First, the experimental environment
GNS3 simulation software, VMware workstation software
Second, the experimental topology and IP address planning
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6C/53/wKiom1VGD7uSSOgMAAEM4_lIFHE648.jpg "title=" 1.jpg " alt= "Wkiom1vgd7ussogmaaem4_lifhe648.jpg"/>
Third, the experimental needs
PC1 can ping 192.168.5.1, but can not ping through 192.168.4.2
Iv. Steps of the experiment
1. Basic configuration on the router
The IP address on the R1 and the configuration of the routing table
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6C/4E/wKioL1VGEjnhj1bjAAIL29wN9Tk183.jpg "title=" 3.jpg " alt= "Wkiol1vgejnhj1bjaail29wn9tk183.jpg"/>
The IP address on the R2 and the configuration of the routing table
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/6C/53/wKiom1VGEPCQKsVqAAKx40qE6VU831.jpg "title=" 4.jpg " alt= "Wkiom1vgepcqksvqaakx40qe6vu831.jpg"/>
The IP address on the R3 and the configuration of the routing table
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6C/4E/wKioL1VGEoHz-PpuAAHU3LQa9_w902.jpg "title=" 5.jpg " alt= "Wkiol1vgeohz-ppuaahu3lqa9_w902.jpg"/>
2. Use the ping command to verify that the network is interoperable
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/6C/53/wKiom1VGEYHg1ffmAAJ5w6qMKAI032.jpg "title=" 2.jpg " alt= "Wkiom1vgeyhg1ffmaaj5w6qmkai032.jpg"/>
3. Configure access control lists (ACLs) for network requirements
ac configured on the R1 L
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6C/4F/wKioL1VGFNvgC9OjAAD5aqL5DVY644.jpg "title=" 6.jpg " alt= "Wkiol1vgfnvgc9ojaad5aql5dvy644.jpg"/>
ACLs configured on R3
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6C/4F/wKioL1VGFQOzMBxKAADcYxlwR9w932.jpg "title=" 7.jpg " alt= "Wkiol1vgfqozmbxkaadcyxlwr9w932.jpg"/>
4. Use the ping command to verify that the ACL is in effect
650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6C/53/wKiom1VGE9GBlu09AAI8R-Ia6HY386.jpg "title=" 8.jpg " alt= "Wkiom1vge9gblu09aai8r-ia6hy386.jpg"/>
This article is from the "Frozen Memory" blog, make sure to keep this source http://chenglihua.blog.51cto.com/9023335/1641465
Standard access Control List (ACL)