Time
13 hours 57 minutes
Difficulty
Beginner
CEU/CPE
14

Video Transcription

00:00
Hello and welcome back to ice and you won Interconnecting Cisco Networking devices, Part one This episode 6 to 2 Extended A CEO Concepts
00:09
on Trend Aaron of your structure for this course the last video one over the Lesson 6.2 overview and did a few pre assessment questions
00:17
This absolute recovered the differences and similarities to the standard and extended A seals and network. And we're looking at the extended A seal concepts.
00:26
We're learning objectives for this. We're gonna look at the Senate, a sell concepts We're gonna look at how we can ratchet a rule to a port number instead of just a source i p address
00:35
and we're gonna have a brief introduction into the configuration.
00:39
It's a quick pre assessment here. Hopefully, you remember which of these would fall into the extender Dhe numbered list of a few seconds.
00:48
All right. It is 1 to 5
00:51
and 12 and 42 would be the standard numbered listing to 36. Would not fall into the stated or extent list.
01:00
Are those the sting did numbered a c p A seal's what it can do again. It's will get enabled on the interfaces and bounder out bone just like the standard. It's gonna go through that list of rules sequentially with the first match logic.
01:15
We also still have the global config commands, just like
01:21
the standard A seal's um
01:23
so in the extended A sales will require the use of the host keyword when specifying one I p address. Remember, where is the standard? A seal does not require the host key word, and I'll actually remove it in the newer I, alas, is when you put it in to the configuration
01:38
the extent of the seals. If you're going to specify one I P address requires that you have the host, he's work. He would
01:48
so it quick
01:49
just kind of general. Could fig command you to access this 1 10? Remember, the range is 100 through 1 99
02:00
and 2000 through 2699
02:02
We have permit or denying weaken. Do the protocol being T c P U T P I P I C M P.
02:09
There's some other ones.
02:12
We'll hit the question Mark Command in the party session. I'll show you,
02:15
and you have source I p address and wild card. Or you could do host source I p.
02:21
And then you have the destination i p address and wild card. And you can also do host destination I p as well.
02:30
So this one, we're actually gonna want a place near the source of the source of the traffic, whereas the standard A C L. We want a place near the destination. We place this near the source. We can you can tell you no source. I p destination If he had this protocol on this port seeing it very specific. Therefore,
02:47
we don't have to religious packets through the entire network for it just to be dropped at the very end.
02:52
Um, and we can still use that any parameter as the source or destination. I p
02:58
meaning, you know, permits. Ah, this source i p any destination address or, you know, deny this source i p Any destination address if you only want them to be on the land.
03:08
Obviously, is that remark parameter to add a description to the access list again?
03:15
So here's where we can actually come to utilize that I p head or a little bit more. We have the source address. We have the destination dress with protocol.
03:22
Um, can utilize it a bit more.
03:24
So how we actually match port numbers will use this at the end of the like right after the wild card mask of unity source or the destination address.
03:35
But if you think about it, we on Lee want to do the destination address because what is a packet? The source addresses a randomly generated source A port where, as the destination is gonna be one of your well known ports.
03:47
Um, there's a small chart with a few of them.
03:51
No, most of them. Force isn't so. If we look at the different options you have for this you have e cure equals and eat is not equals. Lt is less than g t greater than that range you extra Why?
04:05
So if we look at access list 12 to deny TCP which would be the protocol the host 10 12 50
04:15
to the destination of 10 110 with the wild card mask of 0002 55
04:23
and the port of 22.
04:26
So what this is saying is that you wanted this is going to deny the host and 1 to 50 as this h access because Shh. Support 22
04:33
to the network. 10 110 slash 24.
04:39
It's as simple as that. And remember, we want a match on the destination, not the source. It will allow you to match on a sore sport, but
04:47
source Port 22 is not going to same as destination Port 22.
04:53
So we jump in the port assessment here. Which of these air denying TCP packet from 10. 23. 65. 59 to the 172.18 00 slash 16 network.
05:06
So I want you to do is go through this list. Think about what each one is saying. Think about it. Whether that I p matches that of nuts and then what I want you to do is figure out what would make that correct. Like what would make
05:21
the incorrect ones correct? I get a few seconds to do this here.
05:29
Hopefully you got B and D.
05:30
That one will hit the entire anything that matches tender
05:34
10. Anything that starts with 10 that you know anything? It's gonna match that and deny
05:42
any i p packet
05:44
to that network.
05:46
And the last one
05:46
is going to deny anything from the tent to anything that matches tend at 23. 65
05:54
to that network.
05:57
So in the next episode, we're gonna look at the actual extended Asia configuration, so get ready to break out the live machines again.
06:03
And as always, if you have questions, you'd help. Feel free to shoot me. Message shall devise. Thank you for watching before this scene in export.

Up Next

CCNA ICND1

This course will enable students to understand virtualization and cloud services, and network programmability related to LAN, access and core segments.

Instructed By

Instructor Profile Image
Trenton Darrow
Network Engineer at NCI Information Systems, Inc
Instructor