CCNA 1 Module 11 TCP/IP Transport and Application Layers

Download Report

Transcript CCNA 1 Module 11 TCP/IP Transport and Application Layers

CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)

© 2004 Cisco Systems, Inc. All rights reserved.

1

Purpose of This PowerPoint

This PowerPoint primarily consists of the Target Indicators (TIs) of this module in CCNA version 3.1.

It was created to give instructors a PowerPoint to take and modify as their own.

This PowerPoint is: NOT a study guide for the module final assessment.

NOT a study guide for the CCNA certification exam.

Please report any mistakes you find in this PowerPoint by using the Academy Connection Help link.

© 2004, Cisco Systems, Inc. All rights reserved.

To Locate Instructional Resource Materials on Academy Connection:

Go to the Community FTP Center to locate materials created by the instructor community

• • • •

Go to the Tools section Go to the Alpha Preview section Go to the Community link under Resources See the resources available on the Class home page for classes you are offering

• •

Search http://www.cisco.com

Contact your parent academy!

© 2004, Cisco Systems, Inc. All rights reserved.

Objectives

© 2004, Cisco Systems, Inc. All rights reserved.

What are ACLs?

ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny.

© 2004, Cisco Systems, Inc. All rights reserved.

How ACLs Work

© 2004, Cisco Systems, Inc. All rights reserved.

Protocols with ACLs Specified by Numbers

© 2004, Cisco Systems, Inc. All rights reserved.

Creating ACLs

© 2004, Cisco Systems, Inc. All rights reserved.

The Function of a Wildcard Mask

© 2004, Cisco Systems, Inc. All rights reserved.

Verifying ACLs

There are many show commands that will verify the content and placement of ACLs on the router.

show ip interface show access-lists Show running-config

© 2004, Cisco Systems, Inc. All rights reserved.

Standard ACLs

© 2004, Cisco Systems, Inc. All rights reserved.

Extended ACLs

© 2004, Cisco Systems, Inc. All rights reserved.

Named ACLs

© 2004, Cisco Systems, Inc. All rights reserved.

Placing ACLs

Standard ACLs should be placed close to the destination.

Extended ACLs should be placed close to the source.

© 2004, Cisco Systems, Inc. All rights reserved.

Firewalls A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders.

© 2004, Cisco Systems, Inc. All rights reserved.

Restricting Virtual Terminal Access

© 2004, Cisco Systems, Inc. All rights reserved.

Summary

© 2004, Cisco Systems, Inc. All rights reserved.