Always Read for Knowledge

Friday 29 April 2011

CCNA LAB Practice - I. STANDARD ACL


Access Control List

Objective


Understanding the Packet Filtering capabilities of Router. Router can pass or filter the ip traffic as per required.

The demonstrations include:

  1. Standard Access List 
  2. Extended Access List

I. STANDARD ACL

Standard IP lists (1-99) test conditions of all IP packets from source addresses.

In this lab scenario, initially both the Hosts ’A’ & ‘B’ are accessing the Web & Ftp services but then apply the Standard ACL so that the Host ‘A’ could not access the Web & Ftp Services.

It is recommended that place the Standard ACL near the destination.

Diagram





Procedure

  1. Configuring & Assigning the IP addresses on the routers R1 & R2.
  2. Check the routing table on both the routers.
  3. Enable the routing protocol on both routers so that hosts on the both routers can communicate with each other.
  4. Check the routing table on both the routers after enabling the routing protocol on both sides.
  5. Make a web server & ftp server to the hosts C & D respectively.
  6. Verifying the access of web server & ftp server by the hosts A & B respectively.
  7. Make Apply the Standard ACL on  the router R2, so that Host A can not access these services.
  8. Verifying the Standard ACL by accessing the web & ftp server from Host A.

Configuration         

Step 1(A): Assigning the IP addresses on the Router R1.

R1(config)#interface serial 0
R1(config-if)#ip address 15.0.0.1 255.0.0.0
R1(config-if)#no shutdown
R1(config-if)#clock rate 64000   (Clock Rate will set only DCE Interface)
R1(config-if)#exit
R1(config)#interface ethernet 0
R1(config-if)#ip address 10.0.0.20 255.0.0.0
R1(config-if)#no shutdown
R1(config-if)#end

Step 1(B): Assigning the IP addresses on the Router R2.

R2(config)#interface serial 0
R2(config-if)#ip address 15.0.0.2 255.0.0.0
R2(config-if)#no shutdown
R2(config-if)#end
R2(config)#interface ethernet 0
R2(config-if)#ip address 20.0.0.2 255.0.0.0
R2(config-if)#no shutdown
R2(config-if)#exit

Step 2(A): Check the Routing table of the Router R1.

RA#sh ip route
  

C    10.0.0.0/8 is directly connected, Ethernet0
C    15.0.0.0/8 is directly connected, Serial0

Step 2(B): Check the Routing table of the Router R2.

RB#sh ip route

C    20.0.0.0/8 is directly connected, Ethernet0
C    15.0.0.0/8 is directly connected, Serial0

Step 3(A): Enable the RIP protocol on the Router R1.

RA(config)#router rip
RA(config-router)#network 10.0.0.0 (Networks to be advertised)
RA(config-router)#network 15.0.0.0 (Networks to be advertised) 

Step 3(B): Enable the RIP protocol on the Router R2.

RB(config)#router rip 10
RB(config-router)#network 20.0.0.0 (Networks to be advertised)
RB(config-router)#network 15.0.0.0 (Networks to be advertised) 

Step 4(A): Check the Routing table of the Router R2 after enabling RIP.

RA#sh ip route

R    20.0.0.0/8 [120/1] via 15.0.0.2, 00:04:42, Serial0
C    10.0.0.0/8 is directly connected, Ethernet0
C    15.0.0.0/8 is directly connected, Serial0

Step 4(B): Check the Routing table of the Router R2 after enabling RIP.

RB#sh ip route

C    20.0.0.0/8 is directly connected, Ethernet0
R    20.0.0.0/8 [120/1] via 15.0.0.1, 00:01:12, Serial0
C    15.0.0.0/8 is directly connected, Serial0


Step 5(A): Make a Web Server to the Host C.

  1. Make a Web Page & Save it on Desktop.
  2. Go to Start Button > All Programs > Administrative Tool > Internet Service Manager
  3. Right Click on the Computer name & goes to New tab > Web Site.
  4. Follow the wizard and make the Web Server.

Step 5(B): Make a Ftp Server to the Host D.

  1. Make a Web Page & Save it on Desktop.
  2. Go to Start Button > All Programs > Administrative Tool > Internet Service Manager
  3. Right Click on the Computer name & goes to New tab > FTP Site.
  4. Follow the wizard and make the FTP Server.
  
Step 6(A): Verifying the Access of Web Server by the Host ‘A’.



Step 6(B): Verifying the Access of Ftp Server by the Host ‘A’.



Step 6(C): Verifying the Access of Web Server by the Host ‘B’.



Step 6(D): Verifying the Access of Web Server by the Host ‘B’.



Step 7(A): Make the Standard ACL on  the Router R2 so that Host A can not
                        accesses the Web & Ftp Server.

R2(config)#access-list 10 deny host 10.0.0.1
R2(config)#access-list 10 permit any
R2(config-if)#end

Step 7(B): Apply the Standard ACL on  the Router (R2) Serial Interface.

R2(config)#interface serial 0
R2(config-if)#ip access-group 10 in
R2(config-if)#end

Step 8(A): Verifying the Standard ACL from Host ‘A’ by accessing Web Server.



Step 8(B): Verifying the Standard ACL from Host ‘A’ by accessing Ftp Server.    
        


Step 8(C): Verifying the Standard ACL from Host ‘B’ by accessing Web Server.


Step 8(D): Verifying the Standard ACL from Host ‘B’ by accessing Ftp Server.       
     



No comments:

Post a Comment