【文章內(nèi)容簡介】
表應(yīng)用到某一接口上 ( Apply ACL to a Interface) { protocol } accessgroup accesslistnumber {in | out} Router(configif) Access List 命令( Access List Command ) Router(configif)ip accessgroup 1 out 169。 2022, Shenzhen Polytechnic. All rights reserved. 17 ? 僅允許我的網(wǎng)絡(luò)( Permit my work only) accesslist 1 permit (implicit deny all not visible in the list) (accesslist 1 deny ) interface ether 0 ip accessgroup 1 out interface ether 1 ip accessgroup 1 out 標準 IP ACL實例 1( Standard IP ACL Example 1) E0 S0 E1 Non 169。 2022, Shenzhen Polytechnic. All rights reserved. 18 accesslist 1 deny accesslist 1 permit (implicit deny all) (accesslist 1 deny ) interface ether 0 ip accessgroup 1 out 標準 IP ACL實例 2( Standard IP ACL Example 2) E0 S0 E1 Non ? 拒絕特定的主機( Deny a specific host) 169。 2022, Shenzhen Polytechnic. All rights reserved. 19 accesslist 1 deny accesslist 1 permit any (implicit deny all) (accesslist 1 deny ) interface ether 0 ip accessgroup 1 out 標準 IP ACL實例 3( Standard IP ACL Example 3) E0 S0 E1 Non ? 拒絕特定的子網(wǎng)( Deny a specific sub) 169。 2022, Shenzhen Polytechnic. All rights reserved. 20 標準 ACL與擴展 ACL比較 ( Standard versus External ACL) 標準( Standard) 擴展( Extended) 過濾基于源 ( Filters Based onSource.) 過濾基于源和目的( Filters Based on Source and destination.) 允許或拒絕整個協(xié)議族( Permit or deny entire TCP/IP protocol suite.) 允許或拒絕特定的 IP協(xié)議或端口 ( Specifies a specific IP protocol and port number.) 范圍( 100199) Range is 100 through 199. 范圍( 199) Range is 1 through 99 169。 2022, Shenzhen Polytechnic. All rights reserved. 21 CASE STUDY 首先使得 PC1所在的網(wǎng)絡(luò)不能通過路由器 R1訪問 PC2所在的網(wǎng)絡(luò)。 169。 2022, Shenzhen Polytechnic. All rights reserved. 22 擴展 ACL配置( Extended IP ACL Configuration) Router(config) accesslist accesslistnumber { permit | deny } protocol source sourcewildcard [operator port] destination destinationwildcard [ ope