00:04
Okay, Now we're going to configure some standard access list and see how they work.
00:10
So I have made up a question that we're going to solve.
00:14
I have said that PC three should be able to paying everyone,
00:18
and p C four should not be able to ping any address.
00:24
I go to my router to this access this I'm gonna create on router to
00:29
because that is the router that is closest to the source of the traffic. It is usually not always, but usually a good idea to create you access list as close to the source of the traffic that you're trying to permit or deny. Especially if you're trying to deny traffic. Because
00:46
if you prove access this close to the destination that you trying to deny traffic to, it doesn't make sense. For that traffic two transfers your whole network, get close to the destination and then get dropped. Anyways,
01:00
if you drop the traffic at the very end at the course with the destination, you're wasting bandwidth by allowing that traffic to flow through part of your network.
01:10
So the general rule of thumb is to deny traffic as close to the source as possible. So rich in this case,
01:18
BC one pc to pc three NPC four are closest to writer too. So we're gonna create this access list on louder to I go to Lincoln Fig mode
01:32
and execute the command access list. And then I hit the help feature, which is the question mark. And it is telling me that if I pick a number between one and 99 it's gonna automatically create a standard access list.
01:47
So I picked the number 10
01:49
and then I'm gonna permit PC
01:52
three's address PC trees address
01:57
10 $20.20 dollars, $20 3
02:00
Remember, standard access list. Our source based. So rather too will be checking for the source I P address in the inbound packet
02:10
coming into out or two.
02:14
So I'm gonna say permit
02:15
$20.20.20 dot three. And since this is just one address, I'm going to use a wild card. Next, it's gonna ask me for a wild card. I'm going to use a wild card off all zeros.
02:30
Next, my question stays at P. C. One and two should be able to paying everybody,
02:39
PC one and pc to the I. P s on pc one
02:44
being 10 9 10 9 10.1 slash 24
02:52
10 9 10 9 10 not two last 24.
02:55
So I go to outer too, and not allow this whole network. That's last 24 network, too,
03:08
access lists 10 permit. This is going to be my second entry
03:15
in access list. 10 on access list him
03:20
then I say 10 dot Tenn dot Tenn 10.0.0.0
03:23
and then the wild card. I care that the first octet must match. So all the bits are turned off because off bits in the wild card are the inverse of what they mean
03:35
in an I. P address in the wild card and off bit is a care bit. I care.
03:40
So I care to match the first Arquette completely. I care to match the second and the third octave completely. And I don't care what you allow. Two in the third and the fourth octet.
03:53
I can also put a remark down for this access list
03:59
access list 10. And if I hit the question Marquis
04:02
it shows me that the three options are denied. Permit all remark remark is just if you want to say something about that access list, we'll go ahead and say Remark,
04:17
Let's see if this access list exists in our running conflict. Do sure
04:23
running dash config.
04:35
Now, after creating access list, I must apply this access list
04:43
another two. I'm gonna choose to apply it inbound on this interface, which is F zero slash one.
04:49
However, if we go look at our
04:53
sure i p I and debrief new show I p i n t brief, you'll remember that we had actually not assigned f a zero slash one an i p address and we had created to sub interfaces FAA zero slash 1.10 and FX you a slash 1.20 under the main interface.
05:14
this access list on f zero slash 1.10 and 0.20. So I go into the interface first
05:23
Butera slashed 1.10 and I used the command I p access grope
05:30
and then access list number.
05:34
Any number between one and 99 1 in 1 99 and we are creating a standard access list. So our number was between one and 99 we picked 10. And then it asked me, either inbound or outbound. Now, if you look at the floor of traffic in a network diagram,
05:53
traffic will be coming inbound into this sub interface. So well applied this
06:01
access with the I P Access Group 10 in command.
06:05
Let's go do the same for the 0.20 sub interface.
06:16
and let's go see if this worked.
06:26
right up here, it's a specie. Three.
06:28
I'm going to try and ping out PC three can can it? Paying the 1 51 01 45 123 and four addresses on that 1 51 a 1 45 0 slash 29 land between water 123 and four.
06:44
Well, it can think about a one. Let's paint out or four,
06:47
and I'm pretty sure it can ping about or two in Router three. Also,
06:56
let's Try and Ping Writer to a one
07:03
and it can ping out pretty much anywhere.
07:08
PC one and PC to should also be able to ping out anywhere, since we had
07:14
permitted them access to be able to ping anywhere
07:16
so I can pay out or to a one, and I can ping the 1 50 network 1 51 01 $45.3.
07:29
And that, too. And I see it's replying, so I'm picking just fine. Let's go do these pings from PC to and test out
07:40
so I can ping the 1 51 1 45.0 network or 0.4 on that 0.0 network.
07:50
less test and see if I can ping the 202 102 100 dot
07:56
11 address on Router one,
08:00
and I can ping that. Also.
08:05
there is an implicit deny statement
08:09
at the end of every access list.
08:11
So which means since I have not permitted, I'm looking at my running configuration. Since I have not permitted router force address for going out, it should automatically be denied.
08:28
So let's go out off. I mean Let's go to P C four. Since I have not permitted PC four out, it should automatically be denied.
08:35
So let's try that out.
08:45
I'm getting a message for my default Gateway saying the destination host. It's unreachable. I should not be able to paying any off the 200 addresses either.
08:56
And again it says destination host unreachable, telling me that there really is an implicit deny statement at the end of my access list.
09:05
So now if I look at my access list should
09:09
access list, I see that the permit to permit statements had matches against them,
09:15
and I do not have matches against the deny statement because it does not. It does not show,
09:22
but it is implicitly there.
09:24
However, if I go ahead and type it in
09:28
access list 10 deny any I add 1/3 entry to my access list. Should
09:48
This is just a remark that doesn't count. So my last entry or my third entry in my access list is the deny any
09:58
and if I say do show
10:03
I see the deny entry exist over here.
10:05
If I start pinging from P C. Four again,
10:18
1 50 dot wanna won about $45
10:22
one, for example. Again, it says Destination host unreachable.
10:28
Now, if I look at Max's listen router to,
10:31
I will see matches against that. Deny any entry,
10:35
and I have four matches
10:37
I usually like. Typing this end is not too much work because I want to see matches against my deny any statement because if this counter this match counter increments rapidly for me, I had to endure that. Somebody's trying to
10:54
do a denial of service attack on my network and hence this counter. If redo this command over and over again, we'll start implementing rapidly
11:07
Let's go get out running Configure again
11:15
that stroll down to my access list. What happens if I take away this last entry in the access list?
11:24
let's take it away. No access less. 10. Deny any
11:35
and I checked my running config again
11:41
that the whole access list is gone.
11:45
So as soon as the router red No access list. 10. It didn't bother reading the rest of the command and just got rid of the whole access list because of this issue. So school created named access list. So now if I type in i p
12:05
So if I type and I'd be access list and hit question mark, I see two options either extended a standard and I'm going to pick the standard option.
12:16
Then I need to give it a name that's Nemetz ccn a and hit Enter since it say's access list name.
12:24
And now you see, I'm in a separate consideration mode, a sub configuration mode here I can permit and deny adding delete entries without taking away the whole access list. So this is much better
12:43
I can do my commands over again. I haven't been note pad and I can simply copy and paste.
12:50
So I permitted her stry.
12:56
I said, Permit host three. The statement permit
13:01
2020 $20.30.0 dot 0.0 can also be replaced since its one address that were permitting with a keyword host $20.20 dollars, $20 3 Personally, I don't like doing it that way.
13:18
It's a matter of personal preference. I'd rather type and permit $20.20 dollars $20 t
13:24
and then 0.0 dot 0.0.
13:28
So let's go look at our access list
13:30
by saying Do show, run!
13:37
So I should have the same effect
13:39
ruthless access list that I had with the previous one because
13:46
The only difference is that now I get to go into a sub configuration mode and do my permit and deny statements
13:52
and name my access list from CONFIG mode.
13:58
Now I need to change that access group command under fast Internet zero slash 1.10 and 20 Do show
14:11
config. See, it still has that old command we put in previously I p access group 10 in. I need to remove that
14:22
i n t f zero slash 1.10
14:26
no, I p access group
14:31
And then I need to do the Command i p access group and this time used the name access list, which was C CNN
14:41
and then again inbound.
14:43
I do the same for interface at zero slash 1.20.
14:50
my access group number 10
14:54
and add my access group name CC and A.
15:03
This should work exactly the same way. Let me send a bunch of pings from each one of these
15:11
so this one should not work. And it's saying destination host unreachable.
15:16
Gonna go to P C three
15:22
PC. One should also work.
15:24
I'm gonna send a pain
15:30
to NPC. One should also work.
15:33
So I send pings from PC to and now from P C one
15:37
and I go check my access list on
15:41
router to by saying show access list and I see matches against each one of my entries telling me that this access list is working.
15:54
if I go under the access list configuration mood, I'd be access list
16:02
standard to see an A and I take away the last statement, which is the Deny, any statement And I said no deny any,
16:11
and then I checked my running config.
16:18
you will see that I only got rid of the last statement. The deny any statement. The rest of my access list is still here
16:26
to get rid of my whole access list. I actually need to say no.
16:37
No, I p access list standard C, C and A. And that gets rid off my whole access list
16:45
now standard access. This can also be used to deny, tell net traffic or
16:51
remote log in traffic. So I'm gonna try and remotely log into Router four from PC three.
16:59
Let's see if that works.
17:02
So I'm gonna go to P C three and say, Tell that
17:08
and rather force I p is 1 51 a 1 $45 for
17:15
and it worked. So standard access list can also be used to block tell net access.
17:21
First, I'm gonna test to see if I can tell net into Router three from PC three. So I'm going to try and remotely log into Router three,
17:30
so I'm gonna type in Tel net 1 51 01 45 3
17:36
And it saves connection to foreign connection to 1 51 1.1 51 A 1 $45 3 was closed by foreign host.
17:45
This is a security feature in Siskel routers. Cisco routers, by default, do not allow anybody to tell that into them or remotely logging into them
17:56
to enable. Tell that access I have to go into my VT vie lines, those virtual ports that are there for Tell Net.
18:03
So line bt y and I have 16 lines, you know, through 15
18:11
and I have to assign it a password, which I'm gonna say Cisco and said this
18:18
this password is a log in
18:23
Now let's try and tell that from PC three
18:30
telnet from pc three going to say
18:37
1 51 01 It should be there a barrel keep
18:41
and it's asking for a password. I type in Cisco and I'm inside a router. Three. You see, my promises are three
18:49
and make sure I can tell that from router for also I mean from PC for also, excuse that.
18:59
So I'm gonna say it. Tell Nat 1 51 01 $45.3
19:07
and I get into Router three.
19:10
Now. What I'm going to do is create an access list on Router three and this one I have to create it on Router three because that's what where I'm trying to prevent telling that access to
19:25
pc three town that access, and I'm gonna allow PC four, Tell Net access,
19:30
and I'm going to use a standard access list
19:37
So I'm going to say I p
19:40
no, I'm going to create a numbered access list to do this because it's quicker.
19:44
So I'm just going to simply say, access
19:52
and PC Trees I p addresses 2020 23
19:56
and then 0.0 dot 0.0 for that one address.
20:02
No pc to me. I'm gonna permit
20:04
I'm going to say permit
20:11
and 0.0 dot 0.0. Then I'm going to say, deny everybody else, deny
20:18
access list. Chen deny any, which should deny p C four.
20:26
Now I do not apply this access list inbound on Router three's F zero slash zero interface.
20:34
I actually have to go into my VT bylines
20:40
lying VT y zero space 15
20:45
and see access class. The command is different. It's not I p access grope say's access class,
20:55
10 which is my access list number
20:57
and then inbound or outbound? Well, the connection is gonna come inbound, so I'm going to say in
21:10
There's it out again.
21:14
And now I'm going to try and tell that from PC three, which should work.
21:21
So tell that to 1 51 01 $45 3
21:29
I'm inside a router. Three.
21:37
attell net connection from p C. Four should not work,
21:41
and it says connection refused by remote host
21:48
So let's go check our access list on Router three
21:56
And I see two matches
22:00
for my permit statement and 16 matches for my deny statement. So this access list is working.
22:06
That concludes our standard access list lab