Free CCNA 200-301 Course 28-06: Numbered ACLs Lab Demo

Flackbox
28 Feb 202214:45

Summary

TLDRIn this informative lecture, the presenter guides viewers through configuring Access Control Lists (ACLs) for network security using a CCNA course lab demo in GNS3. The session covers setting up a standard numbered ACL to block traffic from a specific subnet while allowing it from another, and an extended numbered ACL to permit telnet access from a single host. The practical demonstration includes applying the ACLs to the correct interfaces and testing their functionality to ensure the desired traffic is allowed or denied, effectively securing the network according to the given scenarios.

Takeaways

  • 📚 The lesson focuses on configuring Access Control Lists (ACLs) in a CCNA course, with lab exercises available for download.
  • 🔗 The link to download the hands-on lab exercises is provided in the description of the lecture.
  • 📌 The lab demo involves routers R1 and R2, with PCs in the 10.0.1 subnet and PC3 in the 10.0.2.0/24 subnet.
  • 🛠️ Routing has been pre-configured for successful ping tests between the devices, confirming network connectivity.
  • 🚫 The security task is to prevent PCs in the 10.0.2 network from accessing R2 at 10.0.0.2, while allowing PCs in the 10.0.1 subnet to maintain connectivity.
  • 🌐 Standard ACLs can only filter based on source IP address, while Extended ACLs can specify both source and destination addresses.
  • 🔄 The standard ACL is applied to the external FastEthernet 0/0 interface on R2 to block traffic from the 10.0.2 subnet.
  • 🔒 The ACL configuration includes a deny statement for the 10.0.2.0/24 subnet and a permit statement for the 10.0.1.0/24 subnet.
  • 📈 The ACL is tested by pinging from PCs in the 10.0.1 subnet to R2 and ensuring that PC3 from the 10.0.2 subnet cannot reach R2.
  • 🔐 The second scenario involves configuring a numbered extended ACL to allow telnet access from PC1 to R2, while denying it from other PCs.
  • 🔍 The extended ACL permits TCP traffic from host 10.0.1.10 (PC1) to R2 on port 23 (telnet) and denies the same for the 10.0.1.0/24 subnet.
  • 🎯 The extended ACL is applied inbound on the FastEthernet 0/0 interface of R1 to secure the telnet access as close to the source as possible.

Q & A

  • What is the main topic of the lecture?

    -The main topic of the lecture is configuring access control lists (ACLs) with a lab demo as part of a complete CCNA course.

  • How can you access the hands-on lab exercises?

    -You can access the hands-on lab exercises by downloading them from the link provided in the description of the lecture.

  • What are the two routers and the three PCs named in the lab scenario?

    -In the lab scenario, the two routers are named r1 and r2, and the PCs are named pc1, pc2, and pc3.

  • What is the IP subnet for pc1 and pc2?

    -Pc1 and pc2 are in the 10.0.1 subnet.

  • Which subnet does pc3 belong to?

    -Pc3 is in the 10.0.2.0/24 subnet.

  • What is the first security task given to the network administrator in the scenario?

    -The first security task is to configure the network so that PCs in the 10.0.2 network have no connectivity to r2 at 10.0.0.2, while PCs in the 10.0.1 subnet maintain connectivity to r2.

  • What type of ACL is used to block traffic from the 10.0.2 subnet to r2 while allowing traffic from the 10.0.1 subnet?

    -A standard numbered ACL is used to block traffic from the 10.0.2 subnet to r2 while allowing traffic from the 10.0.1 subnet.

  • Where is the standard numbered ACL applied in the router to achieve the security task?

    -The standard numbered ACL is applied outbound on the FastEthernet 0/0 interface of r2.

  • What is the second scenario's security task in the lecture?

    -The second scenario's security task is to permit telnet access from pc1 to r2, allowing only the administrator workstation to access the router remotely, while denying telnet access from any other PC or subnet.

  • What type of ACL is used for the second security task, and what are its characteristics?

    -An extended numbered ACL is used for the second security task. It allows specifying both source and destination addresses and the protocol (in this case, TCP for telnet).

  • How is the extended numbered ACL applied in the router for the second scenario?

    -The extended numbered ACL is applied inbound on the FastEthernet 1/0 interface of r1, which is the interface connected to the PCs.

  • What is the result of applying the ACLs in the lab scenario?

    -After applying the ACLs, pc1 maintains connectivity to r2 and can telnet to it, pc2 is unable to telnet to r2 as expected, and pc3 remains unable to reach r2 due to the previously applied standard ACL.

Outlines

00:00

📚 Introduction to CCNA Lesson and Lab Exercises

The video begins with a reminder for viewers to download the lab exercises for the comprehensive CCNA course and to subscribe for updates. The lecture focuses on configuring access control lists (ACLs) with a practical lab demonstration. The lab setup includes routers (r1 and r2) and PCs in different subnets, with pre-configured routing. The objective is to secure the network by preventing PCs in the 10.0.2 network from accessing r2 at 10.0.0.2 while allowing PCs in the 10.0.1 subnet to maintain connectivity. The lesson explains the process of configuring a standard numbered ACL on the external interface of r2 to achieve this security task.

05:00

🔒 Configuring a Standard Numbered Access List

The paragraph details the process of configuring a standard numbered access list (ACL) to secure network traffic. It explains the limitations of a standard ACL, which only allows specification of the source address. The task involves allowing traffic from the 10.0.1 network while blocking traffic from the 10.0.2 subnet. The configuration is demonstrated by creating ACL number 1, denying traffic from 10.0.2.0 with a wildcard mask, and permitting traffic from 10.0.1.0 with a subnet mask. The ACL is then applied in the outbound direction on the external interface of r1 to control traffic to r2. The effectiveness of the ACL is tested by pinging from different PCs to confirm the desired connectivity and blocking behavior.

10:01

🌐 Implementing a Numbered Extended Access List

This section introduces the use of a numbered extended ACL to permit specific types of traffic, such as telnet, from designated hosts. The scenario involves allowing only PC1 (the administrator workstation) to telnet into r2, while blocking this access from other PCs. The extended ACL is configured with ACL number 100, permitting TCP traffic from host 10.0.1.10 to host 10.0.0.2 on telnet, and denying similar traffic from the rest of the 10.0.1 subnet. The ACL also includes a permit statement for all other IP traffic to override the implicit deny any at the end of the list. The ACL is applied to the inbound interface on r1 (fast1/0), and its functionality is tested by attempting to telnet from PC1 and PC2, as well as pinging from PC2 to r2 to confirm the ACL's effectiveness.

Mindmap

Keywords

💡CCNA

CCNA stands for Cisco Certified Network Associate, which is a foundational certification in networking focused on validating the skills and knowledge required to administer and install, manage, and troubleshoot a medium-size network. In the context of the video, the course is designed to prepare individuals for the CCNA exam, covering topics such as configuring access control lists (ACLs).

💡Access Control Lists (ACLs)

Access Control Lists are a set of rules applied to network devices, such as routers, to control the flow of traffic based on specified criteria. They are used to enhance network security by allowing or denying traffic from certain sources or destinations, and can be based on IP addresses, protocols, or ports. In the video, the focus is on configuring standard and extended ACLs to secure network traffic according to specific scenarios.

💡GNS3

GNS3, or Graphical Network Simulator 3, is a network simulation software that allows users to create complex network topologies in a virtual environment. It is widely used for learning, testing, and designing network configurations without the need for physical hardware. In the video, GNS3 is used to simulate the network where ACLs are being configured and tested.

💡Routing

Routing refers to the process of directing data packets from a source to a destination across a network. It involves the use of routing protocols and tables to determine the most efficient paths for traffic. In the video, the instructor has already configured routing, ensuring that devices within the simulated network can communicate with each other before focusing on securing these communications with ACLs.

💡Subnetting

Subnetting is the process of dividing a larger network into smaller, more manageable networks, known as subnets. This is done by using the IP address space more efficiently and improving network organization, security, and performance. In the video, the network is divided into subnets 10.0.1 and 10.0.2, which are used to demonstrate the application of ACLs for traffic control.

💡Standard ACLs

Standard ACLs are a type of access control list that allows for the specification of rules based solely on the source IP address. They do not support the inspection of other packet headers such as ports or protocols. Standard ACLs are used for basic traffic filtering and are identified by numbers in the range of 1 to 99 or 1300 to 1999 in Cisco IOS software.

💡Extended ACLs

Extended ACLs provide more granular control over network traffic compared to standard ACLs. They allow for the inspection of additional packet headers, such as protocol type, source and destination port numbers, and other criteria. Extended ACLs are identified by numbers in the range of 100 to 199 or 2000 to 2699 in Cisco IOS software. They are used for more complex traffic filtering and security policies.

💡Wildcard Mask

A wildcard mask is a bit pattern used in standard ACLs to determine which bits in the source address of a packet must match the specified IP address in the ACL rule. It is essentially the inverse of the subnet mask, with a 0 indicating a don't-care condition and a 1 requiring an exact match. The wildcard mask simplifies the process of defining ACL rules by allowing the specification of a range of addresses rather than individual IP addresses.

💡Implicit Deny

The 'implicit deny' is a default behavior in ACLs where, if a packet does not match any explicitly defined rule in the ACL, it is implicitly denied. This ensures that only the traffic that is explicitly allowed by the ACL rules will pass through, and all other traffic is blocked. It is a fundamental principle in ACL configuration to ensure network security.

💡Inbound and Outbound

In the context of networking and ACLs, 'inbound' and 'outbound' refer to the direction of network traffic relative to a specific interface or device. 'Inbound' traffic is incoming towards the device, while 'outbound' traffic is outgoing away from the device. These terms are crucial when applying ACLs to control the flow of traffic in specific directions on network interfaces.

💡Telnet

Telnet is a network protocol that allows users to remotely access the command-line interface of network devices, such as routers and switches, for administrative purposes. It is an older protocol and has been largely replaced by more secure alternatives like SSH, but it is still used in some environments, especially in the context of learning and legacy systems.

Highlights

The lesson focuses on configuring Access Control Lists (ACLs) in a CCNA course.

Hands-on lab exercises accompany the course, with a link provided in the description for download.

The lab demo involves configuring routers and PCs in a network setup within GNS3.

The network setup includes routers R1 and R2, and PCs in the 10.0.1 and 10.0.2 subnets.

Routing has been pre-configured for successful connectivity between the devices.

The lecture demonstrates how to apply a standard numbered ACL for network security.

The scenario involves securing the network by restricting access from the 10.0.2 network to R2.

The ACL is applied on R2's outside interface to block traffic from the 10.0.2 subnet.

The lecture explains the difference between standard and extended ACLs, emphasizing the need for extended ACLs for more complex rules.

A standard ACL is limited to specifying source addresses only.

The lecture provides a step-by-step guide on configuring and applying the ACLs.

Testing the ACL configuration is done by pinging and attempting to establish Telnet connections.

The lecture also covers the use of implicit deny statements at the end of ACLs.

A numbered extended ACL is introduced to allow Telnet access from a specific PC to the router.

The extended ACL configuration involves specifying source and destination addresses and the protocol (Telnet).

The ACLs are applied to the interfaces to control inbound and outbound traffic.

The lecture concludes with a summary of the tasks completed using numbered standard and extended ACLs.

Transcripts

play00:00

just a quick reminder before we get into

play00:02

the lesson

play00:03

to download the hands-on lab exercises

play00:05

that accompany this complete ccna course

play00:08

i'll include the link in the description

play00:11

also remember to subscribe

play00:13

and hit the notifications bell so you

play00:16

don't miss any of the lessons in the

play00:17

course

play00:18

okay let's get into it

play00:26

in this lecture you'll learn how to

play00:28

configure access

play00:30

control lists with a lab demo

play00:33

so here's the lab i've got to open in

play00:35

gns3 here

play00:37

and i've got a couple of routers r1

play00:40

and r2 i've got pc1

play00:44

and pc2 are in the 10.0.1 subnet

play00:48

and pc3 is in 10.0.2.0

play00:52

24. i've already

play00:56

configured the routing

play00:59

so if i control onto

play01:02

pc1 and let's try pinging r2

play01:06

at 10.0.0.2 so paying 10.002

play01:11

from pc1 works okay

play01:15

i know for sure it's going to work from

play01:18

pc2

play01:19

as well because it's in the same subnet

play01:22

but let's just do it anyway

play01:24

so paying 10.002 from here

play01:27

as well and

play01:30

let's check that everything's okay from

play01:32

our 10.0.2

play01:34

subnet as well so i'll ping

play01:38

10.0.0.2 which is r2 from there as well

play01:40

okay so connectivity is all working just

play01:44

fine actually let's have a look at the

play01:46

routing table

play01:48

on r1 so

play01:51

i'll jump on there i'll do a show ip

play01:54

route

play01:55

and try to do it without a typo

play01:59

and i've just got my connected and

play02:02

local routes on there and because r2

play02:05

is also on the 10.0.0 network at

play02:08

10.00.0.2

play02:09

that's why i've got connectivity

play02:11

everywhere okay looking back

play02:13

at the topology diagram

play02:17

and the scenario is that we're the

play02:20

network administrator

play02:21

and we've been given some security tasks

play02:25

to secure the network so the first

play02:27

scenario

play02:29

is that pcs in the 10.0.2 network

play02:33

should not have any connectivity to r2

play02:36

at 10.00.0.2 but

play02:40

the the pcs and the 10.0.1 subnet they

play02:44

should have connectivity to r2

play02:46

and also pc3 and 10.2 still should have

play02:50

connectivity to 10.0.1 as well

play02:53

so usually when we configure an acl

play02:56

to do security we'll secure it as close

play03:00

to the source as possible so the traffic

play03:02

isn't going over any part of a network

play03:04

but it doesn't need to

play03:05

but if we look at the scenario here

play03:07

let's see that we've been given a task

play03:09

that we have to configure a standard

play03:12

numbered access list to do that and it

play03:14

has to be

play03:15

on our one so

play03:18

we could do it inbound on fast ethernet

play03:21

2

play03:22

0 at the bottom here with a

play03:26

standard acl you can only specify the

play03:29

source address

play03:30

to be able to specify source and

play03:32

destination that it's going to that

play03:34

needs to be an extended or a named

play03:36

extended

play03:36

acl so what we want to do is we want to

play03:40

block traffic from 10.0.2

play03:43

to r2 but we need to allow

play03:46

traffic from 10.2 to 10.0.1

play03:50

so we can't put the acl inbound

play03:53

on that fast 2 0 interface on r1

play03:57

because if we blocked traffic from

play03:59

10.0.2

play04:00

would be blocking it going to r2 but

play04:02

we'd be blocking it to the 10.0.1

play04:05

subnet as well so the only way that we

play04:07

can do this task

play04:09

using a numbered standard acl

play04:13

is by putting it on that outside fast

play04:16

zero slash

play04:16

zero interface on r two

play04:20

so if that's not clear yet let's do it

play04:22

and then you'll see

play04:23

what i mean so we want to block traffic

play04:27

from

play04:27

10.0.2 allow traffic from 10.0.1

play04:32

so let's go on to the command line on r1

play04:36

i'll go to global config

play04:39

and i'll make this accession list

play04:44

one and i'm going to deny

play04:48

traffic from the 10.0.2.0 subnet

play04:52

the wildcard mask is 0.0.0.0

play04:56

because it's a slash 24

play05:00

and it's a standard acl i can tell

play05:03

because it's number one

play05:05

so i can only specify the source address

play05:07

so that's all that i need to put in here

play05:10

now in all of your accessories there's

play05:12

always an

play05:14

implicit deny any any at the bottom of

play05:17

the list

play05:18

but i need to allow traffic from the

play05:21

10.0.1 network

play05:23

so for that i'm gonna do access

play05:27

list this is also on list one and i'm

play05:30

gonna permit

play05:32

10.00.1.0

play05:34

and 0.0.0.255

play05:38

again and that's all that i need to do

play05:42

and well apart from actually applying

play05:45

the access list of course

play05:46

so to do that let's look at the topology

play05:48

diagram again

play05:50

and i'm going gonna do on the outside

play05:52

interface fast zero

play05:53

slash zero so back on the command line

play05:56

i go to interface fast zero slash zero

play06:00

and the command now is ip access

play06:03

group it was group one and i'm doing it

play06:06

in the direction towards r2

play06:09

so that is in the outbound direction

play06:12

looking at the topology diagram again if

play06:14

i wanted to control traffic

play06:16

going from the 10.0.2 network to

play06:19

r2 i could either do it inbound on fast

play06:22

2

play06:23

0 as it comes into r1 or i can do it

play06:27

outbound on fast 0 0 as it goes out of

play06:30

r1

play06:30

on its way to r2 but like we said

play06:33

earlier

play06:35

you can't do that in this particular

play06:37

scenario because if i blocked

play06:39

traffic coming from 10.0.2.0 coming in

play06:42

on fast 2

play06:43

0 it wouldn't just stop it getting it to

play06:45

r2

play06:46

it would stop it getting to the 10.0.1

play06:48

network as well

play06:50

and i need to allow that so that's my

play06:53

whole config

play06:54

let's just have a look at again

play06:57

so i denied traffic from 10.0.2

play07:00

i permitted traffic from 10.0.1 and

play07:03

applied that

play07:04

outbound on the fast 0 0

play07:07

interface so let's check that it is

play07:10

working

play07:11

so let's go on to pc1 first

play07:15

and check that pc1 still has

play07:17

connectivity to the router

play07:18

so i'll ping 10.0.0.2 and that is all

play07:22

good pc1 has so i know that pc2 does

play07:26

as well pc3 should not have connectivity

play07:30

to 10.002 so let's check that ping

play07:33

10.0.0.2

play07:35

and there we go the ping fails so my

play07:38

access list is working

play07:39

but it should have connectivity to the

play07:42

pc's in the other subnet so i'll ping

play07:44

pc1 10.0.1.10

play07:47

and that is successful so that is the

play07:50

first task completed

play07:51

we used a numbered standard acl

play07:55

to block traffic from the 10.0.2 subnet

play07:58

to r2810.0.0.2 but allow

play08:02

all of our other traffic everywhere else

play08:05

okay so that was a numbered standard acl

play08:08

next up let's have a look at a numbered

play08:11

extended

play08:12

acl and if i go back to

play08:15

the topology again the scenario

play08:19

this time is going to be we're going to

play08:21

permit

play08:22

telnet from pc1 to r2

play08:26

let's say that pc1 is our administrator

play08:29

workstation

play08:30

and telnet is a way that you can

play08:32

remotely get onto the command line on

play08:34

our router we'll cover it in more detail

play08:36

in a later section so we're going to

play08:38

allow it from

play08:39

pc1 but pc1 is the only administrator

play08:43

workstation

play08:44

so no other pc no other subnet is

play08:46

allowed to telnet on to

play08:49

r2 so let's

play08:52

configure that so i'll go on to

play08:57

the command line on r1 again and in my

play09:00

hcl

play09:01

i'm going to do an extended acl

play09:04

which allows traffic from 10.0.1.10

play09:07

to 10.0.0.2 when it's telnet traffic

play09:10

but denies it from everywhere else and

play09:13

is going to allow

play09:14

all other traffic so let's go into

play09:17

our one to configure this

play09:21

so let's go down a few lines i'll say

play09:25

access list and it's an extended hdl

play09:28

this time so that starts with 100 i'll

play09:31

use that for my number

play09:32

and i'm going to permit traffic from

play09:36

host 10.0.1.10 but i'm going to specify

play09:39

it's telnet traffic

play09:41

so i need to say that this is tcp

play09:44

so i permit tcp and i'm going to say

play09:47

from host

play09:48

10.0.1.10 and it's going to host

play09:52

r2 at 10.0.0.2

play09:55

and then equals the part is telnet

play09:58

i could also have said equals 23 the

play10:00

router would take that command as well

play10:03

so i'm allowing it from pc1 i don't want

play10:06

to allow it from

play10:07

any other pc in that subnet so i'll see

play10:10

access list 100

play10:11

and i'm going to deny tcp from the

play10:16

10.0.1.0.0.0.

play10:19

subnet going to host 10.000.2

play10:23

equals telnet

play10:27

and you can see it's important i get

play10:28

these in the right way if i put

play10:31

that second command in first i'd be

play10:33

blocking traffic from all hosts on the

play10:35

10.0.1 subnet

play10:36

including pc1 so i need to make my more

play10:39

specific commands

play10:41

up at the top of the acl and then i want

play10:44

to allow all

play10:46

other traffic i'm just controlling

play10:48

telnet here

play10:49

so i need to also say access list

play10:53

100 permit ip

play10:56

nanny to allow all other traffic and

play10:59

that overrides

play11:01

the implicit deny nana

play11:05

at the bottom of the acl the implicit is

play11:07

an ine is still down there at the bottom

play11:10

but the router reads the permit ipnene

play11:12

first

play11:13

so this is going to allow all traffic

play11:15

apart from what i explicitly denied

play11:17

okay so that's my acl configured and

play11:21

importantly we need to remember to apply

play11:24

it

play11:24

at the interface it's really easy to

play11:26

forget to do this

play11:27

so you're looking at the topology

play11:29

diagram

play11:30

and it's always best practice to secure

play11:32

as close to the source as you can

play11:35

so here we could put the hdl either

play11:37

inbound

play11:39

on this interface on the outside here

play11:43

which

play11:43

is fast zero slash one

play11:46

fast one slash zero sorry on the

play11:50

router actually let me make a note just

play11:52

to make

play11:53

that clear so i'll save this

play11:56

is fast one slash zero and

play12:01

that is the interface that we're gonna

play12:04

put this on let me try to clear that up

play12:08

a bit

play12:09

okay that's right okay so we're going to

play12:10

put it on fast one slash zero

play12:13

let me just clear that up a bit making a

play12:16

mess my topology diagram here

play12:18

okay so it's going to go inbound there i

play12:20

could also have put it outbound on fast

play12:23

0.0 but i've already got an acl

play12:26

configured on there the acl that i did

play12:28

earlier my standard numbered

play12:30

you can only have one acl per interface

play12:34

per direction

play12:35

so i'm going to put it on fast one slash

play12:37

zero so

play12:38

back on r1 i go interface fast one slash

play12:42

zero

play12:42

and it's ip access group

play12:45

100 and it's in this time because it's

play12:49

coming in

play12:50

fast one slash zero going out fast zero

play12:53

slash

play12:53

zero okay so that is my scl configured

play12:57

let's test it next so if i go on a pc

play13:00

one

play13:01

i should be able to telnet to 10.00

play13:07

telnet's already been configured and

play13:09

there you go i can see it's working

play13:10

because i'm getting the password prompt

play13:12

so i'm able to tell it onto r2

play13:14

from pc1 i should not be able to get on

play13:18

there from pc2

play13:21

so let's check that i'm going to pc2

play13:25

and i'll telnet to 10.0.0.2

play13:30

and there we go destination unreachable

play13:32

that's good it's because my acl

play13:34

is blocking the traffic but it should

play13:36

just be telnet traffic i should be able

play13:38

to ping

play13:39

10.002 and that's working so that is

play13:42

all good actually looking back at the

play13:45

topology diagram again

play13:46

i didn't need to specify anything about

play13:50

pc3 because i already had my first dcl

play13:55

blocking traffic going out to r2 from it

play13:57

so it was getting blocked already okay

play14:01

so that was a numbered standard

play14:05

and a numbered extended

play14:08

i'll do a named

play14:12

acl in the next lecture because i feel

play14:15

like this one's gone on for a little

play14:16

while now

play14:17

so go get yourself a cup of coffee if

play14:19

you want to i'll see you back here

play14:21

for named acls thanks for watching

play14:25

if you'd like to get the complete course

play14:27

ad free

play14:28

right now then you can enroll in my ccna

play14:31

gold bootcamp

play14:32

by clicking the link above my head or in

play14:35

the description

play14:36

it also includes full study notes

play14:38

quizzes

play14:39

and 150 pages of additional

play14:41

troubleshooting labs

play14:42

you can't find anywhere else

Rate This

5.0 / 5 (0 votes)

Related Tags
Network SecurityCCNA CourseAccess Control ListsLab ExercisesRouter ConfigurationGNS3 SimulationSubnet CommunicationSecurity TasksTelnet AccessVideo Tutorial