D 3 Challenge Acl Lab
D 3 Challenge Acl Lab
Serial Enable,
FastEthernet 0/0 0/0/0 Enable vty, and
Host Interface Serial 0/0/0 Interface Network Secret Console
Device Name IP Address IP Address Type Statements Password Password
192.168.1.0
Router 1 R1 192.168.1.1/24 192.168.5.1/30 DCE class cisco
192.168. 5.0
192.168. 5.0
Router 2 R2 172.17.0.1/16 192.168.5.2/30 DTE class cisco
172.17.0.0
Switch 1 S1 class cisco
192.168.1.5/24
Host 1 Host 1
GW=192.168.1.1
192.168.1.6/24
Host 2 Host 2
GW=192.168.1.1
Discovery 172.17.1.1/16
Server
Server GW=172.17.0.1
Objectives
• Configure and verify ACLs to control traffic.
• Verify ACLs using the logging capabilities of the router.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 5
CCNA Discovery
Introducing Routing and Switching in the Enterprise
Background / Preparation
Cable a network similar to the one shown in the topology diagram. Any router that meets the interface
requirements displayed in the above diagram may be used. For example, router series 800, 1600, 1700,
1800, 2500, 2600, 2800, or any combination can be used.
The command syntax given in the lab may vary. For example, the interfaces may differ due to the router
model. On some routers Serial 0 may be Serial 0/0 or Serial 0/0/0 and Ethernet 0 may be FastEthernet 0/0.
The Cisco Catalyst 2960 switch comes preconfigured and only needs to be assigned basic security
information before being connected to a network.
The following resources are required:
• One Cisco 2960 switch or other comparable switch
• Two Cisco 1841 or equivalent routers, both with a Serial connection and an Ethernet interface
• Two Windows-based PCs, each with a terminal emulation program and set up as a host
• One PC to act as the Discovery Server
• One Discovery Live CD for the server
• At least one RJ-45-to-DB-9 connector console cable to configure the routers and switch
• Three straight-through Ethernet cables
• One crossover Ethernet cable
• One DTE/DCE serial cable
NOTE: Make sure that the routers and the switches have been erased and have no startup configurations.
Instructions for erasing both switch and router are provided in the Lab Manual, located on Academy
Connection in the Tools section.
NOTE: SDM Enabled Routers – If the startup-config is erased in an SDM enabled router, SDM will no longer
come up by default when the router is restarted. It will be necessary to build a basic router configuration using
IOS commands. The steps provided in this lab use IOS commands and do not require the use of SDM. If you
wish to use SDM, refer to the instructions in the Lab Manual, located on the Academy Connection in the Tools
section or contact your instructor if necessary.
NOTE: This lab makes use of the Discovery Server Live CD. For detailed instructions on the installation and
configuration of the Discovery Server Live CD, please refer to the lab manual that is located on Academy
Connection in the Tools Section.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 5
CCNA Discovery
Introducing Routing and Switching in the Enterprise
Step 5: Configure the hosts with the proper IP address, subnet mask, and default gateway
a. Configure each host with the proper IP address, subnet mask, and default gateway.
1) Host 1 should be assigned 192.168.1.5 /24 and the default gateway of 192.168.1.1.
2) Host 2 should be assigned 192.168.1.6 /24 and the default gateway of 192.168.1.1.
3) The server should be assigned 172.17.1.1 and a default gateway of 172.17.0.1.
b. Each host should be able to ping the other hosts. If the ping is not successful, troubleshoot as
necessary. Check and verify that the workstation has been assigned a specific IP address and default
gateway. Do not configure ACLs until each host can ping the other hosts.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 5
CCNA Discovery
Introducing Routing and Switching in the Enterprise
g. Use the command show access-lists to display the access control list and associated statistics.
What information can be obtained from the command output?
___________________________________________________________________________
R1#show access-lists
Extended IP access list 110
10 permit tcp host 192.168.1.5 host 172.17.1.1 eq www (3 matches)
20 permit tcp host 192.168.1.5 host 172.17.1.1 eq ftp (9 matches)
30 permit tcp host 192.168.1.6 host 172.17.1.1 eq telnet (3 matches)
40 deny ip any any (92 matches)
The output of the show access-lists command displays the number of times each access-
list line was matched. In many troubleshooting scenarios, however, this is not enough information.
For example, the output shown above indicates that the deny ip any any line had 92 matches.
But it does not tell you what type of traffic was sent and from what sources the traffic was denied. If
there is an error in an access control list that is blocking traffic to or from a destination that the ACL
was not meant to block, more information is necessary. Logging can be useful in this type of
environment.
The same ACL will be configured on R1; this time, the logging option will be enabled.
NOTE: Turning on the logging option of an access control list is similar to using a debug command.
In a production network, this option can place a heavy load on router resources and slow down the
network or even cause it to fail. In a production network this feature must be used with caution.
h. Remove the ACL on R1 and recreate it with the logging option.
R1(config)#no access-list 110
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 5
CCNA Discovery
Introducing Routing and Switching in the Enterprise
Do the console messages indicate which packets are allowed by the ACL as well as those that are
denied? __________
If you attempt connections very rapidly, a message similar to this one may appear:
*Oct 18 01:26:39.638: %SEC-6-IPACCESSLOGRL: access-list logging rate-
limited or missed 1 packet
This message indicates that the IOS sensed either that a console rate was too high or that the
console was too busy to process all the packets. In this example, it indicates that it missed one
packet. To avoid this situation in a production network, limit the number of access-list lines for
which logging is enabled.
Step 7: Reflection
a. What is an advantage of using the logging option on an ACL versus the information provided by the
show access-lists command?
_______________________________________________________________________________
b. What is a major concern of enabling the logging feature of an access control list?
_______________________________________________________________________________
c. Would you normally log more than one line? Why or why not?
________________________________________________________________________
d. If the network is not performing as expected (e.g. routing updates not occurring, name resolution not
occurring) which ACL statement would you log? ________________________________________
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 5