05.01.2013 Views

CCNA Cisco Certified Network Associate Study Guide - FTP Server

CCNA Cisco Certified Network Associate Study Guide - FTP Server

CCNA Cisco Certified Network Associate Study Guide - FTP Server

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

448 Chapter 9 � Managing Traffic with Access Lists<br />

Extended IP Access Lists<br />

In the standard IP access list example, notice how you had to block the whole<br />

subnet from getting to the finance department. What if you wanted them to<br />

gain access to only a certain server on the Finance LAN, but not to other network<br />

services, for obvious security reasons? With a standard IP access list,<br />

you can’t allow users to get to one network service and not another. However,<br />

extended IP access lists allow you to do this. Extended IP access lists<br />

allow you to choose your IP source and destination address as well as the<br />

protocol and port number, which identify the upper-layer protocol or application.<br />

By using extended IP access lists, you can effectively allow users<br />

access to a physical LAN and stop them from using certain services.<br />

Here is an example of an extended IP access list. The first command shows<br />

the access list numbers available. You’ll use the extended access list range<br />

from 100 to 199.<br />

RouterA(config)#access-list ?<br />

IP standard access list<br />

IP extended access list<br />

IPX SAP access list<br />

Extended 48-bit MAC address access list<br />

IPX summary address access list<br />

Protocol type-code access list<br />

DECnet access list<br />

XNS standard access list<br />

XNS extended access list<br />

Appletalk access list<br />

48-bit MAC address access list<br />

IPX standard access list<br />

IPX extended access list<br />

At this point, you need to decide what type of list entry you are making.<br />

For this example, you’ll choose a deny list entry.<br />

RouterA(config)#access-list 110 ?<br />

deny Specify packet<br />

dynamic Specify a DYNAMIC list of PERMITs or DENYs<br />

permit Specify packets to forward

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!