logo

CISCO Access Control List Configuration

14 Pages895 Words323 Views
   

Added on  2022-08-17

About This Document

The command used for standard ACL is: Router ( config )#access-list access-list-number permit | deny source [source-wildcard] | host hostname | any Router ( config )# i p access-list standard access-list-name M echanism Three types of filtering mechanism can be used: Packet filtering – Data flow consisting of packets of information and an analysis is made by the firewall for analyzing the packets

CISCO Access Control List Configuration

   Added on 2022-08-17

ShareRelated Documents
CISCO ACCESS LIST
CONFIGURATION
NAME OF THE STUDENT
NAME OF THE UNIVERSITY
CISCO Access Control List Configuration_1
Overview
Access control list is used for controlling the data traffic flow in and out
the cisco device.
These are the lists that are built using a set of permissible or denied
actions and configured or affecting the packets that are needed to be
allowed or dropped.
ACL are of different types and can be defined using ACL no. or using
syntax in case of named ACL.
CISCO Access Control List Configuration_2
Access List Configuration
A standard ACL can be created for providing the router the ability to
match the traffic depending on the source address of the data traffic.
This has some limitation, but it is used is many situations.
The command used for standard ACL is:
Router (config)#access-list access-list-number {permit | deny} {source
[source-wildcard] | host hostname | any}
Router (config)#ip access-list standard {access-list-name}
CISCO Access Control List Configuration_3
Mechanism
Three types of filtering mechanism can be used:
Packet filtering – Data flow consisting of packets of information and an
analysis is made by the firewall for analyzing the packets and sniffing
the unwanted or offensive packets depending on the set rule. The each
of the packet entering or leaving is looked depending on user defined
rules.
Proxy service – It is used as a gateway type for hiding true network
address connected through it.
Stateful inspection – it is used for comparing certain key parts of data
packet for the database of trusted information.
CISCO Access Control List Configuration_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment TCP/IP Networking
|19
|1595
|148

Addressing Scheme and Basic Configuration for Campus Network
|14
|1001
|394

Implementation of Basic and Advanced Configuration
|12
|1430
|201

Site “ZZZ” Challenges and Implementation.
|2
|476
|160

TCP/IP Networking | Assignment
|17
|616
|33

CMIT 350 Interconnecting Cisco Devices
|6
|1107
|171