[Computer Network Experiment] Firewall Access Control List Experiment

Experimental content

Firewall access control list experiment

Purpose

  1. Understand how access control lists work;
  2. Understand the types of access control lists;
  3. Learn about the configuration of standard access control lists.

Experimental requirements

1 Experiment topology

The network topology used in this experiment is shown in Figure 1.

Figure 1 ACL experimental topology

2 Experimental steps

  1. Router0 configuration;

(2) Router1 configuration;

(3) Router2 configuration;

(4) PC0 configuration;

(5) PC1 configuration;

(6) PC2 configuration;

3 ACL policies

  1. Prohibit PC1 from accessing PC2 on router R0, and allow other traffic;
  2. Router R0 unblocks PC1 from accessing PC2 and allows access.

Experimental process description

  1. Build the environment and configure the network topology equipment
  2. Configure the corresponding address.
  3. Use the ping method for verification.
  4. test

Prohibit PC1 from accessing PC2 on router R0, and allow other traffic;

Router R0 unblocks PC1 from accessing PC2 and allows access.

Experimental results

Problems in the experiment

and solution

Pay attention to the configuration of the address when building the experimental environment

Guess you like

Origin blog.csdn.net/m0_67463447/article/details/127865741