CCNA 2 v3.1 Module 11

Access Control Lists (ACLs)

© 2004 Cisco Systems, Inc. All rights reserved.

1

Purpose of This PowerPoint

• This PowerPoint primarily consists of the Target

Indicators (TIs) of this module in CCNA version

3.1.

• It was created to give instructors a PowerPoint to take and modify as their own.

• This PowerPoint is:

NOT a study guide for the module final assessment.

NOT a study guide for the CCNA certification exam.

• Please report any mistakes you find in this

PowerPoint by using the Academy Connection

Help link.

© 2004, Cisco Systems, Inc. All rights reserved.

To Locate Instructional Resource

Materials on Academy Connection:

• Go to the Community FTP Center to locate materials created by the instructor community

• Go to the Tools section

• Go to the Alpha Preview section

• Go to the Community link under Resources

• See the resources available on the Class home page for classes you are offering

• Search http://www.cisco.com

• Contact your parent academy!

© 2004, Cisco Systems, Inc. All rights reserved.

Objectives

© 2004, Cisco Systems, Inc. All rights reserved.

What are ACLs?

• ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny.

© 2004, Cisco Systems, Inc. All rights reserved.

How ACLs Work

© 2004, Cisco Systems, Inc. All rights reserved.

Protocols with ACLs Specified by

Numbers

© 2004, Cisco Systems, Inc. All rights reserved.

Creating ACLs

© 2004, Cisco Systems, Inc. All rights reserved.

The Function of a Wildcard Mask

© 2004, Cisco Systems, Inc. All rights reserved.

Verifying ACLs

• There are many show commands that will verify the content and placement of ACLs on the router.

show ip interface show access-lists

Show running-config

© 2004, Cisco Systems, Inc. All rights reserved.

Standard ACLs

© 2004, Cisco Systems, Inc. All rights reserved.

Extended ACLs

© 2004, Cisco Systems, Inc. All rights reserved.

Named ACLs

© 2004, Cisco Systems, Inc. All rights reserved.

Placing ACLs

• Standard ACLs should be placed close to the destination.

• Extended ACLs should be placed close to the source.

© 2004, Cisco Systems, Inc. All rights reserved.

Firewalls

A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders.

© 2004, Cisco Systems, Inc. All rights reserved.

Restricting Virtual Terminal Access

© 2004, Cisco Systems, Inc. All rights reserved.

Summary

© 2004, Cisco Systems, Inc. All rights reserved.