CCNA 1 Module 11 TCP/IP Transport and Application Layers
Download
Report
Transcript CCNA 1 Module 11 TCP/IP Transport and Application Layers
CCNA 2 v3.1 Module 11
Access Control Lists (ACLs)
© 2004 Cisco Systems, Inc. All rights reserved.
1
Purpose of This PowerPoint
• This PowerPoint primarily consists of the Target
Indicators (TIs) of this module in CCNA version
3.1.
• It was created to give instructors a PowerPoint to
take and modify as their own.
• This PowerPoint is:
NOT a study guide for the module final assessment.
NOT a study guide for the CCNA certification exam.
• Please report any mistakes you find in this
PowerPoint by using the Academy Connection
Help link.
© 2004, Cisco Systems, Inc. All rights reserved.
2
To Locate Instructional Resource
Materials on Academy Connection:
• Go to the Community FTP Center to locate
materials created by the instructor community
• Go to the Tools section
• Go to the Alpha Preview section
• Go to the Community link under Resources
• See the resources available on the Class home
page for classes you are offering
• Search http://www.cisco.com
• Contact your parent academy!
© 2004, Cisco Systems, Inc. All rights reserved.
3
Objectives
© 2004, Cisco Systems, Inc. All rights reserved.
4
What are ACLs?
• ACLs are lists of conditions used to test
network traffic that tries to travel across a
router interface. These lists tell the router
what types of packets to accept or deny.
© 2004, Cisco Systems, Inc. All rights reserved.
5
How ACLs Work
© 2004, Cisco Systems, Inc. All rights reserved.
6
Protocols with ACLs Specified by
Numbers
© 2004, Cisco Systems, Inc. All rights reserved.
7
Creating ACLs
© 2004, Cisco Systems, Inc. All rights reserved.
8
The Function of a Wildcard Mask
© 2004, Cisco Systems, Inc. All rights reserved.
9
Verifying ACLs
• There are many show commands that will
verify the content and placement of ACLs
on the router.
show ip interface
show access-lists
Show running-config
© 2004, Cisco Systems, Inc. All rights reserved.
10
Standard ACLs
© 2004, Cisco Systems, Inc. All rights reserved.
11
Extended ACLs
© 2004, Cisco Systems, Inc. All rights reserved.
12
Named ACLs
© 2004, Cisco Systems, Inc. All rights reserved.
13
Placing ACLs
• Standard ACLs should be placed close to the
destination.
• Extended ACLs should be placed close to the source.
© 2004, Cisco Systems, Inc. All rights reserved.
14
Firewalls
A firewall is an architectural structure that
exists between the user and the outside world
to protect the internal network from intruders.
© 2004, Cisco Systems, Inc. All rights reserved.
15
Restricting Virtual Terminal Access
© 2004, Cisco Systems, Inc. All rights reserved.
16
Summary
© 2004, Cisco Systems, Inc. All rights reserved.
17