Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 7: Implement, Verify, and Troubl... > Configure and Apply ACLs Based on Ne...

Configure and Apply ACLs Based on Network Filtering Requirements (Including CLI/SDM)

In this section, configuring standard and extended access lists will be covered. This will include a look at a technique for specifying ranges of addressing called wildcard masking that can be used with all three types of access lists. First, let’s look at how standard ALs are configured and applied.

Configuring Standard IP Access Lists

As you learned in Chapter 4, standard IP access lists filter network traffic by examining the source IP address in a packet. You create a standard IP access list by using the access-list numbers 1–99 or 1300–1999 (expanded range). Access-list types are generally differentiated using a number. Based on the number used when the access list is created, the router knows which type of syntax to expect as the list is entered. By using numbers 1–99 or 1300–1999, you’re telling the router that you want to create a standard IP access list, so the router will expect syntax specifying only the source IP address in the test lines.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint