4.1.3.4 Packet Tracer - Configuring IPv6 ACLs
4.1.3.4 Packet Tracer - Configuring IPv6 ACLs
Topology
Addressing Table
Objectives
Part 1: Configure, Apply, and Verify an IPv6 ACL
Part 2: Configure, Apply, and Verify a Second IPv6 ACL
Step 1: Configure an ACL that will block HTTP and HTTPS access.
Configure an ACL named BLOCK_HTTP on R1 with the following statements.
a. Block HTTP and HTTPS traffic from reaching Server3.
R1(config)# deny tcp any host 2001:DB8:1:30::30 eq www
R1(config)# deny tcp any host 2001:DB8:1:30::30 eq 443
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 2
Step 3: Verify the ACL implementation.
Verify that the ACL is operating as intended by conducting the following tests:
Open the web browser of PC1 to http://2001:DB8:1:30::30 or https://2001:DB8:1:30::30. The website
should appear.
The logs now indicate that your server is receiving pings from many different IPv6 addresses in a Distributed Denial of
Service (DDoS) attack. You must filter ICMP ping requests to your server.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 2
Packet Tracer - Configuring IPv6 ACLs
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 2
Open the web browser of PC1 to http://2001:DB8:1:30::30 or https://2001:DB8:1:30::30. The website should
display.
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 2