Documente Academic
Documente Profesional
Documente Cultură
ITE I Chapter 6
Cisco Public
Objectives
ITE 1 Chapter 6
Cisco Public
Explain How ACLs are Used to Secure a MediumSize Enterprise Branch Office Network
Describe the steps that occur in a complete TCP
conversation
ITE 1 Chapter 6
Cisco Public
Explain How ACLs are Used to Secure a MediumSize Enterprise Branch Office Network
Explain how a packet filter allows or blocks traffic
ITE 1 Chapter 6
Cisco Public
Explain How ACLs are Used to Secure a MediumSize Enterprise Branch Office Network
Describe how ACLs control access to networks
ITE 1 Chapter 6
Cisco Public
Explain How ACLs are Used to Secure a MediumSize Enterprise Branch Office Network
Use a flow chart to show how ACLs operate
ITE 1 Chapter 6
Cisco Public
Explain How ACLs are Used to Secure a MediumSize Enterprise Branch Office Network
Describe the types and formats of ACLs
ITE 1 Chapter 6
Cisco Public
Explain How ACLs are Used to Secure a MediumSize Enterprise Branch Office Network
Explain how Cisco ACLs can be identified using
standardized numbering or names
ITE 1 Chapter 6
Cisco Public
Explain How ACLs are Used to Secure a MediumSize Enterprise Branch Office Network
Describe where ACLs should be placed in a network
ITE 1 Chapter 6
Cisco Public
Explain How ACLs are Used to Secure a MediumSize Enterprise Branch Office Network
Explain the considerations for creating ACLs
ITE 1 Chapter 6
Cisco Public
10
ITE 1 Chapter 6
Cisco Public
11
ITE 1 Chapter 6
Cisco Public
12
ITE 1 Chapter 6
Cisco Public
13
ITE 1 Chapter 6
Cisco Public
14
ITE 1 Chapter 6
Cisco Public
15
ITE 1 Chapter 6
Cisco Public
16
ITE 1 Chapter 6
Cisco Public
17
ITE 1 Chapter 6
Cisco Public
18
ITE 1 Chapter 6
Cisco Public
19
ITE 1 Chapter 6
Cisco Public
20
ITE 1 Chapter 6
Cisco Public
21
ITE 1 Chapter 6
Cisco Public
22
ITE 1 Chapter 6
Cisco Public
23
ITE 1 Chapter 6
Cisco Public
24
ITE 1 Chapter 6
Cisco Public
25
ITE 1 Chapter 6
Cisco Public
26
ITE 1 Chapter 6
Cisco Public
27
ITE 1 Chapter 6
Cisco Public
28
Summary
An Access List (ACL) is:
A series of permit and deny statements that are used to filter
traffic
Standard ACL
Identified by numbers 1 - 99 and 1300 - 1999
Filter traffic based on source IP address
Extended ACL
Identified by number 100 -199 & 2000 - 2699
Filter traffic based on
Source IP address
Destination IP address
Protocol
Port number
ITE 1 Chapter 6
Cisco Public
29
Summary
Named ACL
Used with IOS 11.2 and above
Can be used for either standard or extended ACL
ITE 1 Chapter 6
Cisco Public
30
Summary
Implementing ACLs
1st create the ACL
2nd place the ACL on an interface
Standard ACL are placed nearest the destination
Extended ACL are placed nearest the source
ITE 1 Chapter 6
Cisco Public
31
Summary
Complex ACL
Dynamic ACL
Reflexive ACL
Time based ACL
ITE 1 Chapter 6
Cisco Public
32
ITE 1 Chapter 6
Cisco Public
33