Standard ACLs Flashcards
Configure a permit or deny entry for a standard named ACL:
R1(config-std-nacl)# […]
[entry-number] {deny | permit} ip wildcard-mask
Enter standard named ACL config mode:
R1(config)# […]
ip access-list standard acl-name
Apply an ACL to an interface:
R1(config-if)# […]
ip access-group acl {in | out}
[…] ACLs should be applied as close to the destination as possible.
Standard
Standard ACLs should be applied as close to the […] as possible.
destination
View all IP ACLs on the router:
R1# […]
show ip access-lists
View all ACLs on the router:
R1# […]
show access-lists
Configure a remark for standard numbered ACL:
R1(config)# […]
access-list number remark remark
Configure a standard numbered ACL entry, permitting or denying all source IPs.
R1(config)# […]
access-list number {deny | permit} any
Configure a standard numbered ACL entry, specifying the IP/mask.
R1(config)# […]
access-list number {deny | permit} ip wildcard-mask
What ranges of numbers can be used to identify standard numbered ACLs?
1-99, 1300-1999
[…] IP ACLs can match based on source/destination IP address and source/destination Layer 4 port.
Extended
[…] IP ACLs can match based on source IP address only.
Standard
The […] tells the router to deny all traffic that doesn’t match any of the configured entries in the ACL.
implicit deny
What will happen if a packet doesn’t match any of the entries in an ACL?
It will be dropped
(‘implicit deny’)