Standard access Control List (ACL)

Source: Internet
Author: User

First, the experimental environment

GNS3 simulation software, VMware workstation software

Second, the experimental topology and IP address planning

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6C/53/wKiom1VGD7uSSOgMAAEM4_lIFHE648.jpg "title=" 1.jpg " alt= "Wkiom1vgd7ussogmaaem4_lifhe648.jpg"/>

Third, the experimental needs

PC1 can ping 192.168.5.1, but can not ping through 192.168.4.2

Iv. Steps of the experiment

1. Basic configuration on the router

The IP address on the R1 and the configuration of the routing table

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6C/4E/wKioL1VGEjnhj1bjAAIL29wN9Tk183.jpg "title=" 3.jpg " alt= "Wkiol1vgejnhj1bjaail29wn9tk183.jpg"/>

The IP address on the R2 and the configuration of the routing table

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/6C/53/wKiom1VGEPCQKsVqAAKx40qE6VU831.jpg "title=" 4.jpg " alt= "Wkiom1vgepcqksvqaakx40qe6vu831.jpg"/>

The IP address on the R3 and the configuration of the routing table

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6C/4E/wKioL1VGEoHz-PpuAAHU3LQa9_w902.jpg "title=" 5.jpg " alt= "Wkiol1vgeohz-ppuaahu3lqa9_w902.jpg"/>

2. Use the ping command to verify that the network is interoperable

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M00/6C/53/wKiom1VGEYHg1ffmAAJ5w6qMKAI032.jpg "title=" 2.jpg " alt= "Wkiom1vgeyhg1ffmaaj5w6qmkai032.jpg"/>

3. Configure access control lists (ACLs) for network requirements

ac configured on the R1 L

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6C/4F/wKioL1VGFNvgC9OjAAD5aqL5DVY644.jpg "title=" 6.jpg " alt= "Wkiol1vgfnvgc9ojaad5aql5dvy644.jpg"/>

ACLs configured on R3

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M01/6C/4F/wKioL1VGFQOzMBxKAADcYxlwR9w932.jpg "title=" 7.jpg " alt= "Wkiol1vgfqozmbxkaadcyxlwr9w932.jpg"/>

4. Use the ping command to verify that the ACL is in effect

650) this.width=650; "src=" http://s3.51cto.com/wyfs02/M02/6C/53/wKiom1VGE9GBlu09AAI8R-Ia6HY386.jpg "title=" 8.jpg " alt= "Wkiom1vge9gblu09aai8r-ia6hy386.jpg"/>


This article is from the "Frozen Memory" blog, make sure to keep this source http://chenglihua.blog.51cto.com/9023335/1641465

Standard access Control List (ACL)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.