Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.

Similar presentations


Presentation on theme: "© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5."— Presentation transcript:

1 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5

2 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 2 Objectives  Explain how ACLs are used to secure a medium-size Enterprise branch office network.  Configure standard ACLs in a medium-size Enterprise branch office network.  Configure extended ACLs in a medium-size Enterprise branch office network.  Describe complex ACLs in a medium-size Enterprise branch office network.  Implement, verify and troubleshoot ACLs in an enterprise network environment.

3 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 3 Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office Network  Describe the steps that occur in a complete TCP conversation

4 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 4 Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office Network  Explain how a packet filter allows or blocks traffic

5 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 5 Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office Network  Describe how ACLs control access to networks

6 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 6 Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office Network  Use a flow chart to show how ACLs operate

7 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 7 Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office Network  Describe the types and formats of ACLs

8 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 8 Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office Network  Explain how Cisco ACLs can be identified using standardized numbering or names

9 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 9 Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office Network  Describe where ACLs should be placed in a network

10 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 10 Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office Network  Explain the considerations for creating ACLs

11 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 11 Configure Standard ACLs in a Medium- Size Enterprise Branch Office Network  Explain why the order in which criteria statements are entered into an ACL is important

12 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 12 Configure Standard ACLs in a Medium- Size Enterprise Branch Office Network  Explain how to configure a standard ACL

13 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 13 Configure Standard ACLs in a Medium- Size Enterprise Branch Office Network  Describe how to use wildcard masks with ACLs

14 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 14 Configure Standard ACLs in a Medium- Size Enterprise Branch Office Network  Describe how to apply a standard ACL to an interface

15 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 15 Configure Standard ACLs in a Medium- Size Enterprise Branch Office Network  Explain the process for editing numbered ACLs

16 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 16 Configure Standard ACLs in a Medium- Size Enterprise Branch Office Network  Explain how to create a named ACL

17 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 17 Configure Standard ACLs in a Medium- Size Enterprise Branch Office Network  Describe how to monitor and verify ACLs

18 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 18 Configure Standard ACLs in a Medium- Size Enterprise Branch Office Network  Explain the process for editing named ACLs

19 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 19 Configure Extended ACLs in a Medium- Size Enterprise Branch Office Network  Explain how an extended ACL provides more filtering then a standard ACL

20 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 20 Configure Extended ACLs in a Medium- Size Enterprise Branch Office Network  Describe how to configure extended ACLs

21 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 21 Configure Extended ACLs in a Medium- Size Enterprise Branch Office Network  Describe how to apply an extended ACL to an interface

22 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 22 Configure Extended ACLs in a Medium- Size Enterprise Branch Office Network  Describe how to create named extended ACLs

23 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 23 Describe Complex ACLs in a Medium-Size Enterprise Branch Office Network  List the three types of complex ACLs

24 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 24 Describe Complex ACLs in a Medium-Size Enterprise Branch Office Network  Explain how and when to use dynamic ACLs

25 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 25 Describe Complex ACLs in a Medium-Size Enterprise Branch Office Network  Explain how and when to use reflexive ACLs

26 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 26 Describe Complex ACLs in a Medium-Size Enterprise Branch Office Network  Explain how and when to use time-based ACLs

27 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 27 Describe Complex ACLs in a Medium-Size Enterprise Branch Office Network  Describe how to troubleshoot common ACL problems

28 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 28 Implement, Verify and Troubleshoot ACLs in an Enterprise Network Environment  Create, place and verify a standard/ extended ACL and verify its placement.  Verify ACL’s functionality and troubleshoot as needed.

29 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 29 Summary  An Access List (ACL) is: A series of permit and deny statements that are used to filter traffic  Standard ACL –Identified by numbers 1 - 99 and 1300 - 1999 –Filter traffic based on source IP address  Extended ACL –Identified by number 100 -199 & 2000 - 2699 –Filter traffic based on Source IP address Destination IP address Protocol Port number

30 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 30 Summary  Named ACL –Used with IOS 11.2 and above –Can be used for either standard or extended ACL  ACL’s use Wildcard Masks (WCM) –Described as the inverse of a subnet mask Reason –0  check the bit –1  ignore the bit

31 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 31 Summary  Implementing ACLs –1 st create the ACL –2 nd place the ACL on an interface Standard ACL are placed nearest the destination Extended ACL are placed nearest the source  Use the following commands for verifying & troubleshooting an ACL –Show access-list –Show interfaces –Show run

32 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 32 Summary  Complex ACL –Dynamic ACL –Reflexive ACL –Time based ACL

33 © 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 33


Download ppt "© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5."

Similar presentations


Ads by Google