November 16, 2012

ACL on packet tracer

1
Let us apply ACL (Access Control List) on the topology. First, let us assign IP addresses and change the state of the interfaces.
2
Here, the status is change as shown in the following diagram.
3
Then, we will have to assign IP addresses to the PCs.
 4
And the PC attach to the other interface. Please note the difference between default gateways. We assign fast Ethernet interface address to default gateway.
5
Thus, after applying IP addresses. We see that Packet transfer is successful.
6
Let us apply ACL and permit and deny Hosts IP’s as we want. We are going to deny and permit certain hosts as follows.
a
Let us apply ACL and permit and deny Hosts IP’s as we want.
 7
Then, we will have to tell the interface that which ACL to follow. ACL is uniquely identified with the number, in this case 1.
8
Now, you see that the denied will not be able to send the data while those who we permit can send packet.
 9
Similarly, in the bottom right corner you can see status.
10

14 comments:

  1. thank you so much.. it was really useful to me!!

    ReplyDelete
  2. were can i find a complete bbok just for acl configuration

    ReplyDelete
  3. how i can block access a network to other network but the other network can access the blocked network

    ReplyDelete
  4. this is cool site..i love it...easy way to understand..

    ReplyDelete
  5. File tracking and auditing

    Secure File sharing - Add file access control and file IOs monitor on the fly with Windows file system mini-filter driver component in C#, C++ demo source code.

    ReplyDelete

  6. Nice information.. Thanks for sharing. DACCESS provides you designed and developed access control system on open flexible technology to provide real-time monitoring, management and control of your access system.
    access control system

    ReplyDelete

C program to Read From a File

#include <stdio.h> #include <stdlib.h> void main() {     FILE *fptr;     char filename[15];     char ch;   ...