Download presentation
Presentation is loading. Please wait.
Published byLisa Higgins Modified over 9 years ago
1
1 © 2003 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.0 Module 11 Access Control Lists (ACLs)
2
222 © 2003, Cisco Systems, Inc. All rights reserved. Purpose of This PowerPoint This PowerPoint primarily consists of the Target Indicators (TIs) of this module in CCNA version 3.0. It was created to give instructors a PowerPoint to take and modify as their own. This PowerPoint is: NOT a study guide for the module final assessment. NOT a study guide for the CCNA certification exam. Please report any mistakes you find in this PowerPoint by using the Academy Connection Help link.
3
333 © 2003, Cisco Systems, Inc. All rights reserved. To Locate Instructional Resource Materials on Academy Connection: Go to the Community FTP Center to locate materials created by the instructor community Go to the Tools section Go to the Alpha Preview section Go to the Community link under Resources See the resources available on the Class home page for classes you are offering Search http://www.cisco.comhttp://www.cisco.com Contact your parent academy!
4
444 © 2003, Cisco Systems, Inc. All rights reserved. Objectives Access control list fundamentals Access control lists (ACLs)
5
555 © 2003, Cisco Systems, Inc. All rights reserved. What are ACLs? ACLs are lists of instructions you apply to a router's interface to tell the router what kinds of packets to accept and what kinds to deny.
6
666 © 2003, Cisco Systems, Inc. All rights reserved. How ACLs Work
7
777 © 2003, Cisco Systems, Inc. All rights reserved. Protocols with ACLs Specified by Numbers
8
888 © 2003, Cisco Systems, Inc. All rights reserved. Creating ACLs
9
999 © 2003, Cisco Systems, Inc. All rights reserved. The Function of a Wildcard Mask
10
10 © 2003, Cisco Systems, Inc. All rights reserved. Verifying ACLs There are many show commands that will verify the content and placement of ACLs on the router. show ip interface show access-lists Show running-config
11
11 © 2003, Cisco Systems, Inc. All rights reserved. Standard ACLs
12
12 © 2003, Cisco Systems, Inc. All rights reserved. Extended ACLs
13
13 © 2003, Cisco Systems, Inc. All rights reserved. Named ACLs
14
14 © 2003, Cisco Systems, Inc. All rights reserved. Placing ACLs Standard ACLs should be placed close to the destination. Extended ACLs should be placed close to the source.
15
15 © 2003, Cisco Systems, Inc. All rights reserved. Firewalls A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders.
16
16 © 2003, Cisco Systems, Inc. All rights reserved. Restricting Virtual Terminal Access
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.