11.网络工程师交换试验手册之十一:访问控制列表实验_第1页
11.网络工程师交换试验手册之十一:访问控制列表实验_第2页
11.网络工程师交换试验手册之十一:访问控制列表实验_第3页
11.网络工程师交换试验手册之十一:访问控制列表实验_第4页
11.网络工程师交换试验手册之十一:访问控制列表实验_第5页
已阅读5页,还剩3页未读 继续免费阅读

付费下载

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、网络工程师交换试验手册之十一:访问控制列表实验实验目的:理解 ACL工作原理,熟悉配置ACL的基本步骤。ACL有3种(1)普通ACL列表,(2)扩展ACL列表,(3)名称ACL列表。实验一:标准访问控制列表实验拓扑:实验内容:(1)路由器的基本配置:R1上的基本配置interface Loopback0ip address ip address secondary(同一个接口上启用多个ip地址模仿多个pc机。)ip address se

2、condaryip address secondaryip address secondaryinterface Serial0ip address clockrate 64000router ripnetwork network R2上的基本配置interface Serial1ip address router rip net (2)在R

3、2没有起访问控制列表时测试可达性。   R2#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 32/32/32 msR2#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echo

4、s to , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 32/32/32 msR2#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 32/32/32

5、 msR2#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 28/31/32 msR2#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout

6、is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 32/32/32 ms(3)在R2上起用访问控制列表ACL 10   R2(config)#access-list 10 permit (10为标准ACL的编号,标准ACL的编号范围是099)   R2(config)#access-list 10 permit R2(config)#access-list 10 permit 查看AC

7、L配置R2#show ip access-listsStandard IP access list 10    permit     permit (10 matches)    permit    在接口S1上调用ACL 10   R2(config)#int s1   R2(config-if)#ip access-group 10 in(4)测试起用ACL 10的效果   R2

8、#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 28/31/32 msR2#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2

9、seconds:.Success rate is 0 percent (0/5)R2#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 28/31/32 msR2#ping Type escape sequence to abort.Sending 5, 100-byte

10、 ICMP Echos to , timeout is 2 seconds:.Success rate is 0 percent (0/5)R2#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 28/31/32 ms观察启用ACL 10前后的不同,体会ACL在网络管理和

11、网络安全上的应用效果。标准ACL只能根据源地址来控制数据的流通,当我们需要根据目的或者数据类型来控制数据流通的时就需要用到扩展ACL,下面的实验将告诉你如何扩展ACL的配置和使用方法。相对而言,标准访问控制列表比较单纯,在实际应用中并不是很常用。实验二:扩展ACL实验拓扑:attach  /attach实验内容:1路由器的基本配置R1上的基本配置interface Loopback0ip address ip address secondary(同一个接口上启用多个ip

12、地址模仿多个pc机。)ip address secondaryip address secondaryip address secondaryinterface Serial0ip address clockrate 64000router rip   network    network   

13、60;R2上的基本配置  interface Serial0ip address clockrate 64000!interface Serial1ip address !router ripnetwork network R3上的基本配置interface Serial1  ip address router ripnet 测试连通性

14、:     R3#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 56/59/60 msR3#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to

15、 , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 56/60/64 msR3#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 60/68/100 ms

16、R3#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 60/68/100 msR3#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is

17、 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 56/59/60 ms在R2上启用ACL 110R2(config)#access-list 110 deny ip host host R2(config)# access-list 110 deny ip host host R2(config)#access-list 110 deny ip host host 19

18、R2(config)#access-list 110 permit ip any any查看ACL配置R2#show ip access-lists在S0口上调用ACL 110R2(config)#int s1R2(config-if)#ip access-group 110 out(4)测试启用ACL 110 的效果   R3#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 second

19、s:。Success rate is 100 percent (5/5), round-trip min/avg/max = 56/59/60 msR3#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:。Success rate is 100 percent (5/5), round-trip min/avg/max = 56/59/60 msR3#ping Type escape seq

20、uence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:。Success rate is 100 percent (5/5), round-trip min/avg/max = 56/59/60 msR3#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!Success rate is 100 perc

21、ent (5/5), round-trip min/avg/max = 56/59/60 msR3#ping Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to , timeout is 2 seconds:!Success rate is 100 percent (5/5), round-trip min/avg/max = 56/59/60 ms总结:通过比较启用ACL 110的前后PING的效果,可知扩展ACL可以根据目的地址来限制数据流的传输。当然我们还可以根据数

22、据流的类型作限制。比如:用access-list 110 tcp permit host host eq www 来限制主机到主机的www访问。实验三:名称列表又叫命名ACL因为命名ACL与普通ACL和扩展ACL可以起到同样的作用,所以这里只给出命名ACL的配置方法:rack03-1(config)#ip access-list extended www(定义命名ACL名称)rack03-1(config-ext-nacl)#permit tcp any any(给ACL添加条件)rack03-1(config-ext-nacl)#deny

23、 udp any anyrack03-1(config-ext-nacl)#exit为什么使用名称列表?因为一般访问控制列表,我们只要删除其中一个,那么所有的都已经被删除了,所以增加了我们修改的难度,而名称列表可以达到这种任意添加修改的效果。实验四: 用access-list 对抗“冲击波”病毒用access-list 对抗“冲击波”病毒,最近“冲击波”病毒”(WORM_MSBlast.A)开始在国内互联网和部分专网上传播。我以前在接入层做的access-list起了作用!access-list 120 deny 53 any anyaccess-list 120 deny 55 any an

24、yaccess-list 120 deny 77 any anyaccess-list 120 deny 103 any any以上几条慎用!access-list 120 deny tcp any any eq echoaccess-list 120 deny tcp any any eq chargenaccess-list 120 deny tcp any any eq 135access-list 120 deny tcp any any eq 136access-list 120 deny tcp any any eq 137access-list 120 deny tcp any

25、any eq 138access-list 120 deny tcp any any eq 139access-list 120 deny tcp any any eq 389access-list 120 deny tcp any any eq 445access-list 120 deny tcp any any eq 4444/新加access-list 120 deny udp any any eq 69 /新加access-list 120 deny udp any any eq 135access-list 120 deny udp any any eq 136access-lis

26、t 120 deny udp any any eq 137access-list 120 deny udp any any eq 138access-list 120 deny udp any any eq 139access-list 120 deny udp any any eq snmpaccess-list 120 deny udp any any eq 389access-list 120 deny udp any any eq 445access-list 120 deny udp any any eq 1434access-list 120 deny udp any any eq

27、 1433access-list 120 permit ip any anyaccess-list 120 deny icmp any any echoaccess-list 120 deny icmp any any echo-replyaccess-list 120 deny tcp any any eq 135 access-list 120 deny udp any any eq 135access-list 120 deny tcp any any eq 139access-list 120 deny udp any any eq 139access-list 120 deny tc

28、p any any eq 445access-list 120 deny udp any any eq 445 access-list 120 deny tcp any any eq 593 access-list 120 deny udp any any eq 593access-list 120 permit ip any any access-list 115 deny icmp any any echoaccess-list 115 deny icmp any any echo-replyaccess-list 115 deny tcp any any eq 135access-lis

29、t 115 deny udp any any eq 135access-list 115 deny udp any any eq 69access-list 115 deny udp any any eq 137access-list 115 deny udp any any eq 138access-list 115 deny tcp any any eq 139access-list 115 deny udp any any eq 139access-list 115 deny tcp any any eq 445access-list 115 deny tcp any any eq 593access-list 115 permit ip any anyinterface ip access-group 115 inip access-group 115 out如果你是在pix上封就是:access-list 115 deny icmp any any echoaccess-list 115 deny icmp any any ech

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论