow more precise filtering conditions Check source and destination IP address Specify an optional IP protocol and port number Use access list number range 100 to 199 Extended IP Access Lists
Extended Access List Configuration Sets parameters for this list entry IP uses a list number in range 100 to 199 [access-list]   [access-list-number]   { permit | deny } [ protocol] [source]   [source-mask]   [destination]   [destination-mask]   [  operator operand  ]   [ established ] Router(config)#
Extended Access List Configuration IP uses a list number in range 100 to 199 Sets parameters for this list entry Activates the extended list on an interface Router(config-if)# [ip access-group]   [access-list-number]  [ {  in  |  out  } ] [access-list]   [access-list-number]   { permit | deny } [ protocol] [source]   [source-mask]   [destination]   [destination-mask]   [  operator operand  ]   [ established ] Router(config)#

More Related Content

PPTX
P3 2018 python_regexes
PDF
Puppet Language 4.0 - PuppetConf 2014
PPTX
P4 2018 io_functions
PDF
F# delight
PDF
Ip Access Lists
PDF
Using New Web APIs For Your Own Pleasure – How I Wrote New Features For My Vi...
PDF
FPBrno 2018-05-22: Benchmarking in elixir
DOCX
How to configure cisco router password
P3 2018 python_regexes
Puppet Language 4.0 - PuppetConf 2014
P4 2018 io_functions
F# delight
Ip Access Lists
Using New Web APIs For Your Own Pleasure – How I Wrote New Features For My Vi...
FPBrno 2018-05-22: Benchmarking in elixir
How to configure cisco router password

What's hot (19)

ODP
Very basic functional design patterns
PPTX
python chapter 1
PPTX
Python chapter 2
PPTX
Modul dhcp server menggunakan mikrotik os
PDF
Ruby to Elixir - what's great and what you might miss
PDF
Elixir & Phoenix - fast, concurrent and explicit
PDF
The Ring programming language version 1.5.3 book - Part 19 of 194
KEY
Getting started with Pod::Weaver
PPT
Python Training v2
PPTX
Pa1 session 3_slides
PDF
Introducción rápida a SQL
PDF
The Magic Of Elixir
KEY
Programming Haskell Chapter8
PDF
Stop Guessing and Start Measuring - Benchmarking in Practice (Lambdadays)
PPT
Ciso ospf
PDF
The bryant advantage 150 commands
PDF
Ios i pv4_access_lists
PPT
Ciso 4 ospf
Very basic functional design patterns
python chapter 1
Python chapter 2
Modul dhcp server menggunakan mikrotik os
Ruby to Elixir - what's great and what you might miss
Elixir & Phoenix - fast, concurrent and explicit
The Ring programming language version 1.5.3 book - Part 19 of 194
Getting started with Pod::Weaver
Python Training v2
Pa1 session 3_slides
Introducción rápida a SQL
The Magic Of Elixir
Programming Haskell Chapter8
Stop Guessing and Start Measuring - Benchmarking in Practice (Lambdadays)
Ciso ospf
The bryant advantage 150 commands
Ios i pv4_access_lists
Ciso 4 ospf
Ad

Similar to Configuraton of standard access list and extented access lis (20)

PPT
Cisco ACL
PPT
20 access lists[1]
PDF
Anilnet
PPT
Chapter10ccna
PPT
Chapter10ccna
PPTX
Acl cisco
PPT
PDF
Ip Access Lists
PDF
Access Control List & its Types
PPTX
Acl cisco
PPT
Chapter10ccna
PDF
Uccn1003 -may09_-_lect09_-_access_control_list_acl_
PDF
Uccn1003 -may09_-_lect09_-_access_control_list_acl_
PDF
Access list-cheatsheet
PPT
Chapter 10
PPT
Chapter 10
PPTX
Basic ip traffic management with access control lists
PPT
CCNA Access Lists
PPT
CCNA Routing and Switching Lesson 10 - Access Lists - Eric Vanderburg
PPT
Cisco ACL
20 access lists[1]
Anilnet
Chapter10ccna
Chapter10ccna
Acl cisco
Ip Access Lists
Access Control List & its Types
Acl cisco
Chapter10ccna
Uccn1003 -may09_-_lect09_-_access_control_list_acl_
Uccn1003 -may09_-_lect09_-_access_control_list_acl_
Access list-cheatsheet
Chapter 10
Chapter 10
Basic ip traffic management with access control lists
CCNA Access Lists
CCNA Routing and Switching Lesson 10 - Access Lists - Eric Vanderburg
Ad

More from Asif (16)

PPT
Module 1
PPT
14 module
PPT
13 module isdn bri call
PPT
12 module
PPT
11 module configuring novell ipx
PPT
10 module
PPT
09 module determinig ip routes
PPT
08 module interconnecting cisco router
PPT
07 module extending switched netwroks with virtual la ns
PPT
06 module catalyst 1900 switch operations
PPT
05 module managing your network enviornment
PPT
04 module operating & configuring ios
PPT
02 module internet concept overview
PPT
Lecture 20 presentation
PPT
Ip addresses
PPT
02 module internet concept overview
Module 1
14 module
13 module isdn bri call
12 module
11 module configuring novell ipx
10 module
09 module determinig ip routes
08 module interconnecting cisco router
07 module extending switched netwroks with virtual la ns
06 module catalyst 1900 switch operations
05 module managing your network enviornment
04 module operating & configuring ios
02 module internet concept overview
Lecture 20 presentation
Ip addresses
02 module internet concept overview

Configuraton of standard access list and extented access lis

  • 1. IP Standard Access Configuration Sets parameters for this list entry IP standard access lists use 1 to 99 [access-list] [ access-list-number ] { permit | deny } [source] [ source-mask ] Router(config)#
  • 2. Activates the list on an interface IP Standard Access Configuration Sets parameters for this list entry IP standard access lists use 1 to 99 [access-list] [access-list-number] { permit | deny } [source] [source-mask] Router(config)# Router(config-if)# [ip access-group] [access-list-number] { in | out }
  • 3. Allow more precise filtering conditions Check source and destination IP address Specify an optional IP protocol and port number Use access list number range 100 to 199 Extended IP Access Lists
  • 4. Extended Access List Configuration Sets parameters for this list entry IP uses a list number in range 100 to 199 [access-list] [access-list-number] { permit | deny } [ protocol] [source] [source-mask] [destination] [destination-mask] [ operator operand ] [ established ] Router(config)#
  • 5. Extended Access List Configuration IP uses a list number in range 100 to 199 Sets parameters for this list entry Activates the extended list on an interface Router(config-if)# [ip access-group] [access-list-number] [ { in | out } ] [access-list] [access-list-number] { permit | deny } [ protocol] [source] [source-mask] [destination] [destination-mask] [ operator operand ] [ established ] Router(config)#

Editor's Notes

  • #2: access-list command creates an entry in a standard traffic filter list. access-list field descriptions: list—identifies the list to which the entry belongs; a number from 1 to 99. address—source IP address. wildcard-mask—identifies which bits in the address field are matched. It has a 1 in positions indicating “don't care” bits, and a 0 in any position which is to be strictly followed. ip access-group command links an existing access list to an outgoing interface. Only one access list per port per protocol is allowed. ip access-group field descriptions: list—number of the access-list to be linked to this interface.
  • #3: access-list command creates an entry in a standard traffic filter list. access-list field descriptions: list—identifies the list to which the entry belongs; a number from 1 to 99. address—source IP address. wildcard-mask—identifies which bits in the address field are matched. It has a 1 in positions indicating “don't care” bits, and a 0 in any position which is to be strictly followed. ip access-group command links an existing access list to an outgoing interface. Only one access list per port per protocol is allowed. ip access-group field descriptions: list—number of the access-list to be linked to this interface.
  • #5: access-list command creates an entry in complex traffic filter list. access-list field descriptions: list—a number between 100 and 199 protocol—ip, tcp, udp, icmp source—ip address source-mask—wildcard-mask of address bits that must match. 0s indicate bits that must match, 1s are "don't care". destination—ip address destination-mask—wildcard-mask operator—lt, gt, eq, neq operand—a port number
  • #6: access-list command creates an entry in complex traffic filter list. access-list field descriptions: list—a number between 100 and 199 protocol—ip, tcp, udp, icmp source—ip address source-mask—wildcard-mask of address bits that must match. 0s indicate bits that must match, 1s are "don't care". destination—ip address destination-mask—wildcard-mask operator—lt, gt, eq, neq operand—a port number