SlideShare a Scribd company logo
Module 5: ACLs for IPv4
Configuration
Enterprise Networking, Security,
and Automation v7.0 (ENSA)
2
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Objectives
Module Title: ACLs for IPv4 Configuration
Module Objective: Implement IPv4 ACLs to filter traffic and secure administrative access.
Topic Title Topic Objective
Configure Standard IPv4 ACLs Configure standard IPv4 ACLs to filter traffic to meet
networking requirements.
Modify IPv4 ACLs Use sequence numbers to edit existing standard IPv4
ACLs.
Secure VTY Ports with a Standard IPv4 ACL Configure a standard ACL to secure VTY access.
Configure Extended IPv4 ACLs Configure extended IPv4 ACLs to filter traffic
according to networking requirements.
3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.1 Configure Standard IPv4
ACLs
4
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Standard IPv4 ACLs
Create an ACL
All access control lists (ACLs) must be planned. When configuring a complex ACL, it is
suggested that you:
• Use a text editor and write out the specifics of the policy to be implemented.
• Add the IOS configuration commands to accomplish those tasks.
• Include remarks to document the ACL.
• Copy and paste the commands onto the device.
• Always thoroughly test an ACL to ensure that it correctly applies the desired policy.
5
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Standard IPv4 ACLs
Numbered Standard IPv4 ACL Syntax
To create a numbered standard ACL, use the access-list command.
Parameter Description
access-list-number Number range is 1 to 99 or 1300 to 1999
deny Denies access if the condition is matched
permit Permits access if the condition is matched
remark text (Optional) text entry for documentation purposes
source Identifies the source network or host address to filter
source-wildcard (Optional) 32-bit wildcard mask that is applied to the source
log (Optional) Generates and sends an informational message when the ACE is matched
Note: Use the no access-list access-list-number global configuration command to remove a numbered standard ACL.
6
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Standard IPv4 ACLs
Named Standard IPv4 ACL Syntax
To create a named standard ACL, use the ip access-list standard command.
• ACL names are alphanumeric, case sensitive, and must be unique.
• Capitalizing ACL names is not required but makes them stand out when viewing the
running-config output.
7
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Standard IPv4 ACLs
Apply a Standard IPv4 ACL
After a standard IPv4 ACL is configured, it must be linked to an interface or feature.
• The ip access-group command is used to bind a numbered or named standard IPv4
ACL to an interface.
• To remove an ACL from an interface, first enter the no ip access-group interface
configuration command.
8
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Standard IPv4 ACLs
Numbered Standard ACL Example
The example ACL
permits traffic
from host
192.168.10.10
and all hosts on
the
192.168.20.0/24
network out
interface serial
0/1/0 on router
R1.
9
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Standard IPv4 ACLs
Numbered Standard ACL Example (Cont.)
• Use the show running-config command to review the ACL in the configuration.
• Use the show ip interface command to verify the ACL is applied to the interface.
10
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Standard IPv4 ACLs
Named Standard ACL Example
The example ACL permits traffic
from host 192.168.10.10 and all
hosts on the 192.168.20.0/24
network out interface serial 0/1/0 on
router R1.
11
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Standard IPv4 ACLs
Named Standard ACL Example (Cont.)
• Use the show access-list
command to review the ACL
in the configuration.
• Use the show ip interface
command to verify the ACL is
applied to the interface.
12
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Standard IPv4 ACLs
Packet Tracer – Configure Numbered Standard IPv4 ACLs
In this Packet Tracer, you will complete the following objectives:
• Plan an ACL Implementation.
• Configure, Apply, and Verify a Standard ACL.
13
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Standard IPv4 ACLs
Packet Tracer – Configure Named Standard IPv4 ACLs
In this Packet Tracer, you will complete the following objectives:
• Configure and Apply a Named Standard ACL.
• Verify the ACL Implementation.
14
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.2 Modify IPv4 ACLs
15
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modify IPv4 ACLs
Two Methods to Modify an ACL
After an ACL is configured, it may need to be modified. ACLs with multiple ACEs can be
complex to configure. Sometimes the configured ACE does not yield the expected
behaviors.
There are two methods to use when modifying an ACL:
• Use a text editor.
• Use sequence numbers.
16
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modify IPv4 ACLs
Text Editor Method
ACLs with multiple ACEs should be created in a text editor. This allows you to plan the
required ACEs, create the ACL, and then paste it into the router interface. It also simplifies
the tasks to edit and fix an ACL.
To correct an error in an ACL:
• Copy the ACL from the running configuration and paste it into the text editor.
• Make the necessary edits or changes.
• Remove the previously configured ACL on the router.
• Copy and paste the edited ACL back to the router.
17
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modify IPv4 ACLs
Sequence Number Method
An ACL ACE can be deleted or added using
the ACL sequence numbers.
• Use the ip access-list standard
command to edit an ACL.
• Statements cannot be overwritten using
an existing sequence number. The
current statement must be deleted first
with the no 10 command. Then the
correct ACE can be added using
sequence number.
18
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modify IPv4 ACLs
Modify a Named ACL Example
Named ACLs can also use sequence numbers to delete and add ACEs. In the example an
ACE is added to deny hosts 192.168.10.11.
19
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modify IPv4 ACLs
ACL Statistics
The show access-lists command in the example shows statistics for each statement that
has been matched.
• The deny ACE has been matched 20 times and the permit ACE has been matched 64 times.
• Note that the implied deny any statement does not display any statistics. To track how many
implicit denied packets have been matched, you must manually configure the deny any command.
• Use the clear access-list counters command to clear the ACL statistics.
20
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Modify IPv4 ACLs
Packet Tracer – Configure and Modify Standard IPv4 ACLs
In this Packet Tracer, you will complete the following objectives:
• Configure Devices and Verify Connectivity.
• Configure and Verify Standard Numbered and Named ACLs.
• Modify a Standard ACL.
21
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.3 Secure VTY Ports with a
Standard IPv4 ACL
22
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Secure VTY Ports with a Standard IPv4 ACL
The access-class Command
A standard ACL can secure remote administrative access to a device using the vty lines
by implementing the following two steps:
• Create an ACL to identify which administrative hosts should be allowed remote access.
• Apply the ACL to incoming traffic on the vty lines.
23
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Secure VTY Ports with a Standard IPv4 ACL
Secure VTY Access Example
This example demonstrates how to configure an ACL to filter vty traffic.
• First, a local database entry for a user ADMIN and password class is configured.
• The vty lines on R1 are configured to use the local database for authentication, permit
SSH traffic, and use the ADMIN-HOST ACL to restrict traffic.
24
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Secure VTY Ports with a Standard IPv4 ACL
Verify the VTY Port is Secured
After an ACL to restrict access to the vty lines is configured, it is important to verify it
works as expected.
To verify the ACL statistics, issue the show access-lists command.
• The match in the permit line of the output is a result of a successful SSH connection by
host with IP address 192.168.10.10.
• The match in the deny statement is due to the failed attempt to create a SSH
connection from a device on another network.
25
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.4 Configure Extended IPv4
ACLs
26
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Extended ACLs
Extended ACLs provide a greater degree of control. They can filter on source
address, destination address, protocol (i.e., IP, TCP, UDP, ICMP), and port
number.
Extended ACLs can be created as:
• Numbered Extended ACL - Created using the access-list access-list-number global
configuration command.
• Named Extended ACL - Created using the ip access-list extended access-list-name.
27
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Protocols and Ports
Extended ACLs
can filter on
internet
protocols and
ports. Use
the ? to get
help when
entering a
complex ACE.
The four
highlighted
protocols are
the most
popular
options.
Protocol Options
28
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Protocols and Ports (Cont.)
Selecting a
protocol
influences port
options. Many
TCP port
options are
available, as
shown in the
output.
29
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Protocols and Port Numbers Configuration Examples
Extended ACLs can filter on different port number and port name options.
This example configures an extended ACL 100 to filter HTTP traffic. The first ACE uses
the www port name. The second ACE uses the port number 80. Both ACEs achieve
exactly the same result.
Configuring the port number is required when there is not a specific protocol name listed
such as SSH (port number 22) or an HTTPS (port number 443), as shown in the next
example.
30
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Apply a Numbered Extended IPv4 ACL
In this example, the ACL permits both HTTP and HTTPS traffic from the 192.168.10.0
network to go to any destination.
Extended ACLs can be applied in various locations. However, they are commonly applied
close to the source. Here ACL 110 is applied inbound on the R1 G0/0/0 interface.
31
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
TCP Established Extended ACL
TCP can also perform basic stateful firewall services using the TCP established keyword.
• The established keyword enables inside traffic to exit the inside private network and
permits the returning reply traffic to enter the inside private network.
• TCP traffic generated by an outside host and attempting to communicate with an inside
host is denied.
32
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
TCP Established Extended ACL (Cont.)
• ACL 120 is configured to only permit returning web traffic to the inside hosts. The ACL
is then applied outbound on the R1 G0/0/0 interface.
• The show access-lists command shows that inside hosts are accessing the secure
web resources from the internet.
Note: A match occurs if the returning TCP segment has the ACK or reset (RST) flag bits set,
indicating that the packet belongs to an existing connection.
33
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Named Extended IPv4 ACL Syntax
Naming an ACL makes it easier to understand its function. To create a named extended
ACL, use the ip access-list extended configuration command.
In the example, a named extended ACL called NO-FTP-ACCESS is created and the
prompt changed to named extended ACL configuration mode. ACE statements are
entered in the named extended ACL sub configuration mode.
34
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Named Extended IPv4 ACL Example
The topology below is used to demonstrate configuring and applying two named extended
IPv4 ACLs to an interface:
• SURFING - This will permit inside HTTP and HTTPS traffic to exit to the internet.
• BROWSING - This will only permit returning web traffic to the inside hosts while all other traffic
exiting the R1 G0/0/0 interface is implicitly denied.
35
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Named Extended IPv4 ACL Example (Cont.)
• The SURFING ACL permits
HTTP and HTTPS traffic
from inside users to exit the
G0/0/1 interface connected
to the internet. Web traffic
returning from the internet is
permitted back into the
inside private network by
the BROWSING ACL.
• The SURFING ACL is
applied inbound and the
BROWSING ACL is applied
outbound on the R1 G0/0/0
interface.
36
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Named Extended IPv4 ACL Example (Cont.)
The show access-lists command is used to verify the ACL statistics. Notice that the
permit secure HTTPS counters (i.e., eq 443) in the SURFING ACL and the return
established counters in the BROWSING ACL have increased.
37
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Edit Extended ACLs
An extended ACL can be edited using a text editor when many changes are required. Or,
if the edit applies to one or two ACEs, then sequence numbers can be used.
Example:
• The ACE sequence number 10 in the SURFING ACL has an incorrect source IP
networks address.
38
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Edit Extended ACLs (Cont.)
• To correct this error the original statement is removed with the no sequence_#
command and the corrected statement is added replacing the original statement.
• The show access-lists command output verifies the configuration change.
39
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Another Extended IPv4 ACL Example
Two named extended ACLs will be created:
• PERMIT-PC1 - This will only permit PC1 TCP access to the internet and deny all other hosts in the
private network.
• REPLY-PC1 - This will only permit specified returning TCP traffic to PC1 implicitly deny all other
traffic.
40
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Another Extended IPv4 ACL Example (Cont.)
• The PERMIT-PC1 ACL
permits PC1 (192.168.10.10)
TCP access to the FTP, SSH,
Telnet, DNS , HTTP, and
HTTPS traffic.
• The REPLY-PC1 ACL will
permit return traffic to PC1.
• The PERMIT-PC1 ACL is
applied inbound and the
REPLY-PC1 ACL applied
outbound on the R1 G0/0/0
interface.
41
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Verify Extended ACLs
The show ip interface command is used
to verify the ACL on the interface and the
direction in which it was applied.
42
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Verify Extended ACLs (Cont.)
The show access-lists command can be used to confirm that the ACLs work as
expected. The command displays statistic counters that increase whenever an ACE is
matched.
Note: Traffic must be generated to verify the operation of the ACL.
43
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Verify Extended ACLs (Cont.)
The show running-config command can be used to validate what was configured. The
command also displays configured remarks.
44
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Packet Tracer – Configure Extended IPv4 ACLs - Scenario 1
In this Packet Tracer, you will complete the following objectives:
• Configure, Apply, and Verify an Extended Numbered IPv4 ACL.
• Configure, Apply, and Verify an Extended Named IPv4 ACL.
45
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Configure Extended IPv4 ACLs
Packet Tracer – Configure Extended IPv4 ACLs - Scenario 2
In this Packet Tracer, you will complete the following objectives:
• Configure a Named Extended IPv4 ACL.
• Apply and Verify the Extended IPv4 ACL.
46
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5.5 Module Practice and Quiz
47
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Practice and Quiz
Packet Tracer – IPv4 ACL Implementation Challenge
In this Packet Tracer, you will complete the following objectives:
• Configure a router with standard named ACLs
• Configure a router with extended named ACLs
• Configure a router with extended ACLs to meet specific communication requirements
• Configure an ACL to control access to network device terminal lines
• Configure the appropriate router interfaces with ACLs in the appropriate direction
• Verify the operation of the configured ACLs
48
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Practice and Quiz
Packet Tracer – Configure and Verify Extended IPv4 ACLs –
Physical Mode
Lab – Configure and Verify Extended IPv4 ACLs
In this Packet Tracer Physical Mode activity, you will complete the following objectives:
• Build the Network and Configure Basic Device Settings
• Configure VLANs on the Switches
• Configure Trunking
• Configure Routing
• Configure Remote Access
• Verify Connectivity
• Configure and Verify Extended Access Control Lists
In this Lab, you will complete the following objectives:
• Build the Network and Configure Basic Device Settings
• Configure and Verify Extended IPv4 ACLs
49
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Practice and Quiz
What did I learn in this module?
• To create a numbered standard ACL, use the use the ip access-list standard access-list-
name global configuration command.
• Use the no access-list access-list-number global configuration command to remove a
numbered standard ACL.
• Use the show ip interface command to verify if an interface has an ACL applied to it.
• To create a named standard ACL, use the ip access-list standard access-list-name global
configuration command.
• Use the no ip access-list standard access-list-name global configuration command to
remove a named standard IPv4 ACL.
• To bind a numbered or named standard IPv4 ACL to an interface, use the ip access-group
{access-list-number | access-list-name} { in | out } global configuration command.
• To remove an ACL from an interface, first enter the no ip access-group interface
configuration command.
• To remove the ACL from the router, use the no access-list global configuration command.
50
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Module Practice and Quiz
What did I learn in this module?
• Extended ACLs can filter on source address, destination address, protocol (i.e., IP, TCP, UDP,
ICMP), and port number.
• To create a numbered extended ACL, use the Router(config)# access-list access-list-number
{deny | permit | remark text} protocol source source-wildcard [operator [port]] destination
destination-wildcard [operator [port]] [established] [log] global configuration command.
• ALCs can also perform basic stateful firewall services using the TCP established keyword.
• The show ip interface command is used to verify the ACL on the interface and the direction
in which it was applied.
• To modify an ACL, use a text editor or use sequence numbers.
• An ACL ACE can also be deleted or added using the ACL sequence numbers.
• Sequence numbers are automatically assigned when an ACE is entered.
ENSA_Module_5.pptx_ACL_for_APV4_configuration

More Related Content

PPTX
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
PPTX
CNv6_instructorPPT_Chapter4.pptx
PPTX
CCNA4 Verson6 Chapter4
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 9
PDF
CCNAv5 - S2: Chapter 9 Access Control Lists
PPTX
Chapter 20 : access control lists
PPTX
2. ACL2. ACL2. ACL2. ACL2. ACL2. ACL.pptx
PPTX
2. ACL2. ACL2. ACL2. ACL2. ACL2. ACL.pptx
CCNA (R & S) Module 02 - Connecting Networks - Chapter 4
CNv6_instructorPPT_Chapter4.pptx
CCNA4 Verson6 Chapter4
CCNA 2 Routing and Switching v5.0 Chapter 9
CCNAv5 - S2: Chapter 9 Access Control Lists
Chapter 20 : access control lists
2. ACL2. ACL2. ACL2. ACL2. ACL2. ACL.pptx
2. ACL2. ACL2. ACL2. ACL2. ACL2. ACL.pptx

Similar to ENSA_Module_5.pptx_ACL_for_APV4_configuration (20)

PPTX
CCNA_RSE_Chp7.pptx
PPTX
ENSA_Module_4.pptx_ACL_concepts_for_network_security
PPTX
ENSA_Module_4.pptx
PPTX
CCNA3 Verson6 Chapter7
PPT
redes telematicas CISCO para ingenieros parte 2
PPTX
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
PDF
Ccna rse chp7 Access Control List (ACL)
PDF
Ch4-Implementing Firewall Technologies.pdf
PPT
1 Routing Concepts-students to download only.ppt
PPT
Chapter 4 overview
PPTX
IPv6 ACL
PPT
CCNA Discovery 3 - Chapter 8
PPT
Chapter 2 - Access Control Lists (ACLs).ppt
PPT
CCNA Exploration 4 - Chapter 5
PPT
Access control list configuration in cisco routers.ppt
PPTX
CCNA2 Verson6 Chapter1
PPTX
CCNA 2 Routing and Switching v5.0 Chapter 4
PPTX
Access Control List (ACL)
PDF
5 ip security aaa and acl
PPTX
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA_RSE_Chp7.pptx
ENSA_Module_4.pptx_ACL_concepts_for_network_security
ENSA_Module_4.pptx
CCNA3 Verson6 Chapter7
redes telematicas CISCO para ingenieros parte 2
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 7
Ccna rse chp7 Access Control List (ACL)
Ch4-Implementing Firewall Technologies.pdf
1 Routing Concepts-students to download only.ppt
Chapter 4 overview
IPv6 ACL
CCNA Discovery 3 - Chapter 8
Chapter 2 - Access Control Lists (ACLs).ppt
CCNA Exploration 4 - Chapter 5
Access control list configuration in cisco routers.ppt
CCNA2 Verson6 Chapter1
CCNA 2 Routing and Switching v5.0 Chapter 4
Access Control List (ACL)
5 ip security aaa and acl
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
Ad

Recently uploaded (20)

PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
composite construction of structures.pdf
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
Construction Project Organization Group 2.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Digital Logic Computer Design lecture notes
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
PPT on Performance Review to get promotions
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Well-logging-methods_new................
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Automation-in-Manufacturing-Chapter-Introduction.pdf
OOP with Java - Java Introduction (Basics)
CH1 Production IntroductoryConcepts.pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
composite construction of structures.pdf
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
573137875-Attendance-Management-System-original
Construction Project Organization Group 2.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Digital Logic Computer Design lecture notes
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPT on Performance Review to get promotions
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Lecture Notes Electrical Wiring System Components
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Well-logging-methods_new................
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Ad

ENSA_Module_5.pptx_ACL_for_APV4_configuration

  • 1. Module 5: ACLs for IPv4 Configuration Enterprise Networking, Security, and Automation v7.0 (ENSA)
  • 2. 2 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Objectives Module Title: ACLs for IPv4 Configuration Module Objective: Implement IPv4 ACLs to filter traffic and secure administrative access. Topic Title Topic Objective Configure Standard IPv4 ACLs Configure standard IPv4 ACLs to filter traffic to meet networking requirements. Modify IPv4 ACLs Use sequence numbers to edit existing standard IPv4 ACLs. Secure VTY Ports with a Standard IPv4 ACL Configure a standard ACL to secure VTY access. Configure Extended IPv4 ACLs Configure extended IPv4 ACLs to filter traffic according to networking requirements.
  • 3. 3 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.1 Configure Standard IPv4 ACLs
  • 4. 4 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Standard IPv4 ACLs Create an ACL All access control lists (ACLs) must be planned. When configuring a complex ACL, it is suggested that you: • Use a text editor and write out the specifics of the policy to be implemented. • Add the IOS configuration commands to accomplish those tasks. • Include remarks to document the ACL. • Copy and paste the commands onto the device. • Always thoroughly test an ACL to ensure that it correctly applies the desired policy.
  • 5. 5 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Standard IPv4 ACLs Numbered Standard IPv4 ACL Syntax To create a numbered standard ACL, use the access-list command. Parameter Description access-list-number Number range is 1 to 99 or 1300 to 1999 deny Denies access if the condition is matched permit Permits access if the condition is matched remark text (Optional) text entry for documentation purposes source Identifies the source network or host address to filter source-wildcard (Optional) 32-bit wildcard mask that is applied to the source log (Optional) Generates and sends an informational message when the ACE is matched Note: Use the no access-list access-list-number global configuration command to remove a numbered standard ACL.
  • 6. 6 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Standard IPv4 ACLs Named Standard IPv4 ACL Syntax To create a named standard ACL, use the ip access-list standard command. • ACL names are alphanumeric, case sensitive, and must be unique. • Capitalizing ACL names is not required but makes them stand out when viewing the running-config output.
  • 7. 7 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Standard IPv4 ACLs Apply a Standard IPv4 ACL After a standard IPv4 ACL is configured, it must be linked to an interface or feature. • The ip access-group command is used to bind a numbered or named standard IPv4 ACL to an interface. • To remove an ACL from an interface, first enter the no ip access-group interface configuration command.
  • 8. 8 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Standard IPv4 ACLs Numbered Standard ACL Example The example ACL permits traffic from host 192.168.10.10 and all hosts on the 192.168.20.0/24 network out interface serial 0/1/0 on router R1.
  • 9. 9 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Standard IPv4 ACLs Numbered Standard ACL Example (Cont.) • Use the show running-config command to review the ACL in the configuration. • Use the show ip interface command to verify the ACL is applied to the interface.
  • 10. 10 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Standard IPv4 ACLs Named Standard ACL Example The example ACL permits traffic from host 192.168.10.10 and all hosts on the 192.168.20.0/24 network out interface serial 0/1/0 on router R1.
  • 11. 11 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Standard IPv4 ACLs Named Standard ACL Example (Cont.) • Use the show access-list command to review the ACL in the configuration. • Use the show ip interface command to verify the ACL is applied to the interface.
  • 12. 12 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Standard IPv4 ACLs Packet Tracer – Configure Numbered Standard IPv4 ACLs In this Packet Tracer, you will complete the following objectives: • Plan an ACL Implementation. • Configure, Apply, and Verify a Standard ACL.
  • 13. 13 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Standard IPv4 ACLs Packet Tracer – Configure Named Standard IPv4 ACLs In this Packet Tracer, you will complete the following objectives: • Configure and Apply a Named Standard ACL. • Verify the ACL Implementation.
  • 14. 14 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.2 Modify IPv4 ACLs
  • 15. 15 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modify IPv4 ACLs Two Methods to Modify an ACL After an ACL is configured, it may need to be modified. ACLs with multiple ACEs can be complex to configure. Sometimes the configured ACE does not yield the expected behaviors. There are two methods to use when modifying an ACL: • Use a text editor. • Use sequence numbers.
  • 16. 16 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modify IPv4 ACLs Text Editor Method ACLs with multiple ACEs should be created in a text editor. This allows you to plan the required ACEs, create the ACL, and then paste it into the router interface. It also simplifies the tasks to edit and fix an ACL. To correct an error in an ACL: • Copy the ACL from the running configuration and paste it into the text editor. • Make the necessary edits or changes. • Remove the previously configured ACL on the router. • Copy and paste the edited ACL back to the router.
  • 17. 17 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modify IPv4 ACLs Sequence Number Method An ACL ACE can be deleted or added using the ACL sequence numbers. • Use the ip access-list standard command to edit an ACL. • Statements cannot be overwritten using an existing sequence number. The current statement must be deleted first with the no 10 command. Then the correct ACE can be added using sequence number.
  • 18. 18 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modify IPv4 ACLs Modify a Named ACL Example Named ACLs can also use sequence numbers to delete and add ACEs. In the example an ACE is added to deny hosts 192.168.10.11.
  • 19. 19 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modify IPv4 ACLs ACL Statistics The show access-lists command in the example shows statistics for each statement that has been matched. • The deny ACE has been matched 20 times and the permit ACE has been matched 64 times. • Note that the implied deny any statement does not display any statistics. To track how many implicit denied packets have been matched, you must manually configure the deny any command. • Use the clear access-list counters command to clear the ACL statistics.
  • 20. 20 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Modify IPv4 ACLs Packet Tracer – Configure and Modify Standard IPv4 ACLs In this Packet Tracer, you will complete the following objectives: • Configure Devices and Verify Connectivity. • Configure and Verify Standard Numbered and Named ACLs. • Modify a Standard ACL.
  • 21. 21 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.3 Secure VTY Ports with a Standard IPv4 ACL
  • 22. 22 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Secure VTY Ports with a Standard IPv4 ACL The access-class Command A standard ACL can secure remote administrative access to a device using the vty lines by implementing the following two steps: • Create an ACL to identify which administrative hosts should be allowed remote access. • Apply the ACL to incoming traffic on the vty lines.
  • 23. 23 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Secure VTY Ports with a Standard IPv4 ACL Secure VTY Access Example This example demonstrates how to configure an ACL to filter vty traffic. • First, a local database entry for a user ADMIN and password class is configured. • The vty lines on R1 are configured to use the local database for authentication, permit SSH traffic, and use the ADMIN-HOST ACL to restrict traffic.
  • 24. 24 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Secure VTY Ports with a Standard IPv4 ACL Verify the VTY Port is Secured After an ACL to restrict access to the vty lines is configured, it is important to verify it works as expected. To verify the ACL statistics, issue the show access-lists command. • The match in the permit line of the output is a result of a successful SSH connection by host with IP address 192.168.10.10. • The match in the deny statement is due to the failed attempt to create a SSH connection from a device on another network.
  • 25. 25 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.4 Configure Extended IPv4 ACLs
  • 26. 26 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Extended ACLs Extended ACLs provide a greater degree of control. They can filter on source address, destination address, protocol (i.e., IP, TCP, UDP, ICMP), and port number. Extended ACLs can be created as: • Numbered Extended ACL - Created using the access-list access-list-number global configuration command. • Named Extended ACL - Created using the ip access-list extended access-list-name.
  • 27. 27 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Protocols and Ports Extended ACLs can filter on internet protocols and ports. Use the ? to get help when entering a complex ACE. The four highlighted protocols are the most popular options. Protocol Options
  • 28. 28 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Protocols and Ports (Cont.) Selecting a protocol influences port options. Many TCP port options are available, as shown in the output.
  • 29. 29 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Protocols and Port Numbers Configuration Examples Extended ACLs can filter on different port number and port name options. This example configures an extended ACL 100 to filter HTTP traffic. The first ACE uses the www port name. The second ACE uses the port number 80. Both ACEs achieve exactly the same result. Configuring the port number is required when there is not a specific protocol name listed such as SSH (port number 22) or an HTTPS (port number 443), as shown in the next example.
  • 30. 30 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Apply a Numbered Extended IPv4 ACL In this example, the ACL permits both HTTP and HTTPS traffic from the 192.168.10.0 network to go to any destination. Extended ACLs can be applied in various locations. However, they are commonly applied close to the source. Here ACL 110 is applied inbound on the R1 G0/0/0 interface.
  • 31. 31 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs TCP Established Extended ACL TCP can also perform basic stateful firewall services using the TCP established keyword. • The established keyword enables inside traffic to exit the inside private network and permits the returning reply traffic to enter the inside private network. • TCP traffic generated by an outside host and attempting to communicate with an inside host is denied.
  • 32. 32 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs TCP Established Extended ACL (Cont.) • ACL 120 is configured to only permit returning web traffic to the inside hosts. The ACL is then applied outbound on the R1 G0/0/0 interface. • The show access-lists command shows that inside hosts are accessing the secure web resources from the internet. Note: A match occurs if the returning TCP segment has the ACK or reset (RST) flag bits set, indicating that the packet belongs to an existing connection.
  • 33. 33 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Named Extended IPv4 ACL Syntax Naming an ACL makes it easier to understand its function. To create a named extended ACL, use the ip access-list extended configuration command. In the example, a named extended ACL called NO-FTP-ACCESS is created and the prompt changed to named extended ACL configuration mode. ACE statements are entered in the named extended ACL sub configuration mode.
  • 34. 34 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Named Extended IPv4 ACL Example The topology below is used to demonstrate configuring and applying two named extended IPv4 ACLs to an interface: • SURFING - This will permit inside HTTP and HTTPS traffic to exit to the internet. • BROWSING - This will only permit returning web traffic to the inside hosts while all other traffic exiting the R1 G0/0/0 interface is implicitly denied.
  • 35. 35 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Named Extended IPv4 ACL Example (Cont.) • The SURFING ACL permits HTTP and HTTPS traffic from inside users to exit the G0/0/1 interface connected to the internet. Web traffic returning from the internet is permitted back into the inside private network by the BROWSING ACL. • The SURFING ACL is applied inbound and the BROWSING ACL is applied outbound on the R1 G0/0/0 interface.
  • 36. 36 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Named Extended IPv4 ACL Example (Cont.) The show access-lists command is used to verify the ACL statistics. Notice that the permit secure HTTPS counters (i.e., eq 443) in the SURFING ACL and the return established counters in the BROWSING ACL have increased.
  • 37. 37 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Edit Extended ACLs An extended ACL can be edited using a text editor when many changes are required. Or, if the edit applies to one or two ACEs, then sequence numbers can be used. Example: • The ACE sequence number 10 in the SURFING ACL has an incorrect source IP networks address.
  • 38. 38 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Edit Extended ACLs (Cont.) • To correct this error the original statement is removed with the no sequence_# command and the corrected statement is added replacing the original statement. • The show access-lists command output verifies the configuration change.
  • 39. 39 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Another Extended IPv4 ACL Example Two named extended ACLs will be created: • PERMIT-PC1 - This will only permit PC1 TCP access to the internet and deny all other hosts in the private network. • REPLY-PC1 - This will only permit specified returning TCP traffic to PC1 implicitly deny all other traffic.
  • 40. 40 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Another Extended IPv4 ACL Example (Cont.) • The PERMIT-PC1 ACL permits PC1 (192.168.10.10) TCP access to the FTP, SSH, Telnet, DNS , HTTP, and HTTPS traffic. • The REPLY-PC1 ACL will permit return traffic to PC1. • The PERMIT-PC1 ACL is applied inbound and the REPLY-PC1 ACL applied outbound on the R1 G0/0/0 interface.
  • 41. 41 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Verify Extended ACLs The show ip interface command is used to verify the ACL on the interface and the direction in which it was applied.
  • 42. 42 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Verify Extended ACLs (Cont.) The show access-lists command can be used to confirm that the ACLs work as expected. The command displays statistic counters that increase whenever an ACE is matched. Note: Traffic must be generated to verify the operation of the ACL.
  • 43. 43 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Verify Extended ACLs (Cont.) The show running-config command can be used to validate what was configured. The command also displays configured remarks.
  • 44. 44 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Packet Tracer – Configure Extended IPv4 ACLs - Scenario 1 In this Packet Tracer, you will complete the following objectives: • Configure, Apply, and Verify an Extended Numbered IPv4 ACL. • Configure, Apply, and Verify an Extended Named IPv4 ACL.
  • 45. 45 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Configure Extended IPv4 ACLs Packet Tracer – Configure Extended IPv4 ACLs - Scenario 2 In this Packet Tracer, you will complete the following objectives: • Configure a Named Extended IPv4 ACL. • Apply and Verify the Extended IPv4 ACL.
  • 46. 46 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5.5 Module Practice and Quiz
  • 47. 47 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Practice and Quiz Packet Tracer – IPv4 ACL Implementation Challenge In this Packet Tracer, you will complete the following objectives: • Configure a router with standard named ACLs • Configure a router with extended named ACLs • Configure a router with extended ACLs to meet specific communication requirements • Configure an ACL to control access to network device terminal lines • Configure the appropriate router interfaces with ACLs in the appropriate direction • Verify the operation of the configured ACLs
  • 48. 48 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Practice and Quiz Packet Tracer – Configure and Verify Extended IPv4 ACLs – Physical Mode Lab – Configure and Verify Extended IPv4 ACLs In this Packet Tracer Physical Mode activity, you will complete the following objectives: • Build the Network and Configure Basic Device Settings • Configure VLANs on the Switches • Configure Trunking • Configure Routing • Configure Remote Access • Verify Connectivity • Configure and Verify Extended Access Control Lists In this Lab, you will complete the following objectives: • Build the Network and Configure Basic Device Settings • Configure and Verify Extended IPv4 ACLs
  • 49. 49 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Practice and Quiz What did I learn in this module? • To create a numbered standard ACL, use the use the ip access-list standard access-list- name global configuration command. • Use the no access-list access-list-number global configuration command to remove a numbered standard ACL. • Use the show ip interface command to verify if an interface has an ACL applied to it. • To create a named standard ACL, use the ip access-list standard access-list-name global configuration command. • Use the no ip access-list standard access-list-name global configuration command to remove a named standard IPv4 ACL. • To bind a numbered or named standard IPv4 ACL to an interface, use the ip access-group {access-list-number | access-list-name} { in | out } global configuration command. • To remove an ACL from an interface, first enter the no ip access-group interface configuration command. • To remove the ACL from the router, use the no access-list global configuration command.
  • 50. 50 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Module Practice and Quiz What did I learn in this module? • Extended ACLs can filter on source address, destination address, protocol (i.e., IP, TCP, UDP, ICMP), and port number. • To create a numbered extended ACL, use the Router(config)# access-list access-list-number {deny | permit | remark text} protocol source source-wildcard [operator [port]] destination destination-wildcard [operator [port]] [established] [log] global configuration command. • ALCs can also perform basic stateful firewall services using the TCP established keyword. • The show ip interface command is used to verify the ACL on the interface and the direction in which it was applied. • To modify an ACL, use a text editor or use sequence numbers. • An ACL ACE can also be deleted or added using the ACL sequence numbers. • Sequence numbers are automatically assigned when an ACE is entered.

Editor's Notes

  • #1: Cisco Networking Academy Program Enterprise Networking, Security, and Automation v7.0 (ENSA) Module 5: ACLs for IPv4 Configuration
  • #2: 5 – ACLs for IPv4 Configuration 5.0.2 - What will I learn to do in this Module.
  • #3: 5.0 - ACLs for IPv4 Configuration 5.1 – Configure Standard IPv4 ACLs
  • #4: 5.0 - ACLs for IPv4 Configuration 5.1 – Configure Standard IPv4 ACLs 5.1.1 – Create an ACL
  • #5: 5.0 - ACLs for IPv4 Configuration 5.1 – Configure Standard IPv4 ACLs 5.1.2 – Numbered Standard IPv4 ACL Syntax
  • #6: 5.0 - ACLs for IPv4 Configuration 5.1 – Configure Standard IPv4 ACLs 5.1.3 – Named Standard IPv4 ACL Syntax
  • #7: 5.0 - ACLs for IPv4 Configuration 5.1 – Configure Standard IPv4 ACLs 5.1.4 – Apply a Standard IPv4 ACL
  • #8: 5.0 - ACLs for IPv4 Configuration 5.1 – Configure Standard IPv4 ACLs 5.1.5 – Numbered Standard IPv4 ACL Example
  • #9: 5.0 - ACLs for IPv4 Configuration 5.1 – Configure Standard IPv4 ACLs 5.1.5 – Numbered Standard IPv4 ACL Example (Cont.)
  • #10: 5.0 - ACLs for IPv4 Configuration 5.1 – Configure Standard IPv4 ACLs 5.1.6 – Named Standard IPv4 ACL Example
  • #11: 5.0 - ACLs for IPv4 Configuration 5.1 – Configure Standard IPv4 ACLs 5.1.6 – Named Standard IPv4 ACL Example (Cont.) 5.1.7 – Syntax Checker – Configure Standard IPv4 ACLs
  • #12: 5.0 - ACLs for IPv4 Configuration 5.1 – Configure Standard IPv4 ACLs 5.1.8 – Packet Tracer – Configure Numbered Standard IPv4 ACLs
  • #13: 5.0 - ACLs for IPv4 Configuration 5.1 – Configure Standard IPv4 ACLs 5.1.8 – Packet Tracer – Configure Numbered Standard IPv4 ACLs
  • #14: 5.0 - ACLs for IPv4 Configuration 5.2 – Modify IPv4 ACLs
  • #15: 5.0 - ACLs for IPv4 Configuration 5.2 – Modify IPv4 ACLs 5.2.1 – Two Methods to Modify and ACL
  • #16: 5.0 - ACLs for IPv4 Configuration 5.2 – Modify IPv4 ACLs 5.2.2 – Text Editor Method
  • #17: 5.0 - ACLs for IPv4 Configuration 5.2 – Modify IPv4 ACLs 5.2.3 – Sequence Number Method
  • #18: 5.0 - ACLs for IPv4 Configuration 5.2 – Modify IPv4 ACLs 5.2.4 – Modify a Named ACL Example
  • #19: 5.0 - ACLs for IPv4 Configuration 5.2 – Modify IPv4 ACLs 5.2.5 – ACL Statistics 5.2.6 – Syntax Checker – Modify IPv4 ACLs
  • #20: 5.0 - ACLs for IPv4 Configuration 5.2 – Modify IPv4 ACLs 5.2.7 – Packet Tracer – Configure and Modify Standard IPv4 ACLs
  • #21: 5.0 - ACLs for IPv4 Configuration 5.3 – Secure VTY Ports with a Standard ACL
  • #22: 5.0 - ACLs for IPv4 Configuration 5.3 – Secure VTY Ports with a Standard ACL 5.3.1 – The access-class Command
  • #23: 5.0 - ACLs for IPv4 Configuration 5.3 – Secure VTY Ports with a Standard ACL 5.3.2 – Secure VTY Access Example
  • #24: 5.0 - ACLs for IPv4 Configuration 5.3 – Secure VTY Ports with a Standard ACL 5.3.3 – Verify the VTY Port is Secured 5.3.4 – Syntax Checker – Secure the VTY Ports
  • #25: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs
  • #26: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.1 – Extended ACLs
  • #27: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.3 – Protocols and Ports
  • #28: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.3 – Protocols and Ports
  • #29: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.4 – Protocols and Port Numbers Configuration Examples
  • #30: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.5 – Apply a Numbered Extended IPv4 ACL
  • #31: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.6 – TCP Established Extended ACL
  • #32: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.6 – TCP Established Extended ACL (Cont.)
  • #33: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.7 – Named Extended IPv4 ACL Syntax
  • #34: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.8 – Named Extended IPv4 ACL Example
  • #35: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.8 – Named Extended IPv4 ACL Example (Cont.)
  • #36: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.8 – Named Extended IPv4 ACL Example (Cont.)
  • #37: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.9 – Edit Extended ACLs
  • #38: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.9 – Edit Extended ACLs (Cont.)
  • #39: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.10 – Another Extended IPv4 ACL Example
  • #40: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.10 – Another Extended IPv4 ACL Example (Cont.)
  • #41: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.11 – Verify Extended ACLs
  • #42: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.11 – Verify Extended ACLs (Cont.)
  • #43: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.11 – Verify Extended ACLs (Cont.)
  • #44: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.12 – Packet Tracer – Configure Extended IPv4 ACLs – Scenario 1
  • #45: 5.0 - ACLs for IPv4 Configuration 5.4 – Configure Extended IPv4 ACLs 5.4.13 – Packet Tracer – Configure Extended IPv4 ACLs – Scenario 2
  • #46: 5- ACLs for IPv4 Configuration 5.5 – Module Practice and Quiz
  • #47: 5.0 - ACLs for IPv4 Configuration 5.5 – Module Practice and Quiz 5.5.1 – Packet Tracer – IPv4 ACL Implementation Challenge
  • #48: 5.0 - ACLs for IPv4 Configuration 5.5 – Module Practice and Quiz 5.5.2 – PTPM and Lab – Configure and Verify Extended IPv4 ACLs
  • #49: 5.0 - ACLs for IPv4 Configuration 5.5 – Module Practice and Quiz 5.5.3 – What did I learn in this module?
  • #50: 5.0 - ACLs for IPv4 Configuration 5.5 – Module Practice and Quiz 5.5.3 – What did I learn in this module?