SlideShare a Scribd company logo
Configuring extended ACLs
 To be more precise when matching a certain network traffic,
extended access lists are used.
 With extended access lists, you can match more information, such
as:
• source and destination IP address
• type ofTCP/IP protocol (TCP, UDP, IP...)
• source and destination port numbers
Two steps are required to configure extended access lists:
1. configure extended access lists using the following command:
 R1(config) access list NUMBER permit|deny IP_PROTOCOL
SOURCE_ADDRESSWILDCARD_MASK
[PROTOCOL_INFORMATION] DESTINATION_ADDRESS
WILDCARD_MASK PROTOCOL_INFORMATION
2. apply an access list to an interface using the following command:
 R1(config) ip access-group ACL_NUMBER out
 NOTE - extended access lists numbers are in ranges from 100 to 199
and from 2000 to 2699
 To better understand the usefulness of extended access lists,
consider the following example.
 We want Users (network 10.0.0.0/24) to be able to access server S2
(IP address 192.168.0.1) and prevent them access to server S1 (IP
address 172.16.0.1/24).
 First, we need to configure an access list to permit Users the
access to server S2:
 Next, we need to deny Users the right to access S1 by using the
deny statement:
 Lastly, we need to apply the access list to the interface on R1:
 Here is another example of using extended access lists:
 Again, we have Users network (10.0.0.0/24). On the right side, we
have a server that serves as a web server, listening on port 80.
 We need to permit Users to access web sites on S1, but we also
need to deny other type of access, for example aTelnet access.
 First, we need to allow traffic from Users network to the web
server port of 80.We can do that by using the following command:
 By using the TCP keyword, we can filter packets by source and
destination ports.
 In the example above, we have permitted traffic originating from
the 10.0.0.0 network to the host 172.16.0.1 on port 80. The last
part of the statement, eq 80, specifies the destination port of 80.
 Now we need to disable telnet traffic from the network 10.0.0.0 to
172.16.0.1.To do that, we need to create a deny statement:
 Next, we need to apply our access list to the interface:
 NOTE – since at the end of each access list there is an explicit deny
all statement, the second ACL statement wasn't really necessary.
After applying an access list, every traffic not explicitly permitted will
be denied.

More Related Content

PPTX
Configuring RIPv2
PPSX
Packet Tracer Tutorial # 2
PDF
Pt using packettracer
DOC
Ccna 2 chapter 7 v4.0 answers 2011
PPTX
Cisco router basic
PPT
PPTX
Networking
PDF
ivesgimpaya3
Configuring RIPv2
Packet Tracer Tutorial # 2
Pt using packettracer
Ccna 2 chapter 7 v4.0 answers 2011
Cisco router basic
Networking
ivesgimpaya3

What's hot (20)

DOCX
Cisco packet tracer ripv1
PPTX
Rip 1 rip 2
DOCX
CCNA Packet Tracer 1.6.1
PDF
Ccna Commands In 10 Minutes
PDF
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)
PPT
DOC
Ccna 2 chapter 5 v4.0 answers 2011
PPTX
Router configuration in packet tracer
DOCX
Telnet configuration
PDF
Networking Puzzle
PDF
Day 3 pt_challenge
PPT
Access control list 2
PPTX
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
DOC
E routing final exam ccna 2 46
DOC
Ccna 2 chapter 2 v4.0 answers 2011
DOC
Routing information protocol & rip configuration
PDF
ivesgimpaya2
PPSX
Packet Tracer Tutorial # 1
PPTX
VIRTUAL LANS
DOC
Ccna 2 chapter 1 v4.0 answers 2011
Cisco packet tracer ripv1
Rip 1 rip 2
CCNA Packet Tracer 1.6.1
Ccna Commands In 10 Minutes
PBR-LB - Direct Server Return Load Balancing using Policy Based Routing (MEMO)
Ccna 2 chapter 5 v4.0 answers 2011
Router configuration in packet tracer
Telnet configuration
Networking Puzzle
Day 3 pt_challenge
Access control list 2
ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
E routing final exam ccna 2 46
Ccna 2 chapter 2 v4.0 answers 2011
Routing information protocol & rip configuration
ivesgimpaya2
Packet Tracer Tutorial # 1
VIRTUAL LANS
Ccna 2 chapter 1 v4.0 answers 2011
Ad

Similar to Configuring extended ACLs (20)

PPTX
Extended Access Lists
PPT
DOCX
1 SEC450 ACL Tutorial This document highlights.docx
DOCX
Student Name _________________________________ Date _____________SE.docx
PPTX
CCNA Access Control Lists
PDF
Modul 5 access control list
PPTX
Access Control List (ACL)
PPT
Access Control List 1
PPT
Chapter 08 - Acl
PPTX
ACCESS CONTROL LIST (Standard and Dynamic).pptx
PPTX
Basic ip traffic management with access control lists
PPT
CCNP 642-732 Training
DOCX
Standard & Extended ACL Configuration
PPT
Chapter10ccna
PPTX
Acl cisco
PDF
The Role of Access Control Lists (ACLs) in CCNA Networking.pdf
PPT
redes telematicas CISCO para ingenieros parte 2
PDF
Access Control List & its Types
PPTX
Acl cisco
Extended Access Lists
1 SEC450 ACL Tutorial This document highlights.docx
Student Name _________________________________ Date _____________SE.docx
CCNA Access Control Lists
Modul 5 access control list
Access Control List (ACL)
Access Control List 1
Chapter 08 - Acl
ACCESS CONTROL LIST (Standard and Dynamic).pptx
Basic ip traffic management with access control lists
CCNP 642-732 Training
Standard & Extended ACL Configuration
Chapter10ccna
Acl cisco
The Role of Access Control Lists (ACLs) in CCNA Networking.pdf
redes telematicas CISCO para ingenieros parte 2
Access Control List & its Types
Acl cisco
Ad

More from NetProtocol Xpert (20)

PPTX
Basic Cisco ASA 5506-x Configuration (Firepower)
PPTX
MPLS Layer 3 VPN
PPTX
Common Layer 2 Threats, Attacks & Mitigation
PPTX
Storm-Control
PPTX
Dynamic ARP Inspection (DAI)
PPTX
IP Source Guard
PPTX
DHCP Snooping
PPTX
Password Recovery
PPTX
Application & Data Center
PPTX
Cisco ISR 4351 Router
PPTX
Cisco ASR 1001-X Router
PPTX
Securing management, control & data plane
PPTX
Point to-point protocol (ppp), PAP & CHAP
PPTX
Avoid DNS lookup when mistyping a command
PPTX
TCLSH and Macro Ping Test on Cisco Routers and Switches
PPTX
Private VLANs
PPTX
MTU (maximum transmission unit) & MRU (maximum receive unit)
PPTX
OTV Configuration
PPTX
Cisco OTV 
PPTX
OTV(Overlay Transport Virtualization)
Basic Cisco ASA 5506-x Configuration (Firepower)
MPLS Layer 3 VPN
Common Layer 2 Threats, Attacks & Mitigation
Storm-Control
Dynamic ARP Inspection (DAI)
IP Source Guard
DHCP Snooping
Password Recovery
Application & Data Center
Cisco ISR 4351 Router
Cisco ASR 1001-X Router
Securing management, control & data plane
Point to-point protocol (ppp), PAP & CHAP
Avoid DNS lookup when mistyping a command
TCLSH and Macro Ping Test on Cisco Routers and Switches
Private VLANs
MTU (maximum transmission unit) & MRU (maximum receive unit)
OTV Configuration
Cisco OTV 
OTV(Overlay Transport Virtualization)

Recently uploaded (20)

PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
composite construction of structures.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
DOCX
573137875-Attendance-Management-System-original
PPTX
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
CH1 Production IntroductoryConcepts.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Arduino robotics embedded978-1-4302-3184-4.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
Operating System & Kernel Study Guide-1 - converted.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Internet of Things (IOT) - A guide to understanding
bas. eng. economics group 4 presentation 1.pptx
Foundation to blockchain - A guide to Blockchain Tech
CYBER-CRIMES AND SECURITY A guide to understanding
composite construction of structures.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Lesson 3_Tessellation.pptx finite Mathematics
573137875-Attendance-Management-System-original
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx

Configuring extended ACLs

  • 2.  To be more precise when matching a certain network traffic, extended access lists are used.  With extended access lists, you can match more information, such as: • source and destination IP address • type ofTCP/IP protocol (TCP, UDP, IP...) • source and destination port numbers
  • 3. Two steps are required to configure extended access lists: 1. configure extended access lists using the following command:  R1(config) access list NUMBER permit|deny IP_PROTOCOL SOURCE_ADDRESSWILDCARD_MASK [PROTOCOL_INFORMATION] DESTINATION_ADDRESS WILDCARD_MASK PROTOCOL_INFORMATION 2. apply an access list to an interface using the following command:  R1(config) ip access-group ACL_NUMBER out  NOTE - extended access lists numbers are in ranges from 100 to 199 and from 2000 to 2699
  • 4.  To better understand the usefulness of extended access lists, consider the following example.
  • 5.  We want Users (network 10.0.0.0/24) to be able to access server S2 (IP address 192.168.0.1) and prevent them access to server S1 (IP address 172.16.0.1/24).  First, we need to configure an access list to permit Users the access to server S2:
  • 6.  Next, we need to deny Users the right to access S1 by using the deny statement:  Lastly, we need to apply the access list to the interface on R1:
  • 7.  Here is another example of using extended access lists:
  • 8.  Again, we have Users network (10.0.0.0/24). On the right side, we have a server that serves as a web server, listening on port 80.  We need to permit Users to access web sites on S1, but we also need to deny other type of access, for example aTelnet access.  First, we need to allow traffic from Users network to the web server port of 80.We can do that by using the following command:
  • 9.  By using the TCP keyword, we can filter packets by source and destination ports.  In the example above, we have permitted traffic originating from the 10.0.0.0 network to the host 172.16.0.1 on port 80. The last part of the statement, eq 80, specifies the destination port of 80.  Now we need to disable telnet traffic from the network 10.0.0.0 to 172.16.0.1.To do that, we need to create a deny statement:
  • 10.  Next, we need to apply our access list to the interface:  NOTE – since at the end of each access list there is an explicit deny all statement, the second ACL statement wasn't really necessary. After applying an access list, every traffic not explicitly permitted will be denied.