Free CCNA Workbook
  • Home
  • About
    • Donations
    • Free CCNA Workbook Staff
  • Blog
  • Workbooks
    • CCNA Routing & Switching
    • CCNA Security
    • CCNA Voice
    • CCNA Wireless
  • Stub Lab
    • Stub Lab Information
    • Stub Lab FAQ’s
    • Stub Lab Topology

Configuring Named ACL’s

It is much easier to remember names than numbers. It is also easier to manage named ACL’s because you have the ability to sequence line items in the ACL. This lab will discuss and demonstrate named Access Control Lists (ACL’s)

Real World Application

Numbered Access List have a major downfall which is the ability to edit specific lines in the access-list. Unfortunately the only way to do that is to edit the lines in a text editor and completely remove and re-add the ACL. Numbered access-list still can be found in networks all around the world but engineers are now commonly using named access-list to ensure the ability to edit the acl on the fly with minimal time required. Named ACL’s also have a big advantage of being descriptive in the name such as an ACL named “VTY_ACCESS”, its quite obvious that that ACL would be for vty line access control.

Lab Prerequisites

  • If you are using GNS3 than load the Free CCNA Workbook GNS3 topology and start R1.
  • Establish a console session with R1 than configure its hostname.
  • It is recommended that you complete the Previous Lab prior to starting this Lab.
  • Configure R1’s FastEthernet0/0 interface with the IP address 169.254.20.3/29 and R1’s FastEthernet0/1 interface with the IP address 10.1.1.254/24

Lab Objectives

  • Configured a standard named access-list called INSIDE_IN and permit only 10.1.1.0/24 inbound access; place an explicit deny statement on line 500 and log denied traffic. Apply this access-list inbound on interface Fa0/1
  • Configure an extended named access-list called OUTSIDE_IN and deny host 71.23.44.50 and host 204.221.190.5 eq www, permit all other traffic. Apply this access-list inbound on interface FastEthernet0/0

Lab Instruction

Named access-list’s are much like numbered access-list but with names and the addition of line numbers. Now you can specify what line you wish to place an ACE in the ACL. For example you have an ACL with lines 5, 10, 15, 20, 25, 30 and you need to stick an entry between line 15 and 20, now you have that ability without having to remove the entire access-list. The new ACE statement will follow a specific line number when in named access-list configuration mode.

Step 1. The first objective states to create a standard named access-list and permit only the network 10.1.1.0/24 and to configure an ace on line 500 that denies and logs all denied traffic. The syntax used to completely this objective is; ip access-list standard ACLNAME as shown below.

R1#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.

R1(config)#ip access-list standard INSIDE_IN
R1(config-std-nacl)#

When in named access-list configuration mode, its common to start each ACE with a specific line number. If no line number is specified, the ACE is placed at the bottom of the ACL. It’s common to increment ACL line numbers by 5 or 10. To completely the first Lab objective, configure line 10 to permit 10.1.1.0/24 and explicitly deny all other traffic on line 500 with logging enabled.

R1(config-std-nacl)#10 permit 10.1.1.0 0.0.0.255
R1(config-std-nacl)#500 deny any log
An extended access-list does not use a subnet mask to identify networks but rather wildcard mask which is the inverse notation of a subnet mask. To read more about wildcards; CLICK HERE

 


Now in order to apply this named access-list to an interface you must navigate to the correct interface and execute the ip access-group command followed by the ACL name and direction as shown below;

R1(config-std-nacl)#exit
R1(config)#int f0/1
R1(config-if)#ip access-group INSIDE_IN in

You can verify your access-list configuration by executing the show access-list command;

R1(config-if)#do show access-list
Standard IP access list INSIDE_IN
    10 permit 10.1.1.0, wildcard bits 0.0.0.255
    500 deny   any log
R1(config-if)#

As you can see you have plenty of space between line10 and the explicit deny statement on line 500 to inject more access control list entries at a later time.

Step 2. – Configure an extended named access-list called OUTSIDE_IN and deny host 71.23.44.50 and host 204.221.190.5 eq www, permit all other traffic. Apply this access-list inbound on interface Fa0/0;

R1(config-if)#exit
R1(config)#ip access-list extended OUTSIDE_IN
R1(config-ext-nacl)#10 deny ip host 71.23.44.50 any
R1(config-ext-nacl)#20 deny tcp host 204.221.190.5 any eq www
R1(config-ext-nacl)#500 permit ip any any

Now assign the newly created extended named access-list inbound on R1’s FastEthernet0/0 interface as shown below;

R1(config-ext-nacl)#exit
R1(config)#int f0/0
R1(config-if)#ip access-group OUTSIDE_IN in

To verify your access-list configuration execute the show access-list OUTSIDE_IN command from privileged mode or by using the do command within a configuration mode as shown below;

R1(config-ext-nacl)#do sh access-list OUTSIDE_IN
Extended IP access list OUTSIDE_IN
    10 deny ip host 71.23.44.50 any
    20 deny tcp host 204.221.190.5 any eq www
    500 permit ip any any
R1(config-ext-nacl)#
◄ Previous Lab
Next Lab ►

About Free CCNA Workbook

In 2008 Free CCNA Workbook originally started as a sharable PDF but quickly evolved into the largest CCNA training lab website on the net!

 

The website was founded in late 2009 with the goal of providing FREE Cisco CCNA labs that can be completed using the GNS3 platform.

Latest Tweets

  • 9 years ago The @fccnawb website is not only available in HTTPS. We've done this of course to make Google happy lol.
  • 10 years ago Interested in following the Founder of the Free CCNA Workbook website? Check out @MattGeorgeCCIE

Useful Links

  • Stub Lab GNS3 Topology File Download
  • GNS3 - Cisco Device Emulator Download
  • Geek Fluent Blog by Dave Henry
  • Junos Workbook | Free Juniper JNCIA Training
  • Putty Terminal Emulator (Free Download)
  • Quiz Me! - CCNA R&S Practice Exam

© Copyright 2009-2017 Free CCNA Workbook All Rights Reserved.

Legal | Privacy Policy | Sitemap | Contact Us

sponsored