ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

SECURITY BY APPLYING ACLS

Verified

Added on  2019/09/21

|4
|602
|492
Report
AI Summary
The provided content is a series of Access Control Lists (ACLs) configurations for securing internet and public backbones, as well as local area networks (LANS) in Australia, South East Asia, and Europe. The ACLs specify rules for permitting or denying IP traffic based on source and destination IP addresses, ports, and protocols. The configurations include permit and deny statements for various routes, such as Sydney, Adelaide, Brisbane, Singapore, Zurich, and London.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
SECURITY BY APPLYING ACLS
A. ACCESS TO INTERNET AND PUBLIC BACKBONE
1) AND 2)
access list 101 permit tcp any host 160.168.35.129 eq http
access list 101 permit tcp any host 160.168.35.129 eq https
access list 101 deny any any
interface serial S0/0
ip access group 101 in
3)
access list 100 permit tcp 160.168.0.0 0.0.255.255 any eq http
access list 100 permit tcp 160.168.0.0 0.0.255.255 any eq https
access list 100 permit tcp 160.168.0.0 0.0.255.255 any established
access list 100 deny ip 160.168.0.0 0.0.255.255
interface serial S0/0
ip access group 100 out
B. THE AUSTRALIAN LANS
4) SYDNEY ROUTER
access list 105 permit ip 160.168.16.0 0.0.0.255 160.168.35.129
access list 105 deny any any
interface Ethernet E1/0
ip access group 105 in
Adelaide ROUTER
access list 105 permit ip 160.168.35 0.0.0.255 160.168.35.129
access list 105 deny any any
interface Ethernet E1/0
ip access group 105 in

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Brisbane router
access list 105 permit ip 160.168.24.0 0.0.0.255 160.168.35.129
access list 105 deny any any
interface Ethernet E1/0
ip access group 105 in
5) SYDNEY ROUTER
access list 106 permit ip 160.168.16.0 0.0.0.255 160.168.35 0.0.0.255
access list 106 permit ip 160.168.16.0 0.0.0.255 160.168.24.0 0.0.0.255
access-list 106 deny ping any any
interface serial S0/1
ip access group 106 out
interface serial S0/2
ip access group 106 out
Adelaide ROUTER
access list 106 permit ip 160.168.35 0.0.0.255 160.168.16.0 0.0.0.25
access-list 106 deny ping any any
interface serial S0/0
ip access group 106 out
Brisbane router
access list 106 permit ip 160.168.24.0 0.0.0.255 160.168.16.0 0.0.0.255
access-list 106 deny ping any any
interface serial S0/0
ip access group 106 out
6) SYDNEY ROUTER
access list 107 permit tcp 160.168.16.0 0.0.0.255 160.168.35.149 eq ssh
access list 107 permit tcp 160.168.16.0 0.0.0.255 160.168.35.136 eq
1433
access list 107 deny any any
Document Page
interface serial S0/0
ip access group 07 out
ADELAIDE ROUTER
access list 107 permit tcp 160.168.35 0.0.0.255 160.168.35.149 eq ssh
access list 107 deny any any
interface serial S0/0
ip access group 107 out
BRISBANE ROUTER
access list 107 permit tcp 160.168.24.0 0.0.0.255 160.168.35.149 eq ssh
access list 107 deny any any
interface serial S0/0
ip access group 107 out
C THE SOUTH EAST ASIAN LANS
7). SINGAPORE ROUTER
access list 103 permit tcp 160.168.28.0 0.0.0.255 host 160.168.35.129 eq
http
access list 103 permit tcp 160.168.28.0 0.0.0.255 host 160.168.35.129
eq https
access list 103 permit tcp 160.168.28.0 0.0.0.255 host 160.168.35.129
eq 53
access list 103 deny ip 160.168.28.0 0.0.0.255 host 160.168.35.129
access list 103 permit udp 160.168.28.0 0.0.0.255 host 160.168.35.129
eq 53
access list 103 deny tcp 160.168.28.0 0.0.0.255 160.168.35.128 eq 23
access list 103 deny tcp 160.168.28.0 0.0.0.255 160.168.35.128 eq 21
access list 103 deny tcp 160.168.28.0 0.0.0.255 160.168.35.128 eq 21
access list 103 permit ip 160.168.28.0 0.0.0.255 160.168.35.128
interface Ethernet E1/0
ip access group 103 in
Document Page
8) SINGAPORE ROUTER
access list 102 permit tcp 160.168.28.0 0.0.0.255 160.168.35.136
access list 102 permit tcp 160.168.28.0 0.0.0.255 160.168.35.149
access list 102 deny tcp 160.168.28.0 0.0.0.255 160.168.35.136 eq ftp
access list 102 deny tcp 160.168.28.0 0.0.0.255 160.168.35.136 eq telnet
access list 102 deny tcp 160.168.28.0 0.0.0.255 160.168.35.149 eq ftp
access list 102 deny tcp 160.168.28.0 0.0.0.255 160.168.35.149 eq telnet
interface Ethernet E1/0
ip access group 102 in
D) European lans
9. ZURICH LAN
access list 104 permit tcp 160.168.0.0 0.0.255.255 host 160.168.35.136
eq 1433
access list 104 deny ip 160.168.0.0 0.0.255.255 any
interface Ethernet E1/0
ip access group 104 in
LONDON LAN
access list 104 permit tcp 160.168.32.0 0.0.0.255 host 160.168.35.136
eq 1433
access list 104 deny ip 160.168.32.0 0.0.0.255 any
interface Ethernet E1/0
ip access group 104 in
1 out of 4
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]