Lab 6-.Access Control List in Packet Tracer
Lab 6-.Access Control List in Packet Tracer
The goal of this lab is to become familiar with the configuration of Access Control Lists (ACLs)
in Packet Tracer.
Instructions:
• You are supposed to provide the answers to the questions listed at the end of this document
and upload the completed report to the Moodle.
• Avoid plagiarism by copying from the Internet or from your peers. Your submitted work
should be written by yourself.
• Deadline for submission on Moodle is by 5pm Friday 22nd May, 2020. You must submit a
word document that provides answers to the questions given at the end.
In order to filter network traffic, ACLs control whether routed packets are forwarded or blocked
at the router interface. Your router examines each packet in order to determine whether to
forward or drop the packet based on the criteria that you specify within the ACL.
Complete these steps in order to construct an ACL as the examples in this document show:
1. Create an ACL.
2. Apply the ACL to an interface.
The IP ACL is a sequential collection of permit and deny conditions that apply to an IP packet.
The router tests packets against the conditions in the ACL one at a time.
The first match determines whether the Cisco IOS Software accepts or rejects the packet.
Because the Cisco IOS Software stops testing conditions after the first match, the order of the
conditions is critical. If no conditions match, the router rejects the packet because of an implicit
deny all clause.
Types of ACL:
There are two main different types of Access-list namely:
Lab 6: Configuring Access Control Lists (ACLs)
1. Standard Access-list – These are the Access-list which are made using the source IP
address only. These ACLs permit or deny the entire protocol suite. They don’t distinguish
between the IP traffic such as TCP, UDP, HTTPs etc. By using numbers 1-99 or 1300-
1999, router will understand it as a standard ACL and the specified address as source IP
address.
2. Extended Access-list – These are the ACL which uses both source and destination IP
address. In this type of ACL, we can also mention which IP traffic (for example TCP/UDP
etc) should be allowed or denied. These use range 100-199 and 2000-2699.
Advantages of ACL:
• Provides security as administrator can configure the access list according to the needs
and deny the unwanted packets from entering the network.
• Provides control over the traffic as it can permit or deny according to the need of
network.
1. access-list command
A standard ACL provides the ability to match traffic based on the source address of the traffic
only. This is, of course, rather limiting, but in many situations is all that is required. The
command syntax of a standard ACL is as follows:
2. ip access-group command
To apply an IPv4 access control list (ACL) to a Layer 3 interface as a router ACL, we use the ip
access-group command. To remove an IPv4 ACL from an interface, we use the no form of this
command.
ip access-group access-list-number {in | out}
no ip access-group access-list-number {in | out}
Syntax Description
access-list-
number Access-list Number
Today’s Lab:
Create the network topology below in Packet Tracer and follow the steps below to configure
the static routes for the remote networks.
1. Assign the IP addresses (provided in the topology diagram) to all the end hosts with the
subnet mask of 255.255.255.0. Also configure the default gateways accordingly.
Student_Router1(config)#int Gig0/0
Student_Router1(config-if)#no shutdown
Student_Router1(config-if)#exit
Student_Router1(config)#int Gig0/1
Student_Router1(config-if)#no shutdown
Student_Router1(config-if)#exit
Lab 6: Configuring Access Control Lists (ACLs)
Student_Router2(config)#int Gig0/0
Student_Router2(config-if)#no shutdown
Student_Router2(config-if)#exit
Student_Router2(config)#int Gig0/1
Student_Router2(config-if)#no shutdown
Student_Router2(config-if)#exit
Now, we will configure the routers with the static routing command
Student_Router1>enable
Student_Router1#config terminal
Student_Router2>enable
Student_Router2#config terminal
In the wildcard entry, we use the “0.0.0.0” address because we only wanted to block that
particular host. This will deny any communication from the source IP address of
“192.168.20.4”. In the next command, parameter “any” permits the communication for all the
other hosts.
Note: The order of statements is critical to the operation of an ACL. If the order of the entries
is reversed above, the ACL will fail to block host 192.168.20.4.
Student_Router1(config)#int gig0/0
Student_Router1(config-if)#exit
In the command, we specify “out” which corresponds to the outbound traffic (any traffic going
out of the interface).
This will apply the access list to the interface giga ethernet 0/0. Now, “192.168.20.4” will not
be able to send traffic to the “Student_Router1” interface gig 0/0 (to the corresponding network
“192.168.1.0” i.e neither to 192.168.1.2 nor to 192.168.1.3).
“show access-lists” is the command to see the configured access list of the router.
If we want to add a new host AdminPC2 with IP address “192.168.20.3”, we have to do the
following configuration. First, we have to delete the command permit any with the following
command.
Lab 6: Configuring Access Control Lists (ACLs)
Question 3: How will you ensure that AttackerPC1 is unable to access StudentPC1?
(Snapshot/s Required) [2 Mark]
Question 4: How will you ensure that StudentPC2 is still able to access StudentPC1?
(Snapshot/s Required) [2 Marks]