当前位置:网站首页>Standard ACL and extended ACL
Standard ACL and extended ACL
2022-07-07 18:38:00 【Chen chacha__】
standard ACL
R0 Basic configuration
int f0/0
ip add 192.168.10.254 255.255.255.0
no shutdown
int f0/1
ip add 76.12.16.133 255.255.255.252
no shut
R1 Basic configuration
int f0/0
ip add 76.12.32.254 255.255.255.0
no shut
int f0/1
ip add 76.12.16.134 255.255.255.252
no shut
Then give them to R1、R2 Configure the default route
R1
ip route 0.0.0.0 0.0.0.0 76.12.16.133 #76.12.16.133 It is the next hop address connected to this router , It can also be written as the next hop port number connected to this router
R2
ip route 0.0.0.0 0.0.0.0 76.12.16.134 # ditto
standard ACL On the router near the destination address
stay R1 Upper configuration standard ACL
standard ACL The number of 1-99
ip access-list 1 permit host 192.168.10.100
ip access-list 1 deny host 192.168.10.1
interface f0/1
ip access-group 1 in
Expand ACL
R0 Basic configuration
int f0/0
ip add 192.168.10.254 255.255.255.0
no shutdown
int f0/1
ip add 76.12.16.133 255.255.255.252
no shut
R1 Basic configuration
int f0/0
ip add 76.12.32.254 255.255.255.0
no shut
int f0/1
ip add 76.12.16.134 255.255.255.252
no shut
Then give them to R1、R2 Configure the default route
R1
ip route 0.0.0.0 0.0.0.0 76.12.16.133 #76.12.16.133 It is the next hop address connected to this router , It can also be written as the next hop port number connected to this router
R2
ip route 0.0.0.0 0.0.0.0 76.12.16.134 # ditto
Expand ACL It is configured on the router close to the source address
stay R0 Configure extensions on ACL
Expand ACL The number of 100-199
You need an agreement 、 Source IP、 Source port 、 Purpose IP、 The destination ports match
ip access-list 100 deny icmp host 192.168.10.1 host 76.12.32.1 # Reject from 192.168.10.1 The host goes to 76.12.32.1 The host ping package
ip access-list 100 permit ip any any # Allow all
interface f0/1
ip access-group 100 out # take ACL Apply to the out interface
边栏推荐
- Pro2: modify the color of div block
- Chapter 3 business function development (user login)
- Skills of embedded C language program debugging and macro use
- Using stored procedures, timers, triggers to solve data analysis problems
- 【demo】循环队列及条件锁实现goroutine间的通信
- Learn to make dynamic line chart in 3 minutes!
- 【蓝桥杯集训100题】scratch从小到大排序 蓝桥杯scratch比赛专项预测编程题 集训模拟练习题第17题
- How to open an account for wealth securities? Is it safe to open a stock account through the link
- 科学家首次观察到“电子漩涡” 有助于设计出更高效的电子产品
- [trusted computing] Lesson 10: TPM password resource management (II)
猜你喜欢
Improve application security through nonce field of play integrity API
简单几步教你如何看k线图图解
Thread pool and singleton mode and file operation
性能测试过程和计划
Nunjuks template engine
Ten thousand words nanny level long article -- offline installation guide for datahub of LinkedIn metadata management platform
Mobile app takeout ordering personal center page
Win11C盘满了怎么清理?Win11清理C盘的方法
[trusted computing] Lesson 12: TPM authorization and conversation
强化学习-学习笔记8 | Q-learning
随机推荐
行业案例|数字化经营底座助力寿险行业转型
[PaddleSeg源码阅读] PaddleSeg Validation 中添加 Boundary IoU的计算(1)——val.py文件细节提示
SQLite SQL exception near "with": syntax error
golang 客户端服务端登录
[principle and technology of network attack and Defense] Chapter 7: password attack technology Chapter 8: network monitoring technology
Five simple ways to troubleshoot with Stace
Year SQL audit platform
Kirk borne's selection of learning resources this week [click the title to download directly]
Tsinghua, Cambridge and UIC jointly launched the first Chinese fact verification data set: evidence-based, covering many fields such as medical society
Five network IO models
C语言中匿名的最高境界
Chapter 3 business function development (safe exit)
Tips for short-term operation of spot silver that cannot be ignored
[unity shader] insert pass to realize the X-ray perspective effect of model occlusion
【demo】循环队列及条件锁实现goroutine间的通信
Backup Alibaba cloud instance OSS browser
Redis的发布与订阅
3分钟学会制作动态折线图!
[4500 word summary] a complete set of skills that a software testing engineer needs to master
Using stored procedures, timers, triggers to solve data analysis problems