ACL Filtering Lab

Security

ACL Filtering Lab

Overview

This lab demonstrates how Access Control Lists (ACLs) are used to filter network traffic and control access between different networks.

Requirements

  • Create standard ACL
  • Create extended ACL
  • Apply ACL to interface

Steps

  1. Define ACL rules based on network requirements
  2. Apply ACL to the correct interface direction (in/out)
  3. Test traffic flow between networks

Solution

  1. Step 1: Created a standard ACL to permit traffic from 192.168.1.0/24 network
  2. Step 2: Applied the ACL to interface G0/0 in inbound direction
  3. Step 3: Verified configuration using show access-lists command
  4. Step 4: Tested connectivity to confirm allowed and blocked traffic behavior

Verification

  • ACL entries correctly installed in router
  • Allowed traffic passes as expected
  • Blocked traffic is denied properly
  • No misconfigured rules detected

Notes

  • ACLs are processed top-down (order matters)
  • Implicit deny exists at the end of every ACL
  • Always test both allowed and denied traffic