Download - Configuring Standard ACLs
![Page 1: Configuring Standard ACLs](https://reader036.vdocument.in/reader036/viewer/2022062401/5870d4d41a28ab64768b6547/html5/thumbnails/1.jpg)
Configuring standard ACLs
branded.me/netprotocolxpert
![Page 2: Configuring Standard ACLs](https://reader036.vdocument.in/reader036/viewer/2022062401/5870d4d41a28ab64768b6547/html5/thumbnails/2.jpg)
To create an standard access list, the following command is used from the router's global configuration mode:
R1(config)# access-list ACL_NUMBER permit|deny IP_ADDRESS
WILDCARD_MASK ACL number for the standard ACLs has to be between 1–99 and 1300–
1999. You can also use the host keyword to specify the host you want to
permit or deny: R1(config)# access-list ACL_NUMBER permit|deny host IP_ADDRESS
branded.me/netprotocolxpert
![Page 3: Configuring Standard ACLs](https://reader036.vdocument.in/reader036/viewer/2022062401/5870d4d41a28ab64768b6547/html5/thumbnails/3.jpg)
Once the access list is created, it needs to be applied to an interface.
You do that by using the ip access-group ACL_NUMBER in|out interface subcommand.
in and out keywords specify in which direction you are activating the ACL.
in means that ACL is applied to the traffic coming into the interface, while the out keyword means that the ACL is applied to the traffic leaving the interface.
branded.me/netprotocolxpert
![Page 4: Configuring Standard ACLs](https://reader036.vdocument.in/reader036/viewer/2022062401/5870d4d41a28ab64768b6547/html5/thumbnails/4.jpg)
Consider the following network topology:
branded.me/netprotocolxpert
![Page 5: Configuring Standard ACLs](https://reader036.vdocument.in/reader036/viewer/2022062401/5870d4d41a28ab64768b6547/html5/thumbnails/5.jpg)
We want to allow traffic from the management LAN to the server S1. First, we need to write an ACL to permit traffic from LAN 10.0.0.0/24 to S1. We can use the following command on R1:
The command above permits traffic from all IP addresses that begin with 10.0.0. We could also target the specific host, by using the host keyword:
branded.me/netprotocolxpert
![Page 6: Configuring Standard ACLs](https://reader036.vdocument.in/reader036/viewer/2022062401/5870d4d41a28ab64768b6547/html5/thumbnails/6.jpg)
The command above permits traffic only from the host with the IP address of 10.0.0.1.
Next, we need to apply the access list to an interface. Since the traffic is entering the interface on R1, we need to use the in keyword:
NOTE - at the end of each ACL there is an implicit deny all statement. That means that all traffic not specified in earlier ACL statements will be forbidden.
branded.me/netprotocolxpert