0% found this document useful (0 votes)
19 views5 pages

0.2 Packet Tracer - Configuring Named Standard Acls Nama: Reza Ramadhan Kelompok: Keamanan-Jaringan Ac Nim: 1811500840

The document discusses configuring a standard named ACL to prevent certain clients from accessing a file server. It describes the network topology, objectives of configuring and applying the ACL, and verifying the ACL is working properly by checking which clients can and cannot ping the file and web servers.

Uploaded by

Reza Ramadhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views5 pages

0.2 Packet Tracer - Configuring Named Standard Acls Nama: Reza Ramadhan Kelompok: Keamanan-Jaringan Ac Nim: 1811500840

The document discusses configuring a standard named ACL to prevent certain clients from accessing a file server. It describes the network topology, objectives of configuring and applying the ACL, and verifying the ACL is working properly by checking which clients can and cannot ping the file and web servers.

Uploaded by

Reza Ramadhan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

0.

2 Packet Tracer - Configuring Named Standard ACLs


Nama : Reza Ramadhan
Kelompok : Keamanan-Jaringan AC
NIM : 1811500840
Topology

Addressing Table:

Objectives
Part 1: Configure and Apply a Named Standard ACL
Part 2: Verify the ACL Implementation

Background / Scenario
The senior network engineer has tasked you to create a standard named ACL to prevent access to a
file server. All clients from one network and one specific workstation from a different network should
be denied access.
Part 1: Configure and Apply a Named Standard ACL
Step 1: Verify connectivity before the ACL is configured and applied.

All three workstations should be able to ping both the Web Server and File Server.

Part 2: Verify the ACL Implementation


Step 1: Verify the ACL configuration and application to the interface.
Use the show access-lists command to verify the ACL configuration. Use the show run or show ip

interface Fastethernet 0/1 command to verify that the ACL is applied correctly to the interface.
Step 2: Verify that the ACL is working properly.
All three workstations should be able to ping the Web Server, but only PC1 should be able to ping the
File Server.
Dikarenakan host yang hanya dipermit adalah PC1 maka PC1 bisa terhubung dengan kedua server.
Sedangkan PC0 dan PC 2 bisa terhubung ke WebServer namun tidak bisa mengakses FileServer.

You might also like