CCNA4-1 Chapter 5 Access Control Lists (ACLs). CCNA4-2 Chapter 5 Securing Networks-How? Packet Filtering: Packet Filtering: Controls access to a network.

Slides:



Advertisements
Similar presentations
Access Control List (ACL)
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Access Control Lists John Mowry.
Chapter 9: Access Control Lists
Basic IP Traffic Management with Access Lists
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Introducing ACLs.
© 2007 Cisco Systems, Inc. All rights reserved.ICND2 v1.0—6-1 Access Control Lists Introducing ACL Operation.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Access Control Lists Accessing the WAN – Chapter 5.
NESCOT CATC1 Access Control Lists CCNA 2 v3 – Module 11.
WXES2106 Network Technology Semester /2005 Chapter 10 Access Control Lists CCNA2: Module 11.
CCNA 2 v3.1 Module 11.
Access Lists Lists of conditions that control access.
Year 2 - Chapter 6/Cisco 3 - Module 6 ACLs. Objectives  Define and describe the purpose and operation of ACLs  Explain the processes involved in testing.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
1 Semester 2 Module 11 Access Control Lists (ACLs) Yuda college of business James Chen
Access Control Lists (ACLs)
© 2002, Cisco Systems, Inc. All rights reserved..
1 Lecture #5 Access Control Lists (ACLs) Asst.Prof. Dr.Anan Phonphoem Department of Computer Engineering, Faculty of Engineering, Kasetsart University,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Access Control List ACL. Access Control List ACL.
Access Control Lists (ACLs)
Access Control List (ACL) W.lilakiatsakun. ACL Fundamental ► Introduction to ACLs ► How ACLs work ► Creating ACLs ► The function of a wildcard mask.
Ch. 11 – Access Control Lists CCNA 2 version 3.0.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Chapter 5 Lecture Week 5 Access Control Lists (ACLs)
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Access Control List (ACL)
CCNA – Cisco Certified Network Associates Access Control List (ACL) By Roshan Chaudhary Lecturer Islington College.
Access-Lists Securing Your Router and Protecting Your Network.
ACLs ACLs are hard. Read, read, read. Practice, practice, practice ON TEST4.
Page 1 Access Lists Lecture 7 Hassan Shuja 04/25/2006.
Access Control List ACL’s 5/26/ What Is an ACL? An ACL is a sequential collection of permit or deny statements that apply to addresses or upper-layer.
CCNA4-1 Chapter 5 Access Control Lists (ACLs). CCNA4-2 Chapter 5 Access Control Lists Using ACLs to Secure Networks.
1 What Are Access Lists? –Standard –Checks Source address –Generally permits or denies entire protocol suite –Extended –Checks Source and Destination address.
Semester 3 Chapter 6 ACLs. Overview Router can provide basic traffic filtering capability Access Control Lists can prevent packets from passing through.
Ch. 5 – Access Control Lists. Part 1: ACL Fundamentals.
CCNA4-1 Chapter 5 Access Control Lists (ACLs). CCNA4-2 Chapter 5 Access Control Lists Using ACLs to Secure Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – 6 IP Access Lists 1.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
Restricting Access in the network
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
ACCESS CONTROL LIST.
Access Control Lists (ACL). Access-List Overview 4 A Filter through which all traffic must pass 4 Used to Permit or Deny Access to Network 4 Provides.
Access Control Lists Mark Clements. 17 March 2009ITCN 2 This Week – Access Control Lists What are ACLs? What are they for? How do they work? Standard.
Wild Stuff ExtendedACLGeneralACLStandardACL Got the Right Number?
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
1 Pertemuan 24 Access Control List Fundamentals. Discussion Topics Introduction ACLs How ACLs work Creating ACLs The function of a wildcard mask Verifying.
Ch. 5 – Access Control Lists. Part 1: ACL Fundamentals.
1 Access Control Lists (ACLs). 222 Overview 1.Network administrators must be able to a.deny unwanted access to a network and b.allow authorized users.
CCNA4-1 Chapter 5 Access Control Lists (ACLs) Chapter 12.
Instructor Materials Chapter 7: Access Control Lists
Instructor Materials Chapter 4: Access Control Lists
Managing IP Traffic with ACLs
Managing IP Traffic with ACLs
Introducing ACL Operation
Chapter 4: Access Control Lists (ACLs)
Access Control Lists (ACLs)
Access Control Lists Last Update
Chapter 7: Access Control Lists
Chap 5 – Access Control Lists Learning Objectives
Chapter 4: Access Control Lists
Access Control Lists CCNA 2 v3 – Module 11
Access Control Lists (ACLs)
Presentation transcript:

CCNA4-1 Chapter 5 Access Control Lists (ACLs)

CCNA4-2 Chapter 5 Securing Networks-How? Packet Filtering: Packet Filtering: Controls access to a network by analyzing the incoming and outgoing packets and passing or halting them based on stated criteria.Controls access to a network by analyzing the incoming and outgoing packets and passing or halting them based on stated criteria.

CCNA4-3 Chapter 5 Using ACLs to Secure Networks ACLs enable you to control traffic into and out of your network. ACLs enable you to control traffic into and out of your network. Can be as simple as permitting or denying network hosts or addresses.Can be as simple as permitting or denying network hosts or addresses. Or to control network traffic based on the TCP port being used.Or to control network traffic based on the TCP port being used.

CCNA4-4 Chapter 5 Using ACLs to Secure Networks For Example: Web HTML OK for Network A but not for Network B. For Example: Web HTML OK for Network A but not for Network B.

CCNA4-5 Chapter 5 What is an ACL? An Access Control List (ACL) is: An Access Control List (ACL) is: A sequential list of permit or deny statements.A sequential list of permit or deny statements. Apply to IP addresses (Layer 3 header)Apply to IP addresses (Layer 3 header) Apply to upper-layer protocols (Layer 4 header).Apply to upper-layer protocols (Layer 4 header). Controls whether a router permits or denies packets to pass through the router.Controls whether a router permits or denies packets to pass through the router. By default, a router does not have any ACLs. By default, a router does not have any ACLs.

CCNA4-6 Chapter 5 Why do we need ACLs? Limit network traffic and increase network performance. Limit network traffic and increase network performance. Provide traffic flow control. Provide traffic flow control. Provide a basic level of security for network access. Provide a basic level of security for network access. Decide which types of traffic are forwarded or blocked at the router interfaces.Decide which types of traffic are forwarded or blocked at the router interfaces. Allow an administrator to control what areas a client can access on a network.Allow an administrator to control what areas a client can access on a network. Screen certain hosts to either allow or deny access to part of a network.Screen certain hosts to either allow or deny access to part of a network. Grant or deny user permission to access only certain types of files such as FTP or HTTP.Grant or deny user permission to access only certain types of files such as FTP or HTTP.

CCNA4-7 Chapter 5 The Three P’s One ACL per protocol: One ACL per protocol: An ACL must be defined for each protocol enabled on the interface.An ACL must be defined for each protocol enabled on the interface. One ACL per direction: One ACL per direction: ACLs control traffic in one direction at a time on an interface.ACLs control traffic in one direction at a time on an interface. Two separate ACLs must be created to control:Two separate ACLs must be created to control: Inbound Traffic: Traffic coming into the interface.Inbound Traffic: Traffic coming into the interface. Outbound Traffic: Traffic leaving an interface.Outbound Traffic: Traffic leaving an interface. One ACL per interface: One ACL per interface: ACLs control traffic for an interface (Fa0/0, s0/0/0).ACLs control traffic for an interface (Fa0/0, s0/0/0).

CCNA4-8 Chapter 5 The Three P’s One Access Control List per protocol.One Access Control List per protocol. One Access Control List per direction.One Access Control List per direction. One Access Control List per interface.One Access Control List per interface. How many possible ACLs?How many possible ACLs? 3 protocols X 2 directions X 2 ports3 protocols X 2 directions X 2 ports Possibility of 12 separate lists.Possibility of 12 separate lists. Note that the same list can be used on multiple interfaces.Note that the same list can be used on multiple interfaces. Fa0/0Fa0/0S0/0/0S0/0/0

CCNA4-9 Chapter 5 How ACLs Work We have to assign the list of ACLs to the interface and specify the direction of the traffic to be checked. We have to assign the list of ACLs to the interface and specify the direction of the traffic to be checked. InboundACLInboundACL

CCNA4-10 Chapter 5 How ACLs Work ACL statements are processed in a sequential, logical order. ACL statements are processed in a sequential, logical order. The logic used to create the list and the order of the list items is very important. The logic used to create the list and the order of the list items is very important. InboundACLInboundACL

CCNA4-11 Chapter 5 How ACLs Work If a condition match is true, the packet is permitted or denied and the rest of the ACL statements are not checked. If a condition match is true, the packet is permitted or denied and the rest of the ACL statements are not checked. If all the ACL statements are unmatched, an implicit deny any statement is placed at the end of the list by default. If all the ACL statements are unmatched, an implicit deny any statement is placed at the end of the list by default. Implicit Deny InboundACLInboundACL

CCNA4-12 Chapter 5 How ACLs Work Before a packet is forwarded to an outbound interface, the router checks the routing table. Before a packet is forwarded to an outbound interface, the router checks the routing table. Next, the router checks to see whether the outbound interface is assigned to an ACL List. Next, the router checks to see whether the outbound interface is assigned to an ACL List. OutboundACLOutboundACL

CCNA4-13 Chapter 5 How ACLs Work If no ACL is present, the packet is forwarded out the interface. If no ACL is present, the packet is forwarded out the interface. If an ACL is present, the packet is tested by the combination of ACL statements that are associated with that interface. If an ACL is present, the packet is tested by the combination of ACL statements that are associated with that interface. OutboundACLOutboundACL

CCNA4-14 Chapter 5 How ACLs Work The packet is either permitted (sent to the outbound interface) or denied (dropped). The packet is either permitted (sent to the outbound interface) or denied (dropped). If the packet does not meet any of the criteria, it is dropped (Implicit Deny). If the packet does not meet any of the criteria, it is dropped (Implicit Deny). OutboundACLOutboundACL Implicit Deny

CCNA4-15 Chapter 5 How ACLs Work Access list statements operate in sequential, logical order. Access list statements operate in sequential, logical order. They evaluate packets from the top - down. They evaluate packets from the top - down. Once there is an access list statement match, the router skips the rest of the statements. Once there is an access list statement match, the router skips the rest of the statements. If a condition match is true, the packet is permitted or denied. If a condition match is true, the packet is permitted or denied. There can be only one access list per protocol, per interface. There can be only one access list per protocol, per interface. There is an at the end of every access list. There is an implicit deny any at the end of every access list. ACLs do not block packets that originate within the router. (i.e. pings, telnets, ssh, etc.)ACLs do not block packets that originate within the router. (i.e. pings, telnets, ssh, etc.)

CCNA4-16 Chapter 5 Types of Cisco ACLs Two types: Two types: Standard ACLs:Standard ACLs: Standard ACLs allow you to permit or deny traffic based on the source IP addresses.Standard ACLs allow you to permit or deny traffic based on the source IP addresses. The destination of the packet and the ports involved do not matter.The destination of the packet and the ports involved do not matter. Permit all traffic from network /24 network.Permit all traffic from network /24 network. Because of the implied "deny any" at the end, all other traffic is blocked with this ACL.Because of the implied "deny any" at the end, all other traffic is blocked with this ACL.

CCNA4-17 Chapter 5 Types of Cisco ACLs Two types: Two types: Extended ACLs:Extended ACLs: Extended ACLs filter IP packets based on several attributes;Extended ACLs filter IP packets based on several attributes; Protocol type, source and/or destination IP address, source and/or destination TCP or UDP ports.Protocol type, source and/or destination IP address, source and/or destination TCP or UDP ports. Permits traffic originating from any address on the /24 network to any destination host port 80 (HTTP).Permits traffic originating from any address on the /24 network to any destination host port 80 (HTTP).

CCNA4-18 Chapter 5 Numbering and Naming ACLs Using numbered ACLs is an effective method for determining the ACL type on smaller networks with more homogeneously defined traffic. Using numbered ACLs is an effective method for determining the ACL type on smaller networks with more homogeneously defined traffic.

CCNA4-19 Chapter 5 Numbering and Naming ACLs When configuring ACLs on a router, each ACL must be uniquely identified by assigning a number. When configuring ACLs on a router, each ACL must be uniquely identified by assigning a number. access list 8 permit… access list 1 permit… access list 2 permit… access list 3 permit… access list 4 permit… access list 1 permit… access list 2 permit… access list 3 permit… access list 4 permit… One group numbered 8 Multiple groups

CCNA4-20 Chapter 5 Numbering and Naming ACLs Using named ACLs: Using named ACLs: A numbered ACL does not tell you the purpose of the list.A numbered ACL does not tell you the purpose of the list. Starting with Cisco IOS Release 11.2, you can use a name to identify a Cisco ACL.Starting with Cisco IOS Release 11.2, you can use a name to identify a Cisco ACL.

CCNA4-21 Chapter 5 Where to Place ACLs ACLs can act as firewalls to filter packets and eliminate unwanted traffic. ACLs can act as firewalls to filter packets and eliminate unwanted traffic. Every ACL should be placed where it has the greatest impact on efficiency.Every ACL should be placed where it has the greatest impact on efficiency. The basic rules are:The basic rules are: Standard ACLs do not specify a destination address. Place them as close to the destination as possible.Standard ACLs do not specify a destination address. Place them as close to the destination as possible. Extended ACLs are located as close as possible to the source of the traffic denied.Extended ACLs are located as close as possible to the source of the traffic denied. Undesirable traffic is filtered without crossing the network infrastructure.Undesirable traffic is filtered without crossing the network infrastructure.

CCNA4-22 Chapter 5 Where to Place ACLs The administrator wants to prevent traffic originating in the /24 network from getting to /24. The administrator wants to prevent traffic originating in the /24 network from getting to /24. Standard ACL placed closest to the destination of the traffic.

CCNA4-23 Chapter 5 Where to Place ACLs The administrator wants to deny Telnet and FTP traffic from /24 to /24. At the same time, other traffic must be permitted to leave /24. The administrator wants to deny Telnet and FTP traffic from /24 to /24. At the same time, other traffic must be permitted to leave /24. Extended ACL placed closest to the source of the traffic.

CCNA4-24 Chapter 5 General Guidelines for Creating ACLs ACL Best Practices: ACL Best Practices:

CCNA4-25 Chapter 5 Access Control Lists Configuring Standard ACLS

CCNA4-26 Chapter 5 Configuring a Standard ACL To configure a standard ACL you must: To configure a standard ACL you must: Create the standard ACLCreate the standard ACL Activate the ACL on an interface.Activate the ACL on an interface. The access-list global configuration command defines a standard ACL with a number in the range of 1 to 99 or 1300 to 1399.The access-list global configuration command defines a standard ACL with a number in the range of 1 to 99 or 1300 to 1399.

CCNA4-27 Chapter 5 Configuring a Standard ACL For Example: For Example: To create a numbered ACL designated 10 that would permit network /24, you would enter:To create a numbered ACL designated 10 that would permit network /24, you would enter: To remove an access list, use the no form of the command.To remove an access list, use the no form of the command.

CCNA4-28 Chapter 5 Configuring a Standard ACL For Example: For Example: The remark keyword is used for documentation and makes access lists a great deal easier to understand.The remark keyword is used for documentation and makes access lists a great deal easier to understand. Max. 100 characters Note where the access list appears in the running configuration. Note where the access list appears in the running configuration.

CCNA4-29 Chapter 5 ACL Wildcard Masking Wildcard Masking: Wildcard Masking: ACLs statements include wildcard masks.ACLs statements include wildcard masks. (Remember OSPF network entries?)(Remember OSPF network entries?) A wildcard mask is a string of binary digits telling the router to check specific parts of the subnet number.A wildcard mask is a string of binary digits telling the router to check specific parts of the subnet number. The numbers 1 and 0 in the mask identify how to treat the corresponding IP address bits.The numbers 1 and 0 in the mask identify how to treat the corresponding IP address bits. Wildcard masks are referred to as an inverse mask.Wildcard masks are referred to as an inverse mask. Unlike a subnet mask in which binary 1 is equal to a match (network) and binary 0 is not a match (host), the reverse is true.Unlike a subnet mask in which binary 1 is equal to a match (network) and binary 0 is not a match (host), the reverse is true. It also does not have to be contiguous 1’s and 0’s.It also does not have to be contiguous 1’s and 0’s.

CCNA4-30 Chapter 5 ACL Wildcard Masking Wildcard Masking: Wildcard Masking: Wildcard masks use the following rules to match binary 1s and 0s:Wildcard masks use the following rules to match binary 1s and 0s: Wildcard mask bit 0:Wildcard mask bit 0: The corresponding bit value in the IP Address to be tested must match the bit value in the address specified in the ACL.The corresponding bit value in the IP Address to be tested must match the bit value in the address specified in the ACL. Wildcard mask bit 1:Wildcard mask bit 1: Ignore the corresponding bit value.Ignore the corresponding bit value.

CCNA4-31 Chapter 5 ACL Wildcard Masking Network Subnet Mask Subnet Mask Subnet Mask plus Wildcard Mask plus Wildcard Mask We can calculate the Wildcard Mask using the Subnet Mask minus Subnet Mask minus Subnet Mask Wildcard Mask Wildcard Mask Checking/Calculating the Wildcard Mask

CCNA4-32 Chapter 5 Permit the following networks: Address / Wildcard Mask E D C B A Time for some Practice! RouterB(config)#access-list 10 permit ? ? Permit the following hosts: All hosts C B A

CCNA4-33 Chapter 5 ACL Wildcard Masking Wildcard Masking: Wildcard Masking: Just this host Any Host Subnet Hosts

CCNA4-34 Chapter 5 ACL Wildcard Masking Wildcard Masking: Wildcard Masking: All IP addresses that have a match in the first 20 bits of the address. All Subnets to All IP addresses that have a match in the first 20 bits of the address. All Subnets to

CCNA4-35 Chapter Wildcard Masking: Wildcard Masking: ACL Wildcard Masking All IP addresses that have a match in the first 16 bits of the address and the last bit of the second octet. All Odd numbered subnets in All IP addresses that have a match in the first 16 bits of the address and the last bit of the second octet. All Odd numbered subnets in

CCNA4-36 Chapter 5 ACL Wildcard Masking Wildcard Bit Mask Keywords: Wildcard Bit Mask Keywords: The keywords host and any help identify the most common uses of wildcard masking.The keywords host and any help identify the most common uses of wildcard masking. host:host: Used instead of for the wildcard mask (all IP address bits must match).Used instead of for the wildcard mask (all IP address bits must match). any:any: Used instead of for the wildcard mask (accept any addresses).Used instead of for the wildcard mask (accept any addresses).

CCNA4-37 Chapter 5 ACL Wildcard Masking Wildcard Bit Mask Keywords: Wildcard Bit Mask Keywords: OROR OROR OROR OROR

CCNA4-38 Chapter 5 Applying Standard ACLs to Interfaces You can define ACLs without applying them but they will have no effect until they are applied to the router's interface. You can define ACLs without applying them but they will have no effect until they are applied to the router's interface. Remember……It is a good practice to:Remember……It is a good practice to: Apply the Standard ACLs on the interface closest to the destination of the traffic.Apply the Standard ACLs on the interface closest to the destination of the traffic. Apply Extended ACLs on the interface closest to the source of the traffic.Apply Extended ACLs on the interface closest to the source of the traffic.

CCNA4-39 Chapter 5 Applying Standard ACLs to Interfaces Apply the standard ACL to an interface using the following command: Apply the standard ACL to an interface using the following command: The number or name assigned during the access-list configuration. Consider the traffic from the router’s viewpoint. in : Traffic that is arriving on the interface. out : Traffic that has already been routed by the router and is leaving the interface. Consider the traffic from the router’s viewpoint. in : Traffic that is arriving on the interface. out : Traffic that has already been routed by the router and is leaving the interface.

CCNA4-40 Chapter 5 Applying Standard ACLs to Interfaces Example 1: Example 1: Allow only traffic from network to exit the network on S0/0/0. Block any traffic from any other network.Allow only traffic from network to exit the network on S0/0/0. Block any traffic from any other network.

CCNA4-41 Chapter 5 Applying Standard ACLs to Interfaces Example 2: Example 2: Deny any traffic from host and allow any other traffic to exit the network on S0/0/0. Block any traffic from any other network.Deny any traffic from host and allow any other traffic to exit the network on S0/0/0. Block any traffic from any other network.

CCNA4-42 Chapter 5 Applying Standard ACLs to Interfaces Example 3: Example 3: Deny any traffic from host and allow any other subnet traffic to exit the network on S0/0/0.Deny any traffic from host and allow any other subnet traffic to exit the network on S0/0/0.

CCNA4-43 Chapter 5 Applying Standard ACLs to Interfaces Using an ACL to Control VTY Access: Using an ACL to Control VTY Access: If your router does not support SSH, this technique allows you to define which IP addresses are allowed Telnet access to the router EXEC process.If your router does not support SSH, this technique allows you to define which IP addresses are allowed Telnet access to the router EXEC process. access-class access-list-number {in [vrf-also] | out} access-class access-list-number {in [vrf-also] | out} List number in – restricts incoming connections out – restricts outgoing connections in – restricts incoming connections out – restricts outgoing connections

CCNA4-44 Chapter 5 Using an ACL to Control VTY Access Creating the ACLs: Applying the ACLs:

CCNA4-45 Chapter 5 Editing Numbered ACLs When configuring an ACL, the statements are added in the order that they are entered at the end of the ACL. When configuring an ACL, the statements are added in the order that they are entered at the end of the ACL. There is no built-in editing feature that allows you to edit a change in an ACL.There is no built-in editing feature that allows you to edit a change in an ACL. You cannot selectively insert or delete lines.You cannot selectively insert or delete lines. It is strongly recommended that any ACL be constructed in a text editor such as Notepad.It is strongly recommended that any ACL be constructed in a text editor such as Notepad.

CCNA4-46 Chapter 5 Editing Numbered ACLs When configuring an ACL, the statements are added in the order that they are entered at the end of the ACL. When configuring an ACL, the statements are added in the order that they are entered at the end of the ACL. Four Steps:Four Steps: Display the ACL using the show running-config command.Display the ACL using the show running-config command. Highlight the ACL, copy it, and then paste it into Notepad.Highlight the ACL, copy it, and then paste it into Notepad. Make your changes.Make your changes. Disable the access list using the no access-list command. Otherwise, the new statements would be appended to the existing ACL.Disable the access list using the no access-list command. Otherwise, the new statements would be appended to the existing ACL. Paste the new ACL into the configuration of the router.Paste the new ACL into the configuration of the router.

CCNA4-47 Chapter 5 Editing Numbered ACLs Be aware that when you use the no access-list command, no ACL is protecting your network. Be aware that when you use the no access-list command, no ACL is protecting your network. If you make an error in the new list, you have to disable it and troubleshoot the problem.If you make an error in the new list, you have to disable it and troubleshoot the problem

CCNA4-48 Chapter 5 Creating Standard Named ACLs Naming an ACL makes it easier to understand. Naming an ACL makes it easier to understand. Must be unique and cannot start with a number. Configure the permit / deny statements. Activate the ACL on the interface using the name.

CCNA4-49 Chapter 5 Creating Standard Named ACLs Naming an ACL makes it easier to understand. Naming an ACL makes it easier to understand.

CCNA4-50 Chapter 5 Monitoring and Verifying ACLs Remember that there is an implied deny any at the end of each access control list.

CCNA4-51 Chapter 5 Editing Named ACLs Named ACLs have a big advantage over numbered ACLs in that they are easier to edit. Named ACLs have a big advantage over numbered ACLs in that they are easier to edit.