ACCESS LIST
STANDARD ACCESS LIST
As close to destination
ALL DECISION BASED ON THE SOURCE IP ADDRESS , THEY DON’T DISTINGUISH BETWEEN
ANY OF THE MANY TYPES OF IP TRAFFIC SUCH AS WEB, TELNET , SO ON
STANDART ACCESS LIST
Block the network of pc0 to reach at the pc1
To check :
R1# show ip int brief
R1# show ip route
R2# show ip int brief
R3# show ip route
R2:
R2#conf t
R2(cnfg)# ip access-list standard 1
# deny host 192.168.1.2
# permit any
R2# show ip access-list
To apply ACL:
R2(cnfg)# int g0/0
#ip access-group 1 out
Now ping from pc0 to pc1 ACL working.
At first please do Routing RIP Version 2 and complete addressing
STANDART ACCESS LIST
Block the network of pc0 to reach at the pc1
To Remove :
R2#conf t
R2(cnfg)# ip access-list standard 1
#no 20 [20= number of acl]
For Telnet:
S2:
Conf t# enable password cisco
# line vty 0 1
# password cisco
Check its working
To remove the particular access list or telnet with standard ACL
Or :
R2(cnfg )# no acl

Access control list [2]

  • 1.
    ACCESS LIST STANDARD ACCESSLIST As close to destination ALL DECISION BASED ON THE SOURCE IP ADDRESS , THEY DON’T DISTINGUISH BETWEEN ANY OF THE MANY TYPES OF IP TRAFFIC SUCH AS WEB, TELNET , SO ON
  • 2.
    STANDART ACCESS LIST Blockthe network of pc0 to reach at the pc1 To check : R1# show ip int brief R1# show ip route R2# show ip int brief R3# show ip route R2: R2#conf t R2(cnfg)# ip access-list standard 1 # deny host 192.168.1.2 # permit any R2# show ip access-list To apply ACL: R2(cnfg)# int g0/0 #ip access-group 1 out Now ping from pc0 to pc1 ACL working. At first please do Routing RIP Version 2 and complete addressing
  • 3.
    STANDART ACCESS LIST Blockthe network of pc0 to reach at the pc1 To Remove : R2#conf t R2(cnfg)# ip access-list standard 1 #no 20 [20= number of acl] For Telnet: S2: Conf t# enable password cisco # line vty 0 1 # password cisco Check its working To remove the particular access list or telnet with standard ACL Or : R2(cnfg )# no acl