cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Bookmark
|
Subscribe
|
1283
Views
0
Helpful
6
Replies

ACL's

nonfatyogurt19
Level 1
Level 1

We've just started working with Standard ACL's in class and I'm having trouble getting it to work correctly. These are my entries:

ip access-list standard DENY1

deny 192.168.2.0 0.0.0.255

permit any

int g0/0

ip access-group DENY1 in

In packet tracer, I have 3 networks :

192.168.1.0/24

192.168.2.0/24

192.168.3.0/24

I'm trying to deny 192.168.2.0 from accessing 192.168.3.0 while still allowing 192.168.1.0 to access it. If I understand correctly, there is an implicit deny placed at the end when an ACL is made, so a permit statement must be made to allow traffic that isn't explicitly denied. When I implement this on Interface G0/0 on the router closest to the destination all traffic is being permitted.

Any help is greatly appreciated. 

1 Accepted Solution

Accepted Solutions

In a standard ACL, whatever IPs/subnets you put there are matched against the source of the processed packets.

So, in the config you described, you're telling the router to drop packets entering interface Gi0/0 that have 192.168.2.x as source IP address.  But there are no 192.168.2.x devices behind Gi0/0, so basically your ACL is reduced to the final "permit any", and all packets go through.

What you need is to "ip access-group DENY1 out" - packets coming from 192.168.2.x enter the router from somewhere else, and just as they are about to be sent out of interface Gi0/0 to whatever is connected to (or reachable through) that interface (that is, to 192.168.3.x), they will be dropped by the ACL;  everything else will go through.

View solution in original post

6 Replies 6

Iulian Vaideanu
Level 4
Level 4

Which of those networks are connected to (or reachable through) interface Gi0/0?

192.168.3.0 is the only network attached to that interface. 

In a standard ACL, whatever IPs/subnets you put there are matched against the source of the processed packets.

So, in the config you described, you're telling the router to drop packets entering interface Gi0/0 that have 192.168.2.x as source IP address.  But there are no 192.168.2.x devices behind Gi0/0, so basically your ACL is reduced to the final "permit any", and all packets go through.

What you need is to "ip access-group DENY1 out" - packets coming from 192.168.2.x enter the router from somewhere else, and just as they are about to be sent out of interface Gi0/0 to whatever is connected to (or reachable through) that interface (that is, to 192.168.3.x), they will be dropped by the ACL;  everything else will go through.

I see now. I had some trouble fully understanding inbound/outbound but your explanation makes sense. Thanks for the help!

InayathUlla Sharieff
Cisco Employee
Cisco Employee

Can you provide me with your .PKT file please?

https://www.4shared.com/file/C9qqSycwce/ACL.html