26.2.2 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - ILM
26.2.2 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - ILM
26.2.2 Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2 - ILM
(Instructor Version)
Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only.
Addressing Table
Device Interface IP Address Subnet Mask Default Gateway
Objectives
Part 1: Configure a Named Extended ACL
Part 2: Apply and Verify the Extended ACL
Background / Scenario
In this scenario, specific devices on the LAN are allowed to various services on servers located on the
internet.
Instructions
a. Deny PC1 access to HTTP and HTTPS services on Server1 and Server2.
a. Create a named extended IP access list on router RT1 which will deny PC1 access to the HTTP and
HTTPS services of Server1 and Server2. Four access control statements are required.
Question:
What is the command to begin the configuration of an extended access list with the name ACL?
Type your answers here.
2013 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 4 www.netacad.com
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2
b. Begin the ACL configuration with a statement that denies access from PC1 to Server1, only for HTTP
(port 80). Refer to the addressing table for the IP address of PC1 and Server1.
RT1(config-ext-nacl)# deny tcp host 172.31.1.101 host 64.101.255.254 eq 80
c. Next, enter the statement that denies access from PC1 to Server1, only for HTTPS (port 443).
RT1(config-ext-nacl)# deny tcp host 172.31.1.101 host 64.101.255.254 eq 443
d. Enter the statement that denies access from PC1 to Server2, only for HTTP. Refer to the addressing
table for the IP address of Server 2.
RT1(config-ext-nacl)# deny tcp host 172.31.1.101 host 64.103.255.254 eq 80
e. Enter the statement that denies access from PC1 to Server2, only for HTTPS.
RT1(config-ext-nacl)# deny tcp host 172.31.1.101 host 64.103.255.254 eq 443
2013 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 4 www.netacad.com
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2
Note: The difference between the output of the show access-lists command and the output of the show
running-config command is that the show access-lists command includes the sequence numbers assigned
to the configuration statements. These sequence numbers enable the editing, deleting, and inserting of single
lines within the access list configuration. Sequence numbers also define the processing order of individual
access control statements, starting with the lowest sequence number.
a. Apply the ACL to the correct interface and in the correct direction.
Note: In an actual operational network, an untested ACL should never be applied to an active interface. This
is not a good practice and can disrupt network operation.
Question:
On which interface should the named ACL be applied, and in which direction?
Type your answers here.
2013 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 4 www.netacad.com
Packet Tracer - Configure Extended IPv4 ACLs - Scenario 2
b. Access FTP of Server1 and Server2 using PC1. The username and password is cisco.
c. Ping Server1 and Server2 from PC1.
d. Repeat Step 2a to Step 2c with PC2 and PC3 to verify proper access list operation.
End of document
Answer Configuration
Router RT1
enable
configure terminal
ip access-list extended ACL
deny tcp host 172.31.1.101 host 64.101.255.254 eq www
deny tcp host 172.31.1.101 host 64.101.255.254 eq 443
deny tcp host 172.31.1.101 host 64.103.255.254 eq www
deny tcp host 172.31.1.101 host 64.103.255.254 eq 443
deny tcp host 172.31.1.102 host 64.101.255.254 eq ftp
deny tcp host 172.31.1.102 host 64.103.255.254 eq ftp
deny icmp host 172.31.1.103 host 64.101.255.254
deny icmp host 172.31.1.103 host 64.103.255.254
permit ip any any
interface GigabitEthernet0/0
ip access-group ACL in
end
2013 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 4 www.netacad.com