




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、 2002, Cisco Systems, Inc. All rights reserved. 2002, Cisco Systems, Inc. All rights reserved.2Configuring IP Access ListsObjectivesUpon completing this lesson, you will be able to:Use Cisco IOS commands to configure IP standard and extended access lists, given a functioning routerUse show commands
2、to identify anomalies in IP standard and extended access lists, given an operational routerAccess List Configuration GuidelinesAccess list numbers indicate which protocol is filtered.One access list per interface, per protocol, per direction is allowed.The order of access list statements controls te
3、sting. Place the most restrictive statements at the top of list.There is an implicit deny any statement as the last access list test. Every list needs at least one permit statement.Create access lists before applying them to interfaces.Access lists filter traffic going through the router; they do no
4、t apply to traffic originating from the router.Step 1: Set parameters for this access list test statement (which can be one of several statements).Step 2: Enable an interface to use the specified access list. Router(config-if)#protocol access-group access-list-number in | out Access List Command Ove
5、rviewStandard IP lists (1-99) Extended IP lists (100-199)Standard IP lists (1300-1999) (expanded range)Extended IP lists (2000-2699) (expanded range)Router(config)#access-list access-list-number permit | deny test conditionsActivates the list on an interfaceSets inbound or outbound testingDefault =
6、outboundno ip access-group access-list-number removes access list from the interfaceRouter(config-if)#ip access-group access-list-number in | outSets parameters for this list entryIP standard access lists use 1 to 99Default wildcard mask = no access-list access-list-number removes entire access list
7、remark option lets you add a description for the access listRouter(config)#access-list access-list-number permit | deny | remark source wildcardStandard IP Access List ConfigurationPermit my network only.Standard IP Access List Example 1Deny a specific host.Standard IP Access List Example 2Deny a sp
8、ecific subnet.Standard IP Access List Example 3Router(config-if)#ip access-group access-list-number in | outExtended IP Access List ConfigurationActivates the extended list on an interfaceSets parameters for this list entryRouter(config)#access-list access-list-number permit | deny protocol source s
9、ource-wildcard operator port destination destination-wildcard operator port established logDeny FTP from subnet to subnet out of E0. Permit all other traffic.Extended Access List Example 1Deny only Telnet from subnet out of E0.Permit all other traffic.Extended Access List Example 2Router(config)#ip
10、access-list standard | extended nameRouter(config std- | ext-nacl)#permit | deny ip access list test conditionspermit | deny ip access list test conditions no permit | deny ip access list test conditions Router(config-if)#ip access-group name in | out Using Named IP Access ListsAlphanumeric name str
11、ing must be unique.Permit or deny statements have no prepended number. “no” removes the specific test from the named access list.Activates the IP named access list on an interface.Five virtual terminal lines (0 through 4).Filter addresses that can access into the routers vty ports.Filter vty access
12、out from the router.Filtering vty Access to a RouterHow to Control vty AccessSet up an IP address filter with a standard access list statement.Use line configuration mode to filter access with the access-class command.Set identical restrictions on every vty.Enters configuration mode for a vty or vty
13、 rangeRestricts ing or outgoing vty connections for address in the access listRouter(config-line)#access-class access-list-number in | outRouter(config)#line vty vty# | vty-rangevty CommandsPermits only hosts in network 55 to connect to the router vtyaccess-list 12 permit 55(implicit deny all) !line
14、 vty 0 4 access-class 12 inControlling Inbound Accessvty Access ExampleAccess List Configuration PrinciplesThe order of access list statements is crucial. mended: Use a text editor on a PC to create the access-list statements, then cut and paste them into the router.Top-down processing is important.
15、Place the more specific test statements first.No reordering or removal of statements.Use the no access-list number command to remove the entire access list.Exception: Named access lists permit removal of individual statements.Implicit deny all will be applied to any packets that do not match any acc
16、ess-list statement.Unless the access list ends with an explicit permit any statement.Place extended access lists close to the source.Place standard access lists close to the destination.Where to Place IP Access Listswg_ro_a#show ip interfaces e0Ethernet0 is up, line protocol is up Internet address i
17、s 1/24 Broadcast address is 55 Address determined by setup command MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Outgoing access list is not set Inbound access list is 1 Proxy ARP is enabled Security level is default Split horizon is enabled ICMP redirects are
18、 always sent ICMP unreachables are always sent ICMP mask replies are never sent IP fast switching is enabled IP fast switching on the same interface is disabled IP Feature Fast switching turbo vector IP multicast fast switching is enabled IP multicast distributed fast switching is disabled Verifying
19、 Access ListsMonitoring Access List Statementswg_ro_a#show access-lists Standard IP access list 1 permit permit permit permit Extended IP access list 101 permit tcp host any eq telnet permit tcp host any eq ftp permit tcp host any eq ftp-datawg_ro_a#show protocol access-list access-list number wg_ro
20、_a#show access-lists access-list number SummaryWell-designed and implemented access lists will add an important security component to your network. To configure standard IP access lists on a Cisco router, you will create a standard IP access list and activate an access list on an interface. Similarly, to configure extended IP access lists on a Cisco router, you will create an extended IP access list range and activate an access list on an interface. The named access list feature
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年中核湖南矿业招聘笔试参考题库附带答案详解
- 2024年12月安徽芜湖市弋江区编外聘用人员及区属国企人员招聘15人笔试参考题库附带答案详解
- 2024呼和浩特市政工程设计研究院有限公司(土木类)笔试参考题库附带答案详解
- 2025年棉、化纤纺织及印染产品项目发展计划
- 2024秋四年级英语上册 Unit 2 At Home Lesson 9 In the Bedroom教学实录 冀教版(三起)
- 八年级历史下册 第二单元 向社会主义社会过渡 4 社会主义工业化的起步教学实录 岳麓版
- 初中语文古诗文默写练习
- 2022年北京市初三一模数学试题汇编:圆解答题(第24题)
- 海滩冲浪学校行业跨境出海战略研究报告
- 任务十二形体分析法读图训练一基本形体的视图特征二识读组合体
- 超声危急值-课件
- 最全的遗传概率计算方法(高中生物)题库
- 租用电表合同范本
- 管家部布草报损和报废制度
- 强化劳动教育认知提升小学劳动教育实效性 论文
- 2023年重庆市大渡口区春晖路街道阳光社区工作人员考试模拟试题及答案
- 医院灾害脆弱性分析报告(2020版)
- 特殊特性与控制方法培训教材吉麦20200103
- 山景系列产品包发布1-入门和选型ap8248a2数据手册prelimiary
- GA 1811.1-2022传媒设施反恐怖防范要求第1部分:媒体机构
- 近三年新疆中考化学试卷分析
评论
0/150
提交评论