当前位置:网站首页>Implementing reflexive ACL in Cisco packet tracker
Implementing reflexive ACL in Cisco packet tracker
2022-06-12 18:18:00 【Confused dream butterfly】
Catalog
experiment 1: Use ACL Control link connectivity
experiment 2: In Cisco Simulator Cisco Packet Tracer Reflexive realization ACL
Step one : Give the router 2911 Turn on securityk9 Pattern
Step three : Verify connectivity
One 、 Preface
Recently passed Cisco Packet Tracer Simulator learning ACL when , A little bit of a problem ,ACL Divided into standard ACL Access control lists and extended access control lists , But when a router is configured with an access control list , Although it is to realize the prohibition of the regulation control list , But not from the opposite end PING Come back . The specific phenomena are as follows :
Two 、 experiment
experiment 1: Use ACL Control link connectivity
Experimental Topology

Test connectivity

To configure ACL
Give the router 0 2911 To configure ACL( Here is just a simple use of the standard ACL)
tsy(config)#access-list 11 deny 192.168.10.0 0.0.0.255 // prohibit 192.168.10.0 The network segment is routed through
tsy(config)#access-list 11 permit any // Be careful : This line is the most important , stay cisco Inside, as long as the access control list is created ( Last article ), Other network segments are also disabled by default , Only writing this line can access the default prohibition
tsy(config)#int g0/1
tsy(config-if)#ip access-group 11 out // Reference to interface G0/1
tsy(config-if)#exit
tsy(config)#exitView access control list
tsy#show ip ac
tsy#show ip access-lists
Standard IP access list 11
10 deny 192.168.10.0 0.0.0.255
20 permit any
tsy#Test connectivity again


Why? PC1 Go to PingPC0 no , It doesn't just limit PC0 Go to PC1 Your route ?!!!
because Ping Implementation process of , Between two terminals Mutual inquiry and confirmation The process of :

experiment 2: In Cisco Simulator Cisco Packet Tracer Reflexive realization ACL
How do we achieve one-way Ping through , The opposite end cannot Ping How about yourself ? I found something in Du Niang's knowledge treasure house , Referring to Baidu's experience :https://jingyan.baidu.com/article/948f5924a79294d80ef5f95c.html
Step one : Give the router 2911 Turn on securityk9 Pattern
tsy#conf terminal // Enter configuration mode
tsy(config)#license boot module c2900 technology-package securityk9 // Turn on securityk9 Pattern
// Omit here
ACCEPT? [yes/no]: Y // confirm
tsy#write
Building configuration...
[OK]
tsy#reload // Restart
// Omit here
tsy>en
tsy#show lic
tsy#show license fe
tsy#show license feature // Check the license file after restart ,securityk9 Enabled
Feature name Enforcement Evaluation Subscription Enabled RightToUse
ipbasek9 no no no yes no
securityk9 yes yes no yes yes
datak9 yes no no no yes
uck9 yes yes no no yes
tsy#conf terminal
Enter configuration commands, one per line. End with CNTL/Z.
tsy(config)#Step two : To configure ACL
tsy#conf terminal // Enter configuration mode
tsy(config)#ip access-list extended TSY // Add extended access control list TSY
tsy(config-ext-nacl)#deny ip any any // Prohibit all network segments from passing through
tsy(config-ext-nacl)#exit
tsy(config)#int G0/1 // At the interface G0/1 Application in
tsy(config-if)#ip access-group TSY in // Access control list TSY Applied to the interface G0/1 Access to
tsy(config-if)#exit
tsy(config)#ip inspect name Tong http audit-trail on // This sentence I understand is to allow http Round trip message execution , Mark is Tong Of
tsy(config)#ip inspect name Tong icmp audit-trail on // allow icmp Round trip message execution , Mark is Tong Of
tsy(config)#int G0/1 // At the interface G0/1 Application in
tsy(config-if)#ip inspect Tong out // Access control list TONG Applied to the interface G0/1 The output channel of
tsy(config-if)#exit
tsy(config)#exitI don't know if I understand right here , I hope you can correct me !
View access control list
tsy#show ip access-lists
Extended IP access list TSY
10 deny ip any any (4 match(es))
Step three : Verify connectivity


3、 ... and 、 summary
there introspect ACL, It's just Cisco Simulator This is how to use , however Correct reflexivity ACL It's not like that !!!
边栏推荐
- MYSQL:Expression #4 of SELECT list is not in GROUP BY clause and contains nonaggregated column
- Leetcode 674 longest incrementing substring
- JS中的栈(含leetcode例题)<持续更新~>
- Introduction to service grid and istio - continued
- PHP implementation of infinite classification tree (recursion and Optimization)
- js判断回文数
- Small program +app, a low-cost and active technology combination idea
- JS quick sort
- PHP:Fatal error: Allowed memory size of 262144 bytes exhausted (tried to allocat
- Leetcode 718 longest common substring
猜你喜欢

有源差分晶振原理圖以及LV-PECL、LVDS、HCSL區別

Virtual Lab Basic Experiment tutoriel - 4. Diffraction à fente unique

Small program +app, a low-cost and active technology combination idea

ESP32-C3 ESP-IDF 配置smartconfig 和 sntp 获取网络时间

机器学习系列(5):朴素贝叶斯

Overall flow chart of kernel interrupt
![Interior design style type, rendering 100 invitation code [1a12]](/img/90/8bbfbe33c5b412498744c0ea0ed559.jpg)
Interior design style type, rendering 100 invitation code [1a12]

从源码解析 MobX 响应式刷新机制

JS for Fibonacci sequence

PHP:Fatal error: Allowed memory size of 262144 bytes exhausted (tried to allocat
随机推荐
Lenovo responded that there are too many and too messy notebooks: it is now the product adjustment period and will be divided into three series of digital /air/ pro in the future
Title 54: take 4 ~ 7 bits of an integer a from the right end.
String s = null ; String s = new String(); String s = "; what is the difference between string s?
leetcode 647. 回文子串
When openharmony meets openeuler
Gd32f4xx controls dgus touch keys
TypeScript高级类型(二)
Random talk about redis source code 91
Is it safe to open an account in flush
Random talk about redis source code 90
leetcode 300. 最长递增子序列
ESP32-C3 ESP-IDF 配置smartconfig 和 sntp 获取网络时间
High speed layout guidelines incomplete
High-Speed Layout Guidelines 未完...
Schedule update | 2022 Microsoft and Intel hacker song competition is in hot registration
Gospel of audio and video developers, rapid integration of AI dubbing capability
JS judge palindromes
Virtual Lab Basic Experiment tutoriel - 4. Diffraction à fente unique
Title 66: input 3 numbers a, B, C, and output them in order of size.
Adjust CEPH cluster image source