Escolar Documentos
Profissional Documentos
Cultura Documentos
Universiti Kuala Lumpur British Malaysian Institute (UniKL-BMI), Batu 8, Sungai Pusu, 53100 Kuala Lumpur.
muhammadmuizz93@gmail.com
I. INTRODUCTION
Access Control Lists are used to control traffic into and
out of your network based on given criteria. ACL consists of
a sequence of permit or deny statements that apply to network
layer or upper layer protocols. Most often Access Control
Lists are used for security reasons to filter traffic. Access lists
are applied per interface as inbound ACL and outbound ACL.
Inbound ACL where packets are processed before they are
routed while outbound ACL where packets are routed to
outbound interface and then processed by ACL.
II. DISCUSSION
In this lab test, a network needed to be configured. By
using Cisco Packet Tracer, the simulation of the network was
conducted and the network design is as shown as shown in a
figure below
Figure 2.2: Command to Configure Standard Named ACLs
The above figure shows that the command that was used to
make or arrange named ACLs which just allowing has that
had connected directly to their Fast Ethernet which for R1
10.1.1.0 and for R3 10.3.1.0 taken after by their wildcard
mask.
III. METHODOLOGY
The propagation
V. CONCLUSIONS
This section presents the results that have been obtained
from the
.
REFERENCES