建立ACL語法格式:ide
Router(config)# ip access-list { standard | extended }access-list-name3d
配置標準命名ACL語法格式:router
Router(config-std-nac)# [ Sequence-Number ] { permit | deny }source[ source-wildcard ]blog
配置擴展命名ACL語法格式:接口
router(config-ext-nacl)# [ Sequence-Number ] { permit | deny } protocol { source source-wildcard destination destionation-wildcard } [operator operan]ip
標準命名ACL應用實例:ci
router(config)#ip access-list standard cisco
router(config-std-nacl)# permit host 192.168.1.1
router(config-std-nac)# deny any
//只容許來自主機192.168.1.1/24的流量經過it
查看ACL配置信息命令:io
outer#show access-list
Standard IP access list cisco
10 permit 192.168.1.1
20 deny anyclass
實驗需求:
vlan10中的PC2主機能夠訪問PC1
拒絕vlan10中的其餘主機訪問PC1
容許其餘網段中的主機訪問PC1
實驗拓撲圖:
交換機sw接口配置:
輸入如下命令:
conf t
vlan 10,20
ex
do show vlan-sw b
int f1/1
sw mo acc
sw acc vlan 10
ex
int f1/2
sw mo acc
sw acc vlan 10
ex
int f1/3
sw mo acc
sw acc vlan 20
ex
do show vlan-sw b
int f1/0
sw mo t
sw t en dot
ex
no ip routing
三層交換機sw-3接口配置
輸入如下命令:
conf t
int f1/1
no switchport
ip add 192.168.100.1 255.255.255.0
no shut
do show ip int b
#ex
vlan 10,20
int vlan 10
ip add 192.168.10.1 255.255.255.0
no shut
ex
int vlan 20
ip add 192.168.20.1 255.255.255.0
no shut
ex
int f1/0
sw mo t
sw t en dot
do show ip route
ex
PC機IP配置:
PC1> ip 192.168.100.100 192.168.100.1
PC2> ip 192.168.10.10 192.168.10.1
PC3> ip 192.168.10.20 192.168.10.1
PC4> ip 192.168.20.20 192.168.20.1
此時是處於全網互通的,使用PC2拼其餘
ping 192.168.100.100
ping 192.168.10.20
ping 192.168.20.20
在sw-3輸入命令訪問控制列表規則:
輸入如下內容:
ip access-list standard kgc
permit host 192.168.10.10
deny 192.168.10.0 0.0.0.255
permit any
ex
do show access-list
int f1/1
ip access-group kgc out
驗證配置結果是否達到了實驗要求
使用三臺PC機分別與PC1拼接,PC二、PC4能夠拼通,而PC3則顯示被拒絕
PC2> ping 192.168.100.100
PC3> ping 192.168.100.100
PC4> ping 192.168.100.100