Module 5: ACLs for IPv4 Configuration Flashcards
A network administrator configures an ACL with the command R1(config)# access-list 1 permit 172.16.0.0 0.0.15.255
Which IP address ranges will match this ACL statement?
172.16.0.0 to 172.16.15.255
What IOS command is used to create a numbered standard IPv4 ACL?
access-list access-list-number {deny | permit | remark text} source [source-wildcard]
What IOS command is used to create a named standard IPv4 ACL?
ip access-list standard {access-list-name}
Why is it best practice to name ACLs with all UPPPERCASE?
Because they are case sensitive. Only using uppercase means you’re less likely to create two different ACLs with the same name but different capitalisation.
After you create a standard ACL, what must you do next?
Link it to an interface or feature.
What IOS command is used to link a standard ACL to an interface?
ip access-group {access-list-number | access-list-name} {in | out}
What would the following series of IOS commands accomplish?
~~~
R1(config)# access-list 10
R1(config)# access-list 10 permit host 192.168.10.10
R1(config)# do show access-lists
Standard IP access list 10
10 permit 192.168.10.10
R1(config)#
~~~
Creates a numbered standard ACE which permits host 192.168.10.10 to access any destination.
Because of the implict deny ACE that exists on all ACLs, if this is the only ACE present all other traffic would be blocked
What IOS command displays all ACLs?
do show access-list
show run | section access-list
also works and shows remarks
What IOS commands would apply ACL 10 outbound on the Serial 0/1/0 interface?
There’s more than one command required
interface Serial 0/1/0 ip access-group 10 out end
How can we show remarks
statements added to ACLs?
They don’t show up on do show access-list
We have to use show run | section access-list
to display it from the running configuration.
What series of commands would be necessary to create a named IPv4 standard ACL called PERMIT-ACCESS, which allows host 192.168.10.10 to accesss any destination host?
ip access-list standard PERMIT-ACCESS
permit host 192.168.10.10
We can add a remark with remark ACE permits host 12.168.10.10
Because of the implict deny ACE that exists on all ACLs, if this is the only ACE present all other traffic would be blocked
What series of commands would be necessary to create a named IPv4 standard ACL called PERMIT-ACCESS, which allows all hosts on the 192.168.20.0/24 network to accesss any destination host?
ip access-list PERMIT-ACCESS permit 192.168.20.0 0.0.0.255
What IOS command could we use to verify an interface called Serial 0/1/0 has an ACL applied to it?
show ip interface Serial 0/1/0
We could filter to just the relevant section with show ip interface Serial 0/1/0 | include access list
What are the IOS commands to:
1. Create a named standard ACL called LAN2-FILTER.
2. Create an ACE within it that permits host 192.168.10.10
3. Create an ACE that denys any other traffic
4. Return to global configuration mode
ip access-list standard LAN2-FILTER permit host 192.168.10.10 deny any exit
What are the IOS commands to:
1. Enter interface g0/0/1
2. Apply a named ACL LAN2-FILTER outbound
3. Return to global configuration mode
interface g0/0/1 ip access-list standard LAN2-FILTER out exit
What are ACL Statistics?
What IOS command displays them?
They show the number of times each ACE has been matched.show access-lists
Why might you create an ACE deny any
despite the hidden implicity deny on all ACLs?
To track the number of times access has been denied using ACL statistics.
What IOS command resets the ACL Statistics for the named ACL NO-ACCESS?
clear access-list counters NO-ACCESS
Typically ACLs filter incoming and outgoing traffic on an interface. What impact would creating an ACL on a vty line have?
It would secure remote administrative access to the device.
Why would you typically only ever have a vty line ACL using the in
parameter?
Because vty lines are used for remote access and aren’t used for outbound connections.
Supoose we have an ACL called ADMIN-HOST that permits only specific IP addresses inbound access.
What IOS commands are required for the following next steps:
1. Enter vty config mode for vty lines 0 15
2. Set the login local method
3. Only allow SSH
4. Apply the ACL ADMIN-HOST
R1(config)# line vty 0 4 R1(config-line)# login local R1(config-line)# transport input ssh R1(config-line)# access-class ADMIN-HOST in
What IOS command is required to create a Numbered Extended ACL that permits HTTP traffic from the source network 192.168.1.0/24 to the destination 10.0.0.0/8?
access-list 100 permit tcp 192.168.1.0 0.0.0.255 10.0.0.0 0.255.255.255 eq 80
What does the {protocol}
parameter of an Extended ACL do?
What are some common keywords?
Sets the matching protocols by name, number or keyword.
Common keywords:
- ip
- tcp
- udp
- icmp
What does the operator part of the [operator {port}]
parameter of an Extended ACL do?
What are some common keywords?
Give an example of a the full parameter
The operator allows for logical operators to be checked against the port that is listed.
Common keywords:
* lt (less than)
* gt (greater than)
* eq (equal)
* neq (not equal)
eq 8080
matches port 8080