Standard Access Lists LAB

Video Activity

Standard Access Lists Lab In this lab, we demonstrate how the Standard Access List type functions and what specific components enable its functionality. We begin with a demonstration on how to create a Standard Access List, we ping to confirm specific loop-back address then demonstrate how this process works when a specific host is excluded by desi...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
27 hours 46 minutes
Difficulty
Intermediate
CEU/CPE
31
Video Description

Standard Access Lists Lab In this lab, we demonstrate how the Standard Access List type functions and what specific components enable its functionality. We begin with a demonstration on how to create a Standard Access List, we ping to confirm specific loop-back address then demonstrate how this process works when a specific host is excluded by design and should not be included in the transport output from the newly created Standard Access List.

Video Transcription
00:04
the first order of business. I am going to
00:08
show you how to create standard access lists.
00:12
So
00:13
what I have done already is I have added network 30
00:18
which were the three Lou backs
00:20
30.10
00:22
dot a dot a 30 that tend on 9.9 30 10 not 10 not 10. The three Lou backs that we had created previously on router to one. I went ahead and added Those two are SPF. So here you see my network statement. This one network statement takes care of all three loop axe. I said network 30 that $10.00
00:42
since the second and third octave changed.
00:44
I used to five fives in the second and third octet to tell the router I don't care what value values you let through for the third and fourth octet. The first and second octet match. Exactly. Let me show you those interfaces again. Show interfaces
01:02
show
01:03
I p interface breathe.
01:07
And these were the Lou backs we had previously created on Router 10 for r E i g R P manual summarize Ishan. I'm just going to use them for a different purpose.
01:17
So you see, router to
01:19
already has these in its routing. Tomo shou id be route.
01:25
Here they are.
01:26
The three Lou backs on router to one. I'm going to see if I can reach them from Host Tree. So I go to the command prompt
01:36
on host three.
01:38
And I say paying 30 dot Tenn 30.0.8 at eight.
01:47
And it should reply
01:49
the first request timed out for the AARP.
01:52
Uh, requesting reply process 30 dot Tenn 30.0.9 dot nine.
01:57
And I have a reply from 9.9 and
02:00
cannot 10.
02:04
And I'm getting replies from $30. 10. 10 10.
02:07
Now I'm going to create an access list on router to
02:12
so that
02:13
host tree should be about should be able not about Abel
02:21
trooping 30 dot Tenn dot a 30.0.0.8
02:23
and all addresses on the network on network to a one.
02:29
So host three should be able to ping
02:34
this loop back address on Lee on Router to a one
02:38
and all addresses on the 200 network, which means studios, you know, 10 address on router to a one which is 202 102 102
02:47
and
02:50
the serial zeroes, you know, zero address show I P I N t brief and the serial 000 address on router one.
03:00
Host tree should not be able to paying anything else.
Up Next