Quản trị mạng - Access control lists

Implementing ACLs 1st create the ACL 2nd place the ACL on an interface Standard ACL are placed nearest the destination Extended ACL are placed nearest the source Use the following commands for verifying & troubleshooting an ACL Show access-list Show interfaces Show run

ppt33 trang | Chia sẻ: nguyenlam99 | Lượt xem: 838 | Lượt tải: 0download
Bạn đang xem trước 20 trang tài liệu Quản trị mạng - Access control lists, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
Access Control Lists Accessing the WAN – Chapter 5ObjectivesExplain how ACLs are used to secure a medium-size Enterprise branch office network.Configure standard ACLs in a medium-size Enterprise branch office network.Configure extended ACLs in a medium-size Enterprise branch office network.Describe complex ACLs in a medium-size Enterprise branch office network.Implement, verify and troubleshoot ACLs in an enterprise network environment.Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office NetworkDescribe the steps that occur in a complete TCP conversation Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office NetworkExplain how a packet filter allows or blocks traffic Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office NetworkDescribe how ACLs control access to networks Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office NetworkUse a flow chart to show how ACLs operate Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office NetworkDescribe the types and formats of ACLs Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office NetworkExplain how Cisco ACLs can be identified using standardized numbering or namesExplain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office NetworkDescribe where ACLs should be placed in a network Explain How ACLs are Used to Secure a Medium-Size Enterprise Branch Office NetworkExplain the considerations for creating ACLs Configure Standard ACLs in a Medium-Size Enterprise Branch Office NetworkExplain why the order in which criteria statements are entered into an ACL is important Configure Standard ACLs in a Medium-Size Enterprise Branch Office NetworkExplain how to configure a standard ACL Configure Standard ACLs in a Medium-Size Enterprise Branch Office NetworkDescribe how to use wildcard masks with ACLs Configure Standard ACLs in a Medium-Size Enterprise Branch Office NetworkDescribe how to apply a standard ACL to an interface Configure Standard ACLs in a Medium-Size Enterprise Branch Office NetworkExplain the process for editing numbered ACLs Configure Standard ACLs in a Medium-Size Enterprise Branch Office NetworkExplain how to create a named ACL Configure Standard ACLs in a Medium-Size Enterprise Branch Office NetworkDescribe how to monitor and verify ACLs Configure Standard ACLs in a Medium-Size Enterprise Branch Office NetworkExplain the process for editing named ACLs Configure Extended ACLs in a Medium-Size Enterprise Branch Office NetworkExplain how an extended ACL provides more filtering then a standard ACL Configure Extended ACLs in a Medium-Size Enterprise Branch Office NetworkDescribe how to configure extended ACLs Configure Extended ACLs in a Medium-Size Enterprise Branch Office NetworkDescribe how to apply an extended ACL to an interface Configure Extended ACLs in a Medium-Size Enterprise Branch Office NetworkDescribe how to create named extended ACLs Describe Complex ACLs in a Medium-Size Enterprise Branch Office NetworkList the three types of complex ACLs Describe Complex ACLs in a Medium-Size Enterprise Branch Office NetworkExplain how and when to use dynamic ACLs Describe Complex ACLs in a Medium-Size Enterprise Branch Office NetworkExplain how and when to use reflexive ACLs Describe Complex ACLs in a Medium-Size Enterprise Branch Office NetworkExplain how and when to use time-based ACLs Describe Complex ACLs in a Medium-Size Enterprise Branch Office NetworkDescribe how to troubleshoot common ACL problems Implement, Verify and Troubleshoot ACLs in an Enterprise Network EnvironmentCreate, place and verify a standard/ extended ACL and verify its placement.Verify ACL’s functionality and troubleshoot as needed. SummaryAn Access List (ACL) is:A series of permit and deny statements that are used to filter trafficStandard ACLIdentified by numbers 1 - 99 and 1300 - 1999Filter traffic based on source IP addressExtended ACLIdentified by number 100 -199 & 2000 - 2699Filter traffic based onSource IP addressDestination IP addressProtocolPort numberSummaryNamed ACLUsed with IOS 11.2 and aboveCan be used for either standard or extended ACLACL’s use Wildcard Masks (WCM)Described as the inverse of a subnet maskReason0  check the bit1  ignore the bitSummaryImplementing ACLs1st create the ACL2nd place the ACL on an interfaceStandard ACL are placed nearest the destinationExtended ACL are placed nearest the sourceUse the following commands for verifying & troubleshooting an ACLShow access-listShow interfacesShow runSummaryComplex ACLDynamic ACLReflexive ACLTime based ACL

Các file đính kèm theo tài liệu này:

  • pptchapter_5_acls_9466.ppt
Tài liệu liên quan