WHAT IS ACL
1. ACL IS USED TO NETWORK TRAFFIC. FILTER ACL BLOCK A ANY CLIENT AND ANY PC.
2. ACL USED TO FILTER THE TRAFFIC IN NETWORK INFRASTRUCRED.
3. FILTER TRANSMISSION (FULL DUPLEX AND HALF DUPLEX).
4. REDUCE THE NETWORK TRAFFIC.
5. CONTROLL ACCESSING (AUTHRIZED AND UNUTHERIZED).
6. NETWORK ADMIN CAN BLOCK THE HACKER ON UNKNOWN ACCESSING.
7. PREVENT INFRASTRUCURE FROM HACKER ATTACK.
8. ACL IS A SET OF RULES WHICH WILL ALLOW OR DENY THE SPECIFIC TRAFFIC MOVING THROUGH THE ROUTER.
9. IT IS A LAYER 3 SECURITY WHICH CONTROLL THE FLOW OF TRAFFIC FROM ONE ROUTER TO ANOTHER ROUTER.
10. IT IS ALSO CALLED A "PACKET FILTERING FIREWALL".
ACL LEVEL
1. STANDERD ACL
1. USED TO FILTER SOURCE SIDE INFRASTRUCURE ONLY.
2. APPLY IS NEAREST TO THE DESTINATION.
3. (0-99 OR 1300-1999)
2. EXTANDERD ACL
1. USED TO FILTER SOURCE SIDE AS WELL AS RECIEVER SIDE ALSO.
2. APPLY IS NEAREST TO THE SOURCE.
3. (100-199 OR 2000-2699)
TYPES OF ACL
NUMBERED ACL
WE CAN USE SPECIFIC NUMBER TO APPLY THE ACL.
NAMED ACL
WE CAN USE NAMED TO APPLY THIS.
DIFFERENT B/W STANDERD AND EXTENDED ACL
_____________
CONFIGURATION EXTANDED ACL
STEP 1
1. FIRST OF ALL CONFIGURE IP ADDRESS IN ALL DEVICES.
2. CONFIGURATION RIP PROTOCOL IN R1, R2 AND R3.
STEP 2
1. CHECK CONNECTIVITY BETWEEN ALL DEVICES.
2. CONFIGURATION ACL IN R1.
_____________
STEP 1
1. GO TO R1 CONFIGURATION MODE AND ENTER COMMANDS FOR ASSIGN IP ADDRESS.
Router(config)# hostname R1
R1(config)# inter gig0/1
R1(config)# ip address 1.1.1.1 255.0.0.0
R1(config)# no sh
R1(config)# inter gig0/0
R1(config)# ip address 192.168.1.1 255.255.255.0
R1(config)# no sh
GO TO R2 CONFIGURATION MODE AND ENTER COMMANDS FOR ASSIGN IP ADDRESS.
Router(config)# hostname R2
R2(config)# inter gig0/0
R2(config)# ip address 1.1.1.2 255.0.0.0
R2(config)# no sh
R2(config)# inter gig0/2
R2(config)# ip address 172.165.1.1 255.255.0.0
R2(config)# no sh
R2(config)# inter gig0/1
R2(config)# ip address 2.2.2.1 255.0.0.0
R2(config)# no sh
GO TO R3 CONFIGURATION MODE AND ENTER COMMANDS FOR ASSIGN IP ADDRESS.
Router(config)# hostname R3
R3(config)# inter gig0/0
R3(config)# ip address 2.2.2.2 255.0.0.0
R3(config)# no sh
R3(config)# inter gig0/1
R3(config)# ip address 200.200.200.1 255.255.255.0
R1(config)# no sh
ASSIGN IP ADDRESS IN SERVER , LAPTOP AND PC'S.
___________
CONFIGURATION RIP PROTOCOL
2. GO TO R1 CONFIGURATION MODE AND ENTER COMMANDS FOR RIP CONFIGURE.
R1(config)# router rip
R1(config)# network 192.168.1.0
R1(config)# network 1.1.1.0
GO TO R2 CONFIGURATION MODE AND ENTER COMMANDS.
R2(config)# router rip
R2(config)# network 172.165.0.0
R2(config)# network 1.1.1.0
R2(config)# network 2.2.2.0
GO TO R3 CONFIGURATION MODE AND ENTER COMMANDS FOR RIP CONFIGURE.
R3(config)# router rip
R3(config)# network 200.200.200.0
R3(config)# network 2.2.2.0
R1 AND R2 AND R3 ENABLE MODE AND ENTER COMMAND FOR RIP CONFIGURE.
#sh ip rip database
_______________
CONFIGURATION ACL
STEP 2
GO TO R1 CONFIGURATION MODE AND ENTER COMMANDS FOR ACL CONFIGURATION.
R1(config)# access-list 101 deny tcp host 172.165.1.5 host 192.168.1.50 eq ftp
R1(config)# access-list 101 deny tcp host 200.200.200.5 host 192.168.1.50 eq www
R1(config)# access-list 101 deny icmp host 172.165.1.10 host 192.168.1.50
R1(config)# access-list 101 permit ip any any
R1(config)# inter gig0/0
R1(config)# ip access-group 101 out
GO TO ENABLE MODE AND ENTER COMMAND.
R1# sh access-lists 101
YOU SEE IT IS TELLING ALL ABOUT WHICH
SERVICE IS BLOCKED FOR WHICH IP ADDRESS.
AFTER THAT YOU HAVE TO GO TO PCS AND LAPTOP
AND CHECK IF ACL IS CONFIGURED OR NOT.
GO TO PC1 AND CHECK FTP BLOCKED OR NOT.
GO DESKTOP AND ENTER TWO COMMANDS
FIRST IS : C:\>PING 192.168.1.50
SECOND IS : C:\>FTP 192.168.1.50
YOU CAN SEE THAT THE PC IS COMMUNICATING
WITH THE SERVER, SERVER REPLY FROM PC,
BUT WE HAVE BLOCKED THE FTP SERVER FOR THAT. SO FTP SERVER DISSCONNECTING PC.
SIMILARLY YOU CAN ALSO CHECK THE ACL
CONFIGURATION BY GOING TO PC2 AND LAPTOP TO SEE IF SERVICES ARE ACTUALLY
BLOCKED FOR THEM.OR NOT.
GO TO PC2 DESKTOP AND ENTER TWO COMMANDS.
FIRST IS : C:\>PING 192.168.1.50
SECOND IS : C:\>FTP 192.168.1.50
___________________
Comments
Post a Comment