当前位置:网站首页>Standard ACL and extended ACL
Standard ACL and extended ACL
2022-07-07 18:38:00 【Chen chacha__】
standard ACL
R0 Basic configuration
int f0/0
ip add 192.168.10.254 255.255.255.0
no shutdown
int f0/1
ip add 76.12.16.133 255.255.255.252
no shut
R1 Basic configuration
int f0/0
ip add 76.12.32.254 255.255.255.0
no shut
int f0/1
ip add 76.12.16.134 255.255.255.252
no shut
Then give them to R1、R2 Configure the default route
R1
ip route 0.0.0.0 0.0.0.0 76.12.16.133 #76.12.16.133 It is the next hop address connected to this router , It can also be written as the next hop port number connected to this router
R2
ip route 0.0.0.0 0.0.0.0 76.12.16.134 # ditto
standard ACL On the router near the destination address
stay R1 Upper configuration standard ACL
standard ACL The number of 1-99
ip access-list 1 permit host 192.168.10.100
ip access-list 1 deny host 192.168.10.1
interface f0/1
ip access-group 1 in
Expand ACL
R0 Basic configuration
int f0/0
ip add 192.168.10.254 255.255.255.0
no shutdown
int f0/1
ip add 76.12.16.133 255.255.255.252
no shut
R1 Basic configuration
int f0/0
ip add 76.12.32.254 255.255.255.0
no shut
int f0/1
ip add 76.12.16.134 255.255.255.252
no shut
Then give them to R1、R2 Configure the default route
R1
ip route 0.0.0.0 0.0.0.0 76.12.16.133 #76.12.16.133 It is the next hop address connected to this router , It can also be written as the next hop port number connected to this router
R2
ip route 0.0.0.0 0.0.0.0 76.12.16.134 # ditto
Expand ACL It is configured on the router close to the source address
stay R0 Configure extensions on ACL
Expand ACL The number of 100-199
You need an agreement 、 Source IP、 Source port 、 Purpose IP、 The destination ports match
ip access-list 100 deny icmp host 192.168.10.1 host 76.12.32.1 # Reject from 192.168.10.1 The host goes to 76.12.32.1 The host ping package
ip access-list 100 permit ip any any # Allow all
interface f0/1
ip access-group 100 out # take ACL Apply to the out interface
边栏推荐
- 通过 Play Integrity API 的 nonce 字段提高应用安全性
- Discuss | what preparations should be made before ar application is launched?
- Download, installation and development environment construction of "harmonyos" deveco
- Wireshark分析抓包数据*.cap
- 『HarmonyOS』DevEco的下载安装与开发环境搭建
- How to open an account for wealth securities? Is it safe to open a stock account through the link
- Chapter 1 Introduction to CRM core business
- 【剑指 Offer】59 - I. 滑动窗口的最大值
- DataSimba推出微信小程序,DataNuza接受全场景考验? | StartDT Hackathon
- 小程序中实现付款功能
猜你喜欢
Chapter 3 business function development (safe exit)
性能测试过程和计划
五种网络IO模型
将模型的记忆保存下来!Meta&UC Berkeley提出MeMViT,建模时间支持比现有模型长30倍,计算量仅增加4.5%...
[principle and technology of network attack and Defense] Chapter 6: Trojan horse
idea彻底卸载安装及配置笔记
go语言的字符串类型、常量类型和容器类型
Improve application security through nonce field of play integrity API
Pro2: modify the color of div block
[C language] string function
随机推荐
开发一个小程序商城需要多少钱?
[trusted computing] Lesson 13: TPM extended authorization and key management
socket編程之常用api介紹與socket、select、poll、epoll高並發服務器模型代碼實現
The highest level of anonymity in C language
『HarmonyOS』DevEco的下载安装与开发环境搭建
PHP面试题 foreach($arr as &$value)与foreach($arr as $value)的用法
能同时做三个分割任务的模型,性能和效率优于MaskFormer!Meta&UIUC提出通用分割模型,性能优于任务特定模型!开源!...
Skills of embedded C language program debugging and macro use
Datasimba launched wechat applet, and datanuza accepted the test of the whole scene| StartDT Hackathon
Ten thousand words nanny level long article -- offline installation guide for datahub of LinkedIn metadata management platform
debian10系统问题总结
Some key points in the analysis of spot Silver
上市十天就下线过万台,欧尚Z6产品实力备受点赞
线程池和单例模式以及文件操作
AI 击败了人类,设计了更好的经济机制
Kirk Borne的本周学习资源精选【点击标题直接下载】
Redis的发布与订阅
4种常见的缓存模式,你都知道吗?
nest.js入门之 database
[trusted computing] Lesson 12: TPM authorization and conversation