Anda di halaman 1dari 2

Online exams will be 5 points max per exam. The skills exam is more important 25 and FE is 25.

Who cares if you can answer online exams in the real world?! They will want you to configure and troubleshoot stuff not answer questions!! STUDY THE CHALLENGE LAB BELOW. IT WILL HELP YOU GREATLY. CHAPTER 5 Step 1. Implement security policy number 1. Block the network from accessing the network. All other access to is allowed. Configure the ACL on HQ using "ACL number 10." * 1 to 99 is standard * close to the destination!! * Use source IP and standard ACL HQ(config)#access-list 10 deny HQ(config)#access-list 10 permit any HQ(config)#int fa0/1 HQ(config-if)#ip access-group 10 out Step 4. Implement security policy number 2. "Host" is not allowed to access host All other hosts are allowed to access Configure the ACL on B1 using ACL number 115. *100-199 extended *close to the source!! *host or will suffice B1(config)#access-list 115 deny ip host host B1(config)#access-list 115 permit ip any any B1(config)#int fa0/0 B1(config-if)#ip access-group 115 in Step 7. Implement security policy number 3. Hosts through are not allowed web access to Intranet server at All other access is allowed. Configure the ACL on the appropriate router and use ACL number 101. *100-199 extended *close to the source!! *host or will suffice * WWW or 80 is http traffic HQ(config)#access-list 101 deny tcp host

eq www HQ(config)#access-list 101 permit ip any any HQ(config)#interface fa0/0 HQ(config-if)#ip access-group 101 in Step 10. Implement security policy number 4. Use the name NO_FTP to configure a named ACL that blocks the network from accessing FTP services (port 21) on the file server at All other access should be allowed. * Named ACL * Ports are most of the time applied only on the destination * 100-199 extended * close to the source!! * host or will suffice * ftp 20 or 21 is ftp traffic B2(config)#ip access-list extended NO_FTP B2(config-ext-nacl)#deny tcp host eq ftp B2(config-ext-nacl)#permit ip any any B2(config-ext-nacl)#interface fa0/1 B2(config-if)#ip access-group NO_FTP in Since ISP represents connectivity to the Internet, configure a named ACL called FIREWALL in the following order: 1. Allow only inbound ping replies from ISP and any source beyond ISP. 2. Allow only established TCP sessions from ISP and any source beyond ISP. 3. Explicitly block all other inbound access from ISP and any source beyond ISP. HQ(confi)#ip access-list extended FIREWALL HQ(config-ext-nacl)#permit icmp any any echo-reply ===> only replies are permitted. Originating pings from ISP not allowed HQ(config-ext-nacl)#permit tcp any any established ===> Permit reply traffic for established connections only HQ(config-ext-nacl)#deny ip any any ===> explicit meaning put it in the config although not very useful HQ(config-ext-nacl)#interface s0/1/0 HQ(config-if)#ip access-group FIREWALL in