Experimental content |
Firewall access control list experiment |
Purpose |
|
Experimental requirements |
1 Experiment topology The network topology used in this experiment is shown in Figure 1. Figure 1 ACL experimental topology 2 Experimental steps
(2) Router1 configuration; (3) Router2 configuration; (4) PC0 configuration; (5) PC1 configuration; (6) PC2 configuration; 3 ACL policies
|
Experimental process description |
Prohibit PC1 from accessing PC2 on router R0, and allow other traffic; Router R0 unblocks PC1 from accessing PC2 and allows access. |
Experimental results |
|
Problems in the experiment and solution |
Pay attention to the configuration of the address when building the experimental environment |
[Computer Network Experiment] Firewall Access Control List Experiment
Guess you like
Origin blog.csdn.net/m0_67463447/article/details/127865741
Recommended
Ranking