SlideShare a Scribd company logo
Standard ACL Configuration


      WWW.TCPIPGURU.COM
Description

 Standard outbound ACL configuration for denying
 the network 192.168.1.0/24 on the fa0/1 interface of
 R1.
Configuring Router 1

 R1#config t
 Enter configuration commands, one per line. End with
    CNTL/Z.
   R1(config)#access-list 5 deny 192.168.1.0 0.0.0.255
   R1(config)#access-list 5 permit any
   R1(config)#int fa0/1
   R1(config-if)#ip access-group 5 out
   R1(config-if)#exit
 R1#show access-lists
 StandardIP access list 5
   10 deny 192.168.1.0, wildcard bits 0.0.0.255
   20 permit any

More Related Content

What's hot

Acn Experiment No 4
Acn Experiment No 4Acn Experiment No 4
Acn Experiment No 4
Garima Singh
 
Solucion acl examenes
Solucion acl   examenesSolucion acl   examenes
Routing protocol commands list
Routing protocol commands listRouting protocol commands list
Routing protocol commands list
actsupport .com
 
Vo ip avanzado pt
Vo ip avanzado ptVo ip avanzado pt
Vo ip avanzado pt
Alberto López
 
Cisco ios-cont
Cisco ios-contCisco ios-cont
Cisco ios-cont
Haitham El-Ghareeb
 
CIsco ACL- Network and host security
CIsco ACL- Network and host securityCIsco ACL- Network and host security
CIsco ACL- Network and host security
Shiv Koppad
 
Cisco router basic configuration commands
Cisco router basic configuration commandsCisco router basic configuration commands
Cisco router basic configuration commands
CCNAStudyGuide
 
How to troubleshoot and verifying ospf configuration
How to troubleshoot and verifying ospf configurationHow to troubleshoot and verifying ospf configuration
How to troubleshoot and verifying ospf configuration
IT Tech
 
How to Configure ip address for router interfaces
How to Configure ip address for router interfacesHow to Configure ip address for router interfaces
How to Configure ip address for router interfaces
tcpipguru
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking ii
Netwax Lab
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
Netwax Lab
 
Intro to router_config
Intro to router_configIntro to router_config
Intro to router_config
arjuntrk
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
Netwax Lab
 
Acl cisco
Acl ciscoAcl cisco
Acl cisco
Tapan Khilar
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Netwax Lab
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
Netwax Lab
 
Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List ii
Netwax Lab
 
Ccna command
Ccna commandCcna command
Ccna command
Sudhir Maherwal
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
Netwax Lab
 
Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
Netwax Lab
 

What's hot (20)

Acn Experiment No 4
Acn Experiment No 4Acn Experiment No 4
Acn Experiment No 4
 
Solucion acl examenes
Solucion acl   examenesSolucion acl   examenes
Solucion acl examenes
 
Routing protocol commands list
Routing protocol commands listRouting protocol commands list
Routing protocol commands list
 
Vo ip avanzado pt
Vo ip avanzado ptVo ip avanzado pt
Vo ip avanzado pt
 
Cisco ios-cont
Cisco ios-contCisco ios-cont
Cisco ios-cont
 
CIsco ACL- Network and host security
CIsco ACL- Network and host securityCIsco ACL- Network and host security
CIsco ACL- Network and host security
 
Cisco router basic configuration commands
Cisco router basic configuration commandsCisco router basic configuration commands
Cisco router basic configuration commands
 
How to troubleshoot and verifying ospf configuration
How to troubleshoot and verifying ospf configurationHow to troubleshoot and verifying ospf configuration
How to troubleshoot and verifying ospf configuration
 
How to Configure ip address for router interfaces
How to Configure ip address for router interfacesHow to Configure ip address for router interfaces
How to Configure ip address for router interfaces
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking ii
 
Nxll24 i pv6
Nxll24 i pv6Nxll24 i pv6
Nxll24 i pv6
 
Intro to router_config
Intro to router_configIntro to router_config
Intro to router_config
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
Acl cisco
Acl ciscoAcl cisco
Acl cisco
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
 
Nxll22 role based cli
Nxll22 role based cliNxll22 role based cli
Nxll22 role based cli
 
Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List ii
 
Ccna command
Ccna commandCcna command
Ccna command
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
 

Viewers also liked

Python programming course
Python programming coursePython programming course
Python programming course
tcpipguru
 
How to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addressHow to configure Standard ACL for an ip address
How to configure Standard ACL for an ip address
tcpipguru
 
How to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routerHow to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco router
tcpipguru
 
Network testing course
Network testing courseNetwork testing course
Network testing course
tcpipguru
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
Kashif Latif
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
Martin Bratina
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
arpit
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
selvakumar_b1985
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
yasir1122
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
ShortestPathFirst
 

Viewers also liked (11)

Python programming course
Python programming coursePython programming course
Python programming course
 
How to configure Standard ACL for an ip address
How to configure Standard ACL for an ip addressHow to configure Standard ACL for an ip address
How to configure Standard ACL for an ip address
 
How to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco routerHow to configure Rip version2 on a Cisco router
How to configure Rip version2 on a Cisco router
 
Network testing course
Network testing courseNetwork testing course
Network testing course
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
OSPF Basics
OSPF BasicsOSPF Basics
OSPF Basics
 
Routing and OSPF
Routing and OSPFRouting and OSPF
Routing and OSPF
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 

More from tcpipguru

Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projects
tcpipguru
 
Network security projects
Network security projectsNetwork security projects
Network security projects
tcpipguru
 
Cisco Router Terms
Cisco Router TermsCisco Router Terms
Cisco Router Terms
tcpipguru
 
How to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcpHow to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcp
tcpipguru
 
How to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routerHow to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco router
tcpipguru
 
How to configure Dynamic nat
How to configure Dynamic natHow to configure Dynamic nat
How to configure Dynamic nat
tcpipguru
 
How to configure DHCP Server
How to configure DHCP Server How to configure DHCP Server
How to configure DHCP Server
tcpipguru
 
How to configure Default Routing
How to configure Default RoutingHow to configure Default Routing
How to configure Default Routing
tcpipguru
 
How to configure SSH on Cisco switch
How to configure SSH on Cisco switchHow to configure SSH on Cisco switch
How to configure SSH on Cisco switch
tcpipguru
 
Configuring ssh on switch
Configuring ssh on switchConfiguring ssh on switch
Configuring ssh on switch
tcpipguru
 
How to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchHow to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switch
tcpipguru
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switch
tcpipguru
 
How to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco routerHow to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco router
tcpipguru
 
How to configure different Spanning tree port status
How to configure different Spanning tree port statusHow to configure different Spanning tree port status
How to configure different Spanning tree port status
tcpipguru
 
How to configure telnet on cisco switch(1950)
How to configure telnet  on cisco switch(1950)How to configure telnet  on cisco switch(1950)
How to configure telnet on cisco switch(1950)
tcpipguru
 
How to handle Spanning –tree protocol (stp) on Cisco Switch
How to handle Spanning –tree protocol (stp) on Cisco SwitchHow to handle Spanning –tree protocol (stp) on Cisco Switch
How to handle Spanning –tree protocol (stp) on Cisco Switch
tcpipguru
 
Mac address-table static
Mac address-table staticMac address-table static
Mac address-table static
tcpipguru
 
Configuring hostname, time and login message on Cisco router
Configuring hostname, time and login message on Cisco routerConfiguring hostname, time and login message on Cisco router
Configuring hostname, time and login message on Cisco router
tcpipguru
 
Configuring hostname, time and login message for Cisco switch
Configuring hostname, time and login message for Cisco switchConfiguring hostname, time and login message for Cisco switch
Configuring hostname, time and login message for Cisco switch
tcpipguru
 
Rip version1 configuration on Cisco router
Rip version1 configuration on Cisco routerRip version1 configuration on Cisco router
Rip version1 configuration on Cisco router
tcpipguru
 

More from tcpipguru (20)

Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projects
 
Network security projects
Network security projectsNetwork security projects
Network security projects
 
Cisco Router Terms
Cisco Router TermsCisco Router Terms
Cisco Router Terms
 
How to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcpHow to obtain ip address from a different network dhcp
How to obtain ip address from a different network dhcp
 
How to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco routerHow to configure EIGRP on a Cisco router
How to configure EIGRP on a Cisco router
 
How to configure Dynamic nat
How to configure Dynamic natHow to configure Dynamic nat
How to configure Dynamic nat
 
How to configure DHCP Server
How to configure DHCP Server How to configure DHCP Server
How to configure DHCP Server
 
How to configure Default Routing
How to configure Default RoutingHow to configure Default Routing
How to configure Default Routing
 
How to configure SSH on Cisco switch
How to configure SSH on Cisco switchHow to configure SSH on Cisco switch
How to configure SSH on Cisco switch
 
Configuring ssh on switch
Configuring ssh on switchConfiguring ssh on switch
Configuring ssh on switch
 
How to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switchHow to Configure password for telnet and console port of a switch
How to Configure password for telnet and console port of a switch
 
How to create Security on Cisco switch
How to create Security on Cisco switchHow to create Security on Cisco switch
How to create Security on Cisco switch
 
How to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco routerHow to Save, backup and restore IOS on Cisco router
How to Save, backup and restore IOS on Cisco router
 
How to configure different Spanning tree port status
How to configure different Spanning tree port statusHow to configure different Spanning tree port status
How to configure different Spanning tree port status
 
How to configure telnet on cisco switch(1950)
How to configure telnet  on cisco switch(1950)How to configure telnet  on cisco switch(1950)
How to configure telnet on cisco switch(1950)
 
How to handle Spanning –tree protocol (stp) on Cisco Switch
How to handle Spanning –tree protocol (stp) on Cisco SwitchHow to handle Spanning –tree protocol (stp) on Cisco Switch
How to handle Spanning –tree protocol (stp) on Cisco Switch
 
Mac address-table static
Mac address-table staticMac address-table static
Mac address-table static
 
Configuring hostname, time and login message on Cisco router
Configuring hostname, time and login message on Cisco routerConfiguring hostname, time and login message on Cisco router
Configuring hostname, time and login message on Cisco router
 
Configuring hostname, time and login message for Cisco switch
Configuring hostname, time and login message for Cisco switchConfiguring hostname, time and login message for Cisco switch
Configuring hostname, time and login message for Cisco switch
 
Rip version1 configuration on Cisco router
Rip version1 configuration on Cisco routerRip version1 configuration on Cisco router
Rip version1 configuration on Cisco router
 

Recently uploaded

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

How to configure Standard ACL for a network

  • 1. Standard ACL Configuration WWW.TCPIPGURU.COM
  • 2.
  • 3. Description  Standard outbound ACL configuration for denying the network 192.168.1.0/24 on the fa0/1 interface of R1.
  • 4. Configuring Router 1  R1#config t  Enter configuration commands, one per line. End with CNTL/Z.  R1(config)#access-list 5 deny 192.168.1.0 0.0.0.255  R1(config)#access-list 5 permit any  R1(config)#int fa0/1  R1(config-if)#ip access-group 5 out  R1(config-if)#exit
  • 5.  R1#show access-lists  StandardIP access list 5  10 deny 192.168.1.0, wildcard bits 0.0.0.255  20 permit any