SlideShare a Scribd company logo
1 of 5
IP Standard Access Configuration ,[object Object],[object Object],[access-list]  [ access-list-number ]   {  permit  |  deny  }   [source]   [ source-mask ] Router(config)#
[object Object],IP Standard Access Configuration ,[object Object],[object Object],[access-list]  [access-list-number]   {  permit  |  deny  }   [source]   [source-mask] Router(config)# Router(config-if)# [ip access-group]   [access-list-number]   {  in  |  out  }
[object Object],[object Object],[object Object],[object Object],Extended IP Access Lists
Extended Access List Configuration ,[object Object],[object Object],[access-list]   [access-list-number]   { permit | deny } [ protocol] [source]   [source-mask]   [destination]   [destination-mask]   [  operator operand  ]   [ established ] Router(config)#
Extended Access List Configuration ,[object Object],[object Object],[object Object],Router(config-if)# [ip access-group]   [access-list-number]  [ {  in  |  out  } ] [access-list]   [access-list-number]   { permit | deny } [ protocol] [source]   [source-mask]   [destination]   [destination-mask]   [  operator operand  ]   [ established ] Router(config)#

More Related Content

What's hot

Very basic functional design patterns
Very basic functional design patternsVery basic functional design patterns
Very basic functional design patternsTomasz Kowal
 
python chapter 1
python chapter 1python chapter 1
python chapter 1Raghu nath
 
Python chapter 2
Python chapter 2Python chapter 2
Python chapter 2Raghu nath
 
Modul dhcp server menggunakan mikrotik os
Modul dhcp server menggunakan mikrotik osModul dhcp server menggunakan mikrotik os
Modul dhcp server menggunakan mikrotik osEen Pahlefi
 
Ruby to Elixir - what's great and what you might miss
Ruby to Elixir - what's great and what you might missRuby to Elixir - what's great and what you might miss
Ruby to Elixir - what's great and what you might missTobias Pfeiffer
 
Elixir & Phoenix - fast, concurrent and explicit
Elixir & Phoenix - fast, concurrent and explicitElixir & Phoenix - fast, concurrent and explicit
Elixir & Phoenix - fast, concurrent and explicitTobias Pfeiffer
 
The Ring programming language version 1.5.3 book - Part 19 of 194
The Ring programming language version 1.5.3 book - Part 19 of 194The Ring programming language version 1.5.3 book - Part 19 of 194
The Ring programming language version 1.5.3 book - Part 19 of 194Mahmoud Samir Fayed
 
Getting started with Pod::Weaver
Getting started with Pod::WeaverGetting started with Pod::Weaver
Getting started with Pod::WeaverJoshua Keroes
 
Python Training v2
Python Training v2Python Training v2
Python Training v2ibaydan
 
Pa1 session 3_slides
Pa1 session 3_slidesPa1 session 3_slides
Pa1 session 3_slidesaiclub_slides
 
Introducción rápida a SQL
Introducción rápida a SQLIntroducción rápida a SQL
Introducción rápida a SQLCarlos Hernando
 
Programming Haskell Chapter8
Programming Haskell Chapter8Programming Haskell Chapter8
Programming Haskell Chapter8Kousuke Ruichi
 
Stop Guessing and Start Measuring - Benchmarking in Practice (Lambdadays)
Stop Guessing and Start Measuring - Benchmarking in Practice (Lambdadays)Stop Guessing and Start Measuring - Benchmarking in Practice (Lambdadays)
Stop Guessing and Start Measuring - Benchmarking in Practice (Lambdadays)Tobias Pfeiffer
 
The bryant advantage 150 commands
The bryant advantage 150 commandsThe bryant advantage 150 commands
The bryant advantage 150 commandsAreej Khasawneh
 
Ios i pv4_access_lists
Ios i pv4_access_listsIos i pv4_access_lists
Ios i pv4_access_listsMohamed Gamel
 
Ciso 4 ospf
Ciso 4 ospfCiso 4 ospf
Ciso 4 ospfmyciokas
 

What's hot (19)

Very basic functional design patterns
Very basic functional design patternsVery basic functional design patterns
Very basic functional design patterns
 
python chapter 1
python chapter 1python chapter 1
python chapter 1
 
Python chapter 2
Python chapter 2Python chapter 2
Python chapter 2
 
Modul dhcp server menggunakan mikrotik os
Modul dhcp server menggunakan mikrotik osModul dhcp server menggunakan mikrotik os
Modul dhcp server menggunakan mikrotik os
 
Ruby to Elixir - what's great and what you might miss
Ruby to Elixir - what's great and what you might missRuby to Elixir - what's great and what you might miss
Ruby to Elixir - what's great and what you might miss
 
Elixir & Phoenix - fast, concurrent and explicit
Elixir & Phoenix - fast, concurrent and explicitElixir & Phoenix - fast, concurrent and explicit
Elixir & Phoenix - fast, concurrent and explicit
 
The Ring programming language version 1.5.3 book - Part 19 of 194
The Ring programming language version 1.5.3 book - Part 19 of 194The Ring programming language version 1.5.3 book - Part 19 of 194
The Ring programming language version 1.5.3 book - Part 19 of 194
 
Getting started with Pod::Weaver
Getting started with Pod::WeaverGetting started with Pod::Weaver
Getting started with Pod::Weaver
 
Python Training v2
Python Training v2Python Training v2
Python Training v2
 
Pa1 session 3_slides
Pa1 session 3_slidesPa1 session 3_slides
Pa1 session 3_slides
 
Introducción rápida a SQL
Introducción rápida a SQLIntroducción rápida a SQL
Introducción rápida a SQL
 
The Magic Of Elixir
The Magic Of ElixirThe Magic Of Elixir
The Magic Of Elixir
 
Programming Haskell Chapter8
Programming Haskell Chapter8Programming Haskell Chapter8
Programming Haskell Chapter8
 
Stop Guessing and Start Measuring - Benchmarking in Practice (Lambdadays)
Stop Guessing and Start Measuring - Benchmarking in Practice (Lambdadays)Stop Guessing and Start Measuring - Benchmarking in Practice (Lambdadays)
Stop Guessing and Start Measuring - Benchmarking in Practice (Lambdadays)
 
Ciso ospf
Ciso ospfCiso ospf
Ciso ospf
 
The bryant advantage 150 commands
The bryant advantage 150 commandsThe bryant advantage 150 commands
The bryant advantage 150 commands
 
Ios i pv4_access_lists
Ios i pv4_access_listsIos i pv4_access_lists
Ios i pv4_access_lists
 
Eoip tunnel
Eoip tunnelEoip tunnel
Eoip tunnel
 
Ciso 4 ospf
Ciso 4 ospfCiso 4 ospf
Ciso 4 ospf
 

Similar to Configuraton of standard access list and extented access lis

Similar to Configuraton of standard access list and extented access lis (20)

Acl cisco
Acl ciscoAcl cisco
Acl cisco
 
Acl cisco
Acl ciscoAcl cisco
Acl cisco
 
20 access lists[1]
20 access lists[1]20 access lists[1]
20 access lists[1]
 
Cisco ACL
Cisco ACLCisco ACL
Cisco ACL
 
CCNA ppt Day 7
CCNA ppt Day 7CCNA ppt Day 7
CCNA ppt Day 7
 
Ios i pv4_access_lists
Ios i pv4_access_listsIos i pv4_access_lists
Ios i pv4_access_lists
 
Ios i pv4_access_lists
Ios i pv4_access_listsIos i pv4_access_lists
Ios i pv4_access_lists
 
Cisco router command configuration overview
Cisco router command configuration overviewCisco router command configuration overview
Cisco router command configuration overview
 
Acl
AclAcl
Acl
 
Cisco vs. huawei CLI Commands
Cisco vs. huawei CLI CommandsCisco vs. huawei CLI Commands
Cisco vs. huawei CLI Commands
 
Comandos huawei-prof
Comandos huawei-profComandos huawei-prof
Comandos huawei-prof
 
Comandos huawei comparacion con cisco
Comandos huawei comparacion con ciscoComandos huawei comparacion con cisco
Comandos huawei comparacion con cisco
 
Comandos huawei-prof
Comandos huawei-profComandos huawei-prof
Comandos huawei-prof
 
10 module
10  module10  module
10 module
 
CCNA part 7 acl
CCNA part 7 aclCCNA part 7 acl
CCNA part 7 acl
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
Chapter10ccna
Chapter10ccnaChapter10ccna
Chapter10ccna
 
PHP Built-in String Validation Functions
PHP Built-in String Validation FunctionsPHP Built-in String Validation Functions
PHP Built-in String Validation Functions
 
CCNA ALL IN ONE
CCNA ALL IN ONE CCNA ALL IN ONE
CCNA ALL IN ONE
 
11 module configuring novell ipx
11  module configuring novell ipx11  module configuring novell ipx
11 module configuring novell ipx
 

More from Asif

Module 1
Module 1Module 1
Module 1Asif
 
14 module
14  module14  module
14 moduleAsif
 
13 module isdn bri call
13   module isdn bri call13   module isdn bri call
13 module isdn bri callAsif
 
12 module
12  module12  module
12 moduleAsif
 
09 module determinig ip routes
09  module determinig ip routes09  module determinig ip routes
09 module determinig ip routesAsif
 
08 module interconnecting cisco router
08 module interconnecting cisco router08 module interconnecting cisco router
08 module interconnecting cisco routerAsif
 
07 module extending switched netwroks with virtual la ns
07  module extending switched netwroks with virtual la ns07  module extending switched netwroks with virtual la ns
07 module extending switched netwroks with virtual la nsAsif
 
06 module catalyst 1900 switch operations
06  module  catalyst 1900 switch operations06  module  catalyst 1900 switch operations
06 module catalyst 1900 switch operationsAsif
 
05 module managing your network enviornment
05  module managing your network enviornment05  module managing your network enviornment
05 module managing your network enviornmentAsif
 
04 module operating & configuring ios
04  module operating & configuring ios04  module operating & configuring ios
04 module operating & configuring iosAsif
 
02 module internet concept overview
02  module internet concept overview02  module internet concept overview
02 module internet concept overviewAsif
 
Lecture 20 presentation
Lecture 20 presentationLecture 20 presentation
Lecture 20 presentationAsif
 
Ip addresses
Ip addressesIp addresses
Ip addressesAsif
 
02 module internet concept overview
02  module internet concept overview02  module internet concept overview
02 module internet concept overviewAsif
 

More from Asif (14)

Module 1
Module 1Module 1
Module 1
 
14 module
14  module14  module
14 module
 
13 module isdn bri call
13   module isdn bri call13   module isdn bri call
13 module isdn bri call
 
12 module
12  module12  module
12 module
 
09 module determinig ip routes
09  module determinig ip routes09  module determinig ip routes
09 module determinig ip routes
 
08 module interconnecting cisco router
08 module interconnecting cisco router08 module interconnecting cisco router
08 module interconnecting cisco router
 
07 module extending switched netwroks with virtual la ns
07  module extending switched netwroks with virtual la ns07  module extending switched netwroks with virtual la ns
07 module extending switched netwroks with virtual la ns
 
06 module catalyst 1900 switch operations
06  module  catalyst 1900 switch operations06  module  catalyst 1900 switch operations
06 module catalyst 1900 switch operations
 
05 module managing your network enviornment
05  module managing your network enviornment05  module managing your network enviornment
05 module managing your network enviornment
 
04 module operating & configuring ios
04  module operating & configuring ios04  module operating & configuring ios
04 module operating & configuring ios
 
02 module internet concept overview
02  module internet concept overview02  module internet concept overview
02 module internet concept overview
 
Lecture 20 presentation
Lecture 20 presentationLecture 20 presentation
Lecture 20 presentation
 
Ip addresses
Ip addressesIp addresses
Ip addresses
 
02 module internet concept overview
02  module internet concept overview02  module internet concept overview
02 module internet concept overview
 

Configuraton of standard access list and extented access lis

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.

Editor's Notes

  1. access-list command creates an entry in a standard traffic filter list. access-list field descriptions: list—identifies the list to which the entry belongs; a number from 1 to 99. address—source IP address. wildcard-mask—identifies which bits in the address field are matched. It has a 1 in positions indicating “don't care” bits, and a 0 in any position which is to be strictly followed. ip access-group command links an existing access list to an outgoing interface. Only one access list per port per protocol is allowed. ip access-group field descriptions: list—number of the access-list to be linked to this interface.
  2. access-list command creates an entry in a standard traffic filter list. access-list field descriptions: list—identifies the list to which the entry belongs; a number from 1 to 99. address—source IP address. wildcard-mask—identifies which bits in the address field are matched. It has a 1 in positions indicating “don't care” bits, and a 0 in any position which is to be strictly followed. ip access-group command links an existing access list to an outgoing interface. Only one access list per port per protocol is allowed. ip access-group field descriptions: list—number of the access-list to be linked to this interface.
  3. access-list command creates an entry in complex traffic filter list. access-list field descriptions: list—a number between 100 and 199 protocol—ip, tcp, udp, icmp source—ip address source-mask—wildcard-mask of address bits that must match. 0s indicate bits that must match, 1s are "don't care". destination—ip address destination-mask—wildcard-mask operator—lt, gt, eq, neq operand—a port number
  4. access-list command creates an entry in complex traffic filter list. access-list field descriptions: list—a number between 100 and 199 protocol—ip, tcp, udp, icmp source—ip address source-mask—wildcard-mask of address bits that must match. 0s indicate bits that must match, 1s are "don't care". destination—ip address destination-mask—wildcard-mask operator—lt, gt, eq, neq operand—a port number